How will ITC and HSCS identify vulnerabilities?
Security vulnerabilities on a given device are usually discovered as the result of an investigation of a problem reported from someone within or outside the University, who is being attacked from that device, or during an audit conducted by the University’s Audit Department or other auditing organizations. ITC also offers a proactive network scanning service, that can report vulnerabilities to the person requesting the scan, before the security holes actually cause problems. As already stated, ITC and HSCS will make an attempt to resolve the problem in collaboration with the device owner or overseer before taking action, unless the situation is so urgent that immediate action is required.