Services

Security Infrastructure

At USF, although some levels of computing services are provided in a centralized manner, administration of desktop computing and other specialized services are usually provided and supported by local computing departments. The potential increase in the number of security-related incidents on campus as well as state-wide data security audits has resulted in the need for centralization and coordination of security efforts and implementation of a security structure campus-wide to facilitate the dissemination of information and identification of appropriate personnel in each computing department to address security threats quickly and efficiently.

Information Security Manager

The Information Security Manager (ISM) is responsible for organizing campus-wide efforts in the area of security, such as development of USF data security policies, negotiation and evaluation of site licenses for security-related software, training, and dissemination of security-related information and incidents, which could affect the availability, and integrity of computing resources on campus. If security issues with a particular campus computing resource arise in such manner that threaten the integrity and availability of the campus computing network, the Information Security Manager, under advice of the other members of the Incident Response Team, has the authority and responsibility to isolate the offending computing resource until the issue has been resolved.

Incident Response Team

The Incident Response Team (IRT) is composed of the Information Security Manager, members of the campus backbone network administration personnel, and security staff. The team is responsible for quickly identifying threats to the campus data infrastructure and taking steps to mitigate the threat. IRT members will notify local Information Security Officers and Administrators of any incident involving their resources.

Information Security Workgroup

Members of the Information Security Workgroup (ISW) include the Data Security Administrator, volunteer representatives from computing departments throughout the campus, and representatives from University Police, General Counsel, and Inspector General's Office. The goal of the ISW is to review the policies and best practices initiated by the Information Security Manager prior to implementation and enforcement. The ISW is involved in campus-wide contract negotiations related to security, such as vulnerability scanners, file integrity tools, and antivirus software. The Information Security Workgroup is kept abreast of trends in campus security incidents and offers guidance to the Information Security Manager when new areas of concern develop and are in need of attention.

Information Security Administrator

The Information Security Administrator (ISA) is the technical person(s) in each department responsible for the security maintenance of computing resources within their organization. This includes applying patches, installing and configuring virus detection software, and performing periodic vulnerability assessment on clients and servers within his or her area of responsibility. Each organization must appoint at least one ISA, but may have multiple ISAs responsible for different areas within that group.

Information Security Officer

Often the need for a secure computing environment comes into conflict with standard operating procedures for a faculty or staff member. The Information Security Officer (ISO) will work to resolve issues that might arise which appear to jeopardize the security needs and requirements of the University as pointed out by the ISW, ISM, or ISA, and the needs of faculty and staff to perform their job. The ISO has the authority to authorize disconnection of computing resources from the network that do not meet the intent of the security policies or best practices put forth by USF or by the local computing agency. Together with the ISA, the Security Officer will also address security vulnerabilities and incidents identified by the ISM and members of the IRT.