Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Security Checklist

    • Home
    • Modules
    • Research Methods
    • Cybersecurity in Social Work
    • Security Checklist

    SECURITY CHECKLIST

    Security checklist
    Vulnerability   Course  
      Yes/No – describe N/A
    1.      Data approval from Norfolk State University. If the student conducts primary data collection, check whether the student has obtained the approval from Norfolk State University Institutional Review Board (IRB).    
    2.      Data approval from external institutions. If the data collection occurs in other institutions, check whether an additional IRB approval is needed.    
    3.      Sign the consent form. Prior to the data collection, sample participants have to agree upon the participation by signing the informed consent form. Check whether an informed consent form was signed.    
    4.      Anonymize the data entry. Create a unique identifier to make the data entry anonymous. Keep the identifying information such as name, address, and telephone numbers in separate files. Check whether the dataset was anonymous.    
    5.      Be vigilant about physical security. Check documents containing sensitive data locked up.    
    6.      Be vigilant about the password policy. Check whether the computer installing sensitive data is password protected.    
    7.      De-sensitizing data before transmission via email. Check whether the data was encrypted prior to sharing.    
    8.      Utilize the “Quick Stego” tool to protect the sensitive data.    
    9.      Utilize the “WinHip” tool to protect the sensitive data.    
    10.  Report the sensitive data by ensuring the privacy and confidentiality.    

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved