The Network Operations group works with Information Security when engineering security into the network as well as protecting the computers and people that use the network. Security measures start at the Internet gateways and are scattered throughout all levels of the network. However, no system is foolproof. There is no one set formula for security nor one software package you can buy to solve the problem. Here at WPI, we use a method of security which the information security community refers to as "Defense in Depth." This process utilizes security measures starting at the phyical layer and proceeds through to the application layer. This method, with good system administration, provides a safe and open atmosphere for WPI's academic mission.
For more information about security at WPI, please visit the Information Security website