IUCC’s Cyber Unit safeguards Israel’s National Research & Education Network (NREN).
The IUCC Cyber Unit activities are governed by an inter-university steering committee that cooperates on joint procurement of network security programs for the academic community, resulting in significant cost savings for Israel’s universities.
Name of NREN/Project/Institute | Example Project Institute Homepage |
---|---|
Home | https://www.iucc.ac.il/ |
IUCC Cyber Unit | https://www.iucc.ac.il/computing-networking-infrastructure-division/iucc-cyber-unit/ |
IUCC's CERT | https://www.iucc.ac.il/computing-networking-infrastructure-division/iucc-cyber-unit/computer-emergency-response-team-cert/ |
Cyber Research | https://www.iucc.ac.il/computing-networking-infrastructure-division/iucc-cyber-unit/cyber-research/ |
NIST lab | https://www.iucc.ac.il/computing-networking-infrastructure-division/iucc-cyber-unit/national-cyber-testbed/ |
Portal | https://portal.iucc.ac.il/ |
Contact information (if public) | https://cert.iucc.ac.il/contact-us/ |
This is a template to help people fill in useful things for their inventory.
This is for Level 1 information, information which is already public or you are happy to make public, in order that others can easily find it.
You may put what you like here.
You may include a brief description of what your NREN, project or institute does.
This table is for information that may be helpful to include. Any information may be added as you wish.
Irrelevant ones may be removed.
Lines may be duplicated to refer to multiple documents.
E.g. you may provide a link to a list of policy documents, or you may provide several lines with links to various policy documents.
You may include any text/explanations you wish. Please don't include anything here that may be of use to an attacker.
Name of NREN/Project/Institute | Example Project Institute Homepage | |
---|---|---|
Example Intranet | Link to Intranet for this project | |
ISM | Link to ISM for this project | |
Policy Documents | Link to policy docs for this project | |
Software Vulnerability handling | Link to procedure/web | |
Other incident Prevention | Incident handling | Contact information (if public) |