Computing & Communications Services

Lock

Security

Topic1The Security Roadmap

Five concentric rings symbolise 5 levels of security: Trusted Facilities, Trusted Networks, Trusted Systems and Applications, Trusted Devices, and Trusted Users.

The Security Roadmap is a comprehensive action plan intended to continually strengthen our security posture and protect the University from the cyber security threats it faces daily. The plan utilizes a “defense in depth” approach, offering multiple layers of protection and never relying on a single technology or process to protect our most important assets: our users and our data.