Skip to Content Skip to Footer

Information Security

Clayton State University recognizes that information and their assets are critical to business functions. It is the responsibility of all users to ensure the safeguarding of business assets as our front line of defense. Information Security works with the Departments of Information Technology & Services in achieving its strategic vision as a partner to the campus community and educator in security awareness and training.

What is Information Security?

The term Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

The Department of Information Security supports the mission of Clayton State University by building a culture of security awareness and risk management to protect the privacy, confidentiality, integrity, and availability of student, faculty, and staff information in partnership with Data Governance:

  • Confidentiality: Preventing the intentional or unintentional unauthorized disclosure of data.
  • Integrity: ensuring no modifications to data by unauthorized personnel or processes and ensuring internal and external data are consistent and accurate.
  • Availability: ensuring the reliable and timely access to data or computing resources by personnel.   

What is Cybersecurity?

Cybersecurity is protecting information by preventing, detecting, and responding to attacks.

The cybersecurity landscape continues to change with threat actors becoming more aggressive in their attacks. IT Security is committed to securing the University’s information assets by creating a more educated and secure campus through institutional partnerships.

Cybersecurity is everyone's responsibility.

Security Awareness

Learn to identify common techniques


Phish Tank

Identity Theft Protection

Social Engineering
Internet of Things


Incident Reporting?

All users of information technology owned or managed by CLSU must immediately report suspected information security incidents (including but not limited to virus infections and computers exhibiting behavior consistent with a compromised machine) to the HUB:

Alerts & News