As the information technology services divisions develop a stronger sense of joint operational responsibilities, security will assume an increasingly visible role. A number of facets of security are either active now, or are in development now and will play a more visible role in the near future.
With sponsorship by the CIO, the state has conducted regular network scans over the last few years. These scans have as their primary intent the identification of any existing network security concerns, along with action steps to eliminate or minimize the identified risks.
Disaster Recovery and Continuity of Operations Planning are activities that help ensure a safe, secure operation of technology within Nebraska, even in the face of unexpected and/or damaging events. This is a shared service activity as noted in the Enterprise Solutions Planning portion of this website.
Various operational components of the information technology services divisions provide day-to-day security services. These services span a broad array of activities, including password management, data protection, network encryption, virus protection, network traffic management, among others.
Working with the Nebraska Information Technology Commission and its various councils, standards and guidelines related to security are under nearly constant consideration and development. Examples include identity management (authentication and authorization), e-mail attachment management, SPAM management, and remote access management.
For information on cyber security: Nebraska Cyber Security Center