Services

To protect the institution by identifying and implementing information technology security best practices.

     - IT Security Office (ISO)

What We Offer
The IT Security Office uses best practices and offers multiple services to protect the institution and its community. Below is a list of some of the services the IT Information Security Office provides to the OSU community.  If you are interested in any of these services or have any questions, please call the IT Security Office at (405) 744-1976.

Data Destruction
The IT Security Office provides data destruction services for departments at Oklahoma State University.  Hard drives are crushed using a hydraulic press and a certificate of destruction is then issued for surplus purposes. Click here to submit a request for hard drive destruction. Log in with your Okey credentials and fill out the form. We will be in touch to schedule and appointment.

Data Recovery
The IT Security Office provides data recovery services for departments at Oklahoma State University when extenuating circumstances exist. Utilizing a variety of forensic software and techniques, the IT Information Security Office may be able to recover files from an assortment of media and file systems.

Forensic Analysis
The IT Security Office provides forensic analysis services for departments at Oklahoma State University when extenuating circumstances exist. Oklahoma State University maintains an agreement with vendors for the use of professional computer forensics software. Forensic analysis services may aid in the completion of a pending investigation for a department of the university.

Incident Handling
The IT Security Office can assist in incident handling for computer systems owned by the university. Staff of the IT Information Security Office can work with systems administrators and others to respond to an incident, identify the cause of an incident, contain an incident, prevent an incident from occurring in the future, and recover from an incident. Some incidents may require that the IT Information Security Office work with local law enforcement for a resolution.

Network Monitoring
The IT Security Office monitors network traffic to ensure reliability and to protect the students, faculty, staff, and IT assets of the University. Processes and technology such as a Intrusion Prevention System and Security Information Event Management are utilized to identify and prevent risks to students, faculty, staff, and university IT assets. The ISO may also monitor network traffic related to internal investigations and external investigations as authorized by law.

Security Awareness Training
The IT Security Office provides training primarily for the staff of Oklahoma State University. Training is provided to new employees and existing employees. Security awareness training typically encapsulates IT security fundamentals, university policies, and current IT security topics. For more information about Security Awareness, click here.

Vulnerability Assessment
The IT Security office offers customized vulnerability scanning for departments.  Vulnerability scans are designed to identify potential vulnerabilities and security problems with operating systems, application software, and network configurations.

Web Application Scanning
The IT Security Office provides custom scanning for web applications. A web application scan is a specific type of vulnerability scan that is designed to address common threats to web applications.