Goal 6: Use Technology to Expand Access and Opportunities
Strategy 6.4: Protect the Security and Integrity of the IT Infrastructure
Universities have become increasingly opportunistic targets for criminal elements and mischief-makers who seek to disrupt information technology services and, increasingly, to steal valuable information or otherwise use our network capabilities for illegitimate ends. Penn State’s network is probed tens of millions of times in a typical week for security weaknesses, and the distributed responsibility for our IT infrastructure and network administration provides ample opportunities for invasion. The openness of University networks, coupled with the high bandwidth of Internet 2 data manipulation and transmission capabilities, create a unique set of circumstances for IT management.
The Vice Provost for Information Technology must continue to develop both the technical infrastructure and educational programming to impress upon faculty, staff, and students the importance of everyone doing his or her part to maintain the security of Penn State’s information technology networks and infrastructure. Planning for the possibility of natural or other disasters must also be incorporated into future IT development, given that the University cannot operate long without core information technology support.