Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The OIT Security Team is continuously looking for new ways defend the security of the UCI network as well as the hosts, applications, services, and data residing on it. One of the ways we try to accomplish this is by using tools to look for vulnerabilities of hosts and applications on the UCI network, the same types of vulnerabilities that hackers will look for to compromise your systems and data. The difference is we let you know about it them so you can fix itthem, preferably before the hackers break it exploit them and cause real damage.

We approach this in two ways:

...