Information and Infrastructure Assurance (IIA) oversees the big picture view of information technology (IT) security at the University of Michigan.
- Identity & Access Management
Identity and Access Management (IAM) provides you with a unique online identity to use in accessing U-M computing resources.
- IT Security Consulting
A highly skilled information security professional from ITS will perform or assist with IT security work tailored to unit requirements on a short or long-term basis.
- IT Security DRBC Planning
The IT Security Disaster Recovery/Business Continuity Planning service helps units identify risks and threats to unit operational missions and institutional data, and puts plans in place to minimize any potential interruptions.
- IT Security Essential
This suite of services provides a foundation of protection for university IT resources, including those that enable teaching, learning, research, and administration.
- IT Security Ethical Hacking
Ethical hacking is an advanced, offensive form of security testing designed to provide a deep technical analysis of a target environment’s vulnerability to exploitation and attack.