Security

OpenVPN logo

The Virtual Private Network service allows you to securely access resources at UIC over a non-UIC Internet connection. While connected to the VPN, the client software works with the operating system to determine when you are accessing an Internet location that the client should protect. When you are accessing such a location, the VPN client encrypts the data.

Audience: Faculty, Staff, Students, IT

Backup services allow campus staff and faculty to protect the files stored on computers and mobile devices.  These services are designed to allow for the restoration of data in case the file is lost or the computer is damaged in some way. 

Audience: Faculty, Staff

Bluestem is the primary single sign-on authentication method supported at UIC. Only UIC users can authenticate via Bluestem.

Shibboleth (SAML) is a framework that allows applications to connect to various authentication services on the Internet (including UIC's Bluestem SSO). Shibboleth can be used to allow access to your application from any Organization on the Internet that supports SAML. Conversely, it can also be used to allow UIC users access to third party applications (that support SAML) using their UIC credentials. Note that such third party applications must be registered with the InCommon Federation:

https://incommon.org

For more information regarding the yearly InCommon Federation fee structure see incommon.org/fees.html (sponsored partners).

Shibboleth Discovery Service - A discovery service is a web page that asks you to select your institution, after which you are redirected to that institution's authentication service. The discovery service for uofi.box.com (hosted by illinois.edu) for instance asks you to select one of UIUC, UIC, or UIS. If you misclicked and selected the wrong institution you can reset your selection for the illinois.edu discovery service by going to this link:

https://discovery.illinois.edu/discovery/DS

Audience: IT

A server certificate is needed to enable secure-socket layer (SSL) operation on a server (typically a web server) which verifies the server's identity to clients (typically web browsers). To avoid warning dialogs issued by web browsers, the certificate must be digitally signed by a trusted third party, a Certificate Authority (CA) such as Comodo, VeriSign, or Thawte, whose signatures are recognized by the browser. 

Audience: Faculty, Staff

ACCC Security's mission is to protect the UIC community from active and potential security threats.

Audience: Faculty, Staff, Students, IT

Encryption provides an easy-to-use and secure means to protect Sensitive and High Risk data on computers. Laptops and desktop computers can be lost, stolen or have hard drives removed. Many other scenarios can also jeopardize the privacy and security of your important data.   

Users with FERPA, HIPAA, intellectual property, research data, and other sensitive information can use encryption to protect their data. In many cases, encryption is required to comply with the UIC IT Security Program, legal, regulatory, or grant requirements.  

Solutions Available

There are 2 offerings within the Encryption service 

  • PGP:  PGP software provides easy-to-use and secure encryption to protect sensitive data on laptops or PCs for Faculty and Staff.
  • MBAM for Departments:  Microsoft BitLocker Administration and Monitoring provides reporting and monitoring capabilities for departments to ensure compliance of departmental assets.
Audience: Faculty, Staff, IT

There are daily data usage limitations on the use of Res-Net and the UIC public wireless networks on campus, as well as other restrictions, which are described in UIC Wireless and Res-Net Policy.

Computers and other devices can be filtered and suspended from campus use for many reasons.  Computers are routinely filtered for any of the use excessive bandwidth, violation of the ACCC Acceptable Use Policy, violation of Res-Net terms of service or due to a virus or infection detected.

Audience: Faculty, Staff, Students, IT

Nessus Security and Vulnerability Scanner is a scan engine with a web-based interface that can be used to perform an external scan of your computer system. This comprehensive scan looks for potential vulnerabilities that could be used by remote attackers to control or access sensitive data on a system.  

Audience: Faculty, Staff, Students, IT

ACCC maintains and operates the StarTel campus-wide public security system. The system is best identified as the 8-foot, blue-light bollards or posts located throughout the public walkways on the East and West campus. StarTel units offer direct access to the UIC Police Department; press the red call button to call for assistance.

ACCC’s West Campus Data Center provides a server hosting environment including UPS and Generator backup power. This ACCC controlled space is operated as a university HIPAA covered entity, departmental server resource, in order to provide secure and reliable services for university servers, computing, and data applications.

Audience: Faculty, Staff, IT