Security Definitions

2-Factor Authentication

Auburn uses DUO Security to ask individuals for a secondary confirmation of their identity at log in using a physical device in their possession. This process is called 2-Factor Authentication. The physical device may be a smartphone or tablet using an app, a text message to a phone, pressing a hardware token device like a yubikey, or an automated voice call to landlines or cell phones. Since Auburn uses the "DUO" software to administer Auburn's instance of 2-factor, the instructions and screenshots below will be specific to the DUO interface and the DUO Mobile applications.

Duo Support Documentation

Firewall

A firewall is a filter for network traffic, being either network (hardware) or host (operating system) based. Depending on which types of traffic it allows or blocks, a firewall can reduce the risk of unwanted network intrusions ("hacking") as well as limit the spread of viruses and other computer security compromises.

Qualys (Vulnerability Management)

Qualys is a commercial vulnerability and web application scanner. It can be used to proactively locate, identify, and assess vulnerabilities so that they can be prioritized and corrected before they are targeted and exploited by attackers. Auburn University uses Qualys to scan all administrative networks on a regular basis for known discoverable vulnerabilities. These scans are performed periodically from hosts within the Auburn network.

Qualys can also be used to scan for vulnerabilities in web applications. The Qualys Web Application Scanner (WAS) focuses on web application vulnerabilities, such as the industry-standard Open Web Application Security Project Top 10 list, to categorize the most critical risks faced by web apps. The Qualys Web Application Scanner finds these vulnerabilities, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF) and URL redirection.

Splunk (Centralized Logging)

Splunk searches, monitors, and analyzes machine-generated big data via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations.

Splunk as a Service

The Splunk service includes:

  • Direct access to search your logs
  • All software licenses and annual maintenance, server hardware, and storage
  • 18 months of log retention
  • 6 months of log backup
  • System administration support for the servers and storage
  • Periodic log volume reports and alerts
Last Updated: May 22, 2018