The University of Texas at Tyler
Tyler   •   Longview   •   Palestine
A centerpiece for learning,
culture and natural beauty

ISA Information

UT Tyler Office of Information Security

As a result of the Security Action Plan developed by UT System in 2006, UT Tyler has, in cooperation with the data owners, identified Information Security Administrators (ISA) for each server on the UT Tyler network.

 Item 7 of the Action Plan

  • ISAs are responsible for security of the system or asset with the knowledge and training to receive and distribute time-critical computing and security-related information.
  • ISAs are responsible for the implementation of and compliance with all Information Technology policies and procedures and for reporting general computing and security incidents to the ISO.

 Training

  •  2009 SANS training:

o All ISAs are required to take at least 1 SANs security class during 2009.

o UT Tyler's ISO & UT System will pay for the training expense.

o To register for training contact Diane Garrett.

  • ISO will pay for class, register ISAs, and provide ISAs with login information.
  • ISAs can change password when they log in the first time.

o ISAs have 4 months to complete training after registration.

o SANs portal

o Choose from the following classes:

SEC 401: SANS Security Essentials Course description
SEC 505: Securing Windows Course description
SEC 506: Securing Unix/Linux Course description

SANS Security Essentials Modules:

  • Networking Concepts
  • Defense-in-Depth
  • Internet Security Technologie
  • Secure Communications
  • Windows Security
  • Linux Security

 Risk Assessments

  • UT System ISAAC Risk Analysis Tool
    • ISAs will use this tool to assist with assessing the security posture of their systems, and compliance with information security standards (both state and local). TAC 202 requires annual risk assessments on mission critical systems and those containing confidential/sensitive information.
    • ISAAC-UT Training
    • ISAAC-UT Application
  • ISO will hold meetings with ISAs as needed.
  • A mailing list has been established to share information about meetings, vulnerabilities and alerts.
©