Slide 37 of 58
Notes:
Network based collaborations require access to shared information. This access can be easily compromised by the problem areas listed. Expanding the UW’s computing and networking horizon to include sites beyond our scope of authority introduce new security exposures. This is also true of systems more closely related to university work. An example is the growing number of student system administrators who run their own Linux and NT multi-user computers in the Dorms.