🎓 Purpose
This Handbook is a self-service resource providing you with short, practical pages filled with actionable steps and other supports related to common cyber security questions and requirements.
👥 Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
🔖 Contents
On this page
Expand |
---|
title | Expand to view table of contents. |
---|
|
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 3 |
---|
include | |
---|
outline | false |
---|
indent | |
---|
style | default |
---|
exclude | Purpose|Audience| |
---|
|
|
ContentsOn this page|Search|Additional help|Related articles | type | list |
---|
class | |
---|
printable | false |
---|
|
|
class |
💭 Inspiration
U of T’s Information Security Handbook is based upon the SecureMyResearch Cookbook concept created at Indiana University. Thank you to Anurag Shankar and William Drake for your support and inspiration.
📘 How-tos
How-tos are (relatively) short, practical documents which provide actionable steps or help for common (real-world, business use) cybersecurity questions and requirements. They provide help and step-by-step directions to assist community members in completing their work or task securely; use of them is voluntary. How-tos are written or curated (and referenced) by subject matter experts and revised in an agile and iterative fashion.
How-tos and the Information Security Handbook are meant to supplement the existing Information Security support and governance framework which “provides a baseline developed by the community, for the community in consultation with subject matter experts to: (1) enable the mission of the university, (2) increase trust and reduce risk, and (3) address regulatory and legal requirements the university must meet.”
Included
Not included
Pages without a connection to information security requirements and questions.
Information not suitable for a general or public audiences.
Complex workflows and use cases.
📝 Contributors
This service is provided by U of T’s Information Security program. Pages are written, reviewed, revised, and curated by relevant subject matter experts from within Information Security.
Approval process
New pages and revisions are determined in collaborative fashion between relevant subject matter experts from within Information Security. Handbook pages will be developed in an iterative way, so that information can be shared quickly with the community.
Page Properties |
---|
hidden | true |
---|
id | Handbook pages governance |
---|
|
Name | Role | Date |
---|
Michael Laurentius | Author | | | Approver (Manager) | | | Reviewer | |
|