Skip to Main Content Skip to Main Navigation Skip to Footer
UNG Logo
  • Info For...
    • Accepted Students
    • Current Students
    • Parents & Family
    • Faculty & Staff
    • Alumni
    • Business & Community
    • International Students
  • Quicklinks
    • Directories
    • myUNG
    • Academic Catalogs
    • Athletics
    • Banner
    • Bookstore
    • Calendars
    • Campuses & Maps
    • Continuing Education
    • D2L
    • Employment / HR
    • IT Service Desk
    • Libraries
    • UNG Foundation
  • Admissions
  • Corps of Cadets
  • Academics
  • Cost & Aid
  • Student Life
  • News & Events
  • Athletics
  • About Us

Find the most up-to-date information on the Presidential Search site.

Information Technology
  • Get Started - IT Resources
    IT Success Guide Student Employee Guide Password Management
    Faculty/Staff Remote Work Toolbox Student Remote Work Toolbox
    Connectivity Resources Software Portal
  • Services
  • Security
    Information Security
    Phishing Awareness
    Bulletin
  • FAQ
  • Contact
    1. UNG
    2. About Us
    3. Information Technology

    What is Information Security

    To assist the Division of Information Technology in achieving its vision, Information Security MUST be considered by each and every member of the University community. So, what is Information Security? Information security can be defined as the protection of information and the systems and hardware that use, store, and transmit that information. Unfortunately, this pursuit is not a completely achievable pursuit. However, there are three objectives that will assist the University in achieving the best results for the effort expended, which are to minimize the loss of:

    • Confidentiality – preventing the intentional or unintentional unauthorized disclosure of data.
    • Integrity – ensuring no modifications to data by unauthorized personnel or processes, and ensuring internal and external data are consistent and accurate.
    • Availability – ensuring the reliable and timely access to data or computing resources by appropriate personnel.

    To access the Information Security Awareness Primer please visit Information Security, Security Awareness and Training at MyUNG for a more thorough introduction to Information Security! Other areas of interest located at MyUNG are:

    Governance

    Why do we need IT policies and what are they? Policies define the strategic goals for the University. Management defines the scope, distributes, and maintains the policies, which must be unambiguous because adherence to the policies is mandatory. That is, a policy is a directive that provides an effective and achievable direction for information security goals. Access to these policies may be obtained by visiting the Information Security, Governance link at MyUNG.

    Phishing Awareness

    Have you ever heard of phishing? To learn more about this prevalent scam, read over our phishing awareness webpage.

    UNG Community Resources

    (login required)

    • Self Service Portal
    • Password Portal
    • Software Portal
    • IT Policies
    • USG IT Handbook
    • Distance Education Technology Integration (DETI)

    Incident Response

    An incident is an unusual occurrence or breach in the security of a computer or network system or a violation of a standing policy, which may have an actual or potential adverse affects on an information system. It is important for organizations and home users alike to have an incident response plan in place and to know how and who to contact in the event you witness an incident or violation of a security policy.

    In an effort to provide a means to communicate computer and network security concerns, the University of North Georgia is working on providing this form online for your convenience. To report an incident, visit the Information Security, Incident Response link at MyUNG to begin!

    Business Continuity

    The continuity of operations is the preparation, processes, and practices required to ensure the University continues operating after having faced a major disruption of operations. To achieve this, the University must identify, select, implement, test, and update procedures and processes necessary to protect critical business processes from the effects of a major disruption and to be able to restore the business processes in a timely manner. This topic often within the security circles also includes disaster recovery planning, which addresses the detail process for recovering information or an IT system in the event of a catastrophic disaster such as a fire…. To learn more, visit the Information Security, Business Continuity link at MyUNG.

    Risk Management

    Managing risks is the process of identifying and measuring security risks associated with an information system, and controlling and reducing those risks to an acceptable level. Often, risk management is applied to business continuity, business impact analysis, and disaster recovery. The objective is to eliminate, reduce or mitigate the instances of risk. To do this requires and understanding of threat, vulnerability, and controls….To learn more, visit the Information Security, Risk Management link at MyUNG.

    Security Awareness Training

    Interested in learning about viruses, Trojans, zombies, and bot-nets are? Want to lean how to better secure you computer for yourself and your family? Do you want to know more about Information Security? Visit the Information Security, Security Awareness Training link at MyUNG to begin!

    Contact Information

    If you need to contact a member of the Information Security staff, please contact the helpdesk@ung.edu or visit MyUNG for further information.

    Thank you for assisting us in providing a more secure computing experience!

    Contact UNG IT

    For IT assistance, email helpdesk@ung.edu or call 706-864-1922

     

    UNG Logo
    • Contact Us
    • Request Information
    • Quick Facts
    • Campus Maps & Directions
    • Student Consumer Information
    • Campus Safety
    • Emergency Information
    • Employment/HR
    • UNG Policies & Procedures
    • UNG Alumni Association
    • UNG Foundation
    • Ethics & Compliance Hotline
    • Human Trafficking Notice
    • Equal Empl. Opportunity

    © 2023 The University System of Georgia and the University of North Georgia.

    UNG follows the section 508 Standards and WCAG 2.0 for web accessibility. If you require this content in another format, please send an email to the ADA Coordinator.

    Use of military-themed imagery does not constitute endorsement by the U.S. Department of Defense.

    • Accreditation
    • Accessibility
    • Privacy Policy
    Establishing Connection...
    AskNigel