Security Tools & Documentation
One major concern for computer security is the compromise of Personally Identifiable Information (PII). When PII is discovered in a security breach, identity theft becomes a real target for cyber criminals to attack.
When security incidents are reported on campus, OIT is legally obligated to scan the compromised host for PII to identify any possible concerns. To do that, our technicians use a tool called Helix.
For information on how to use Helix, see the Reference Manual.
Helix v1.9 Forensic & Security Tools (Live Bootable CD Image)*
*This download link may not work with Google Chrome.