IDENTIFY

How might we better understand and manage our IT assets to reduce security risks?

Before we can protect our systems and data, we need to know what we have and where it lives. Identifying assets, vulnerabilities, and risks enables us to make informed security decisions.

Best Practices

  • Maintain an up-to-date inventory of university devices and applications using USU’s desktop management tools.
  • Use datacensus.usu.edu to classify and track data based on sensitivity and compliance needs.
  • Identify vulnerabilities in IT systems through regular asset discovery and risk assessments.
warning sign

Call To Action

Follow the instructions at computers.usu.edu to ensure compliance with USU’s Desktop Management Initiative. This helps track and secure all university-owned devices.

Use datacensus.usu.edu to identify where USU’s data assets reside. Conducting a data census ensures that sensitive information is properly classified and protected.

Key Questions Answered

What do I do if my computer hasn't been included in the Desktop Management Initiative yet?

Unmanaged devices create security risks and may not receive critical security updates. Follow the instructions at computers.usu.edu to ensure compliance and protection of your university-owned devices.

Why is data classification important?

Properly classifying data at datacensus.usu.edu helps protect sensitive information, ensuring compliance with university policies and regulations.

What’s the difference between identifying and detecting threats?

Identifying involves mapping and understanding IT assets, while detecting focuses on recognizing active security threats in real-time.

Available Tools & Resources

  • computers.usu.edu – Ensures proper management of USU-owned devices.

  • datacensus.usu.edu – Helps track and classify university data assets.

  • Vulnerability scanning tools - IT Security uses many tools to try to identify security weaknesses, hopefully before the miscreants do.