Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Saturday, November 28, 2015

  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
Encryption & digital signatures
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

Penn Information Security Brochure

Each year, Penn Information Security publishes a booklet containing useful, basic security information. This brochure is free, and is mailed to all faculty and staff. Students in many residence halls can obtain a copy from their ITA, and Information Security is always glad to make copies available anytime. If you have a special need for a large number of copies, e.g., for a conference, class, seminar or other function you are organizing or leading, we will gladly provide copies for that - just contact us at (215) 898-2172 or send email to

You can download and view the 2013 Brochure in PDF format!!

Last updated: Thursday, February 20, 2014


Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania