EITC 2015 - Threats

  1. 16 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. 12 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. 8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  4. 7 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. 6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  6. 6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. 5 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. 5 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  9. 5 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  11. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  13. Windows and Flash

    What's up with still using Windows? It regularly has exploits and requires intervention. Or Abobe Flash?

    2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  14. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  15. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  16. IT staff thinking pessimistically

    The perception of everything being a threat. (Sundeep actually wrote this!)

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  17. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  18. Security devolves into an endless attempt to run down each individual user's IT infrastructure

    Security info shows up on pastebin, was it leaked from user A's Dropbox, user B's OneDrive or user C's Google Drive or the on campus store?

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  19. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  20. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google University of Maryland - Engineering
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1

EITC 2015 - Threats

Feedback and Knowledge Base