Division Structure

 

The purpose of this section is to protect the assets and databases while taking into account the business needs of the university and adhering to regulations.

This section deals with protection against unauthorized access, inappropriate use, exposure, disruption and deletion of assets and databases by unauthorized or malicious parties.

The information security principles are comprised of three pillars: maintaining information secrecy, integrity and availability. Protection of the assets and databases uses several layers of defense, including the policy layer, the physical protection layer and protection layers on interior and exterior communications. 

 

The systems and processes the section is responsible for include (partial list):

  • Determining information security policy and procedures, as well as monitoring and enforcing them.
  • Managing risk assessments and vulnerability testing for university systems.
  • Supervising business continuity, backup and recovery processes.
  • Raising awareness regarding information security among academic and administrative staff.
  • Maintenance and operation of protection systems against viruses and advanced cyberattacks.
  • Maintenance and operation of security systems for university websites and databases.
  • Categorizing and providing security solutions while developing new systems, existing systems and externally-sourced systems .

 

Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>