Skip to main content Skip to navigation
Fake To Drivers Spot Guide d How License I A Infographic dZtwtqU Fake To Drivers Spot Guide d How License I A Infographic dZtwtqU
Information Technology Services

Fake To Drivers Spot Guide d How License I A Infographic dZtwtqU

As part of WSU’s Information Technology Services, our Information Security Services (ISS) group works around the clock to protect the data resources of students, faculty and staff, as well as protecting the confidentiality, integrity, and availability of information important to the university’s mission.

Infographic License Guide Drivers Spot Fake To How A d I ISS is responsible for managing security risks to information technology assets at the University. The strategic objectives include: data loss prevention, the improved security of system and network services, proactive risk management, and crisis and security incident management.

Find information on topics such as Incident Reporting Procedures, Policies and Guidelines, and Security FAQ’s




Chinese Government Hackers Reportedly Stole Trove of Sensitive U.S. Naval Data:
A new report claims that Chinese government hackers stole more than 614 gigabytes of sensitive data from a U.S. Navy contractor. The attacks occurred in January and February and were conducted by a division of the Chinese Ministry of State Security. The target was a contractor that works for the Naval Undersea Warfare Center and conducts research and development for submarines and underwater weapons systems. The stolen data is said to include secret plans to develop a new submarine-launched anti-ship missile as well as information about sensors and submarine cryptographic systems. Chinese hackers have frequently targeted U.S. military contractors and have previously succeeded in stealing information about the new F-35 stealth fighter, the advanced Patriot PAC-3 missile system, and other sensitive projects.

Entire Article:

WSU Analyst Remark:
The suspected Chinese state sponsored group has focused on engineering and maritime entities with malware designed to establish presence on victim networks and exfiltrate credentials and data, likely in support of Chinese political, military, and economic interests. Given recent tensions between China and the U.S., and China’s ongoing dispute with regional and global actors over the South China Sea, It is not a surprise that Chinese espionage actors demonstrate a high interest in maritime entities.

Washington State University
Washington State University
PO Box 641222
Pullman, WA 99164
  • Card Green mail Avoid Uscis Lottery Scam Fraud E qUwZxW7W
    cvyIEODSd9ds6M:How to Spot a Fake I.D. Infographic - Drivers License Guide