Âé¶¹´«Ã½

5708 results for Article
Research & Art
Graphic Design by Joosung Kang

ClimATE

ClimATE is an expanded exhibition and events programme across multiple sites and spaces in Aalto University’s Otaniemi Campus.

Research & Art
UWAS Banner 2019-2020

UWAS Course Call 2020-2022

University-Wide Art Studies (UWAS) is looking for courses for 2020-2022.

School of Chemical Engineering
Dipoli Käpy sisäänkäynti Kuva: Tuomas Uusheimo / Aalto-yliopisto

News of EECAT2020

Cancellation of the 4th International Symposium on Catalytic Science and Technology in Sustainable Energy and Environment (EECAT 2020)

School of Chemical Engineering
the Academic Committee

Abstract submission and personal data collection of EECAT2020 1

The abstract submission and personal data collection will be opened on 1st Nov. 2019.

School of Science
Unto Rautio

School of Science graduates in working life

Graduates from the School of Science at Aalto University have very good employment prospects in positions corresponding to their education. On this page, you can find information about employment and career development five years after graduation.

School of Engineering
Unto Rautio

School of Engineering graduates in working life

Our graduates are highly successful in finding jobs corresponding to their education – 98% are employed or entrepreneurs 5 years after graduation.

School of Electrical Engineering
Unto Rautio

School of Electrical Engineering graduates in working life

Graduates from the School of Electrical Engineering at Aalto University have very good employment prospects in positions corresponding to their education. On this page, you can find information about employment and career development five years after graduation.

Cyber Security
Cyclists

A18 Compliance

The compliance (ISMS A18) binding guideline outlines issues related to compliance from the point of view of information security. Aalto University's operations are governed by a very wide range of different regulations and legislation. In addition to legislation, official regulations and contractual obligations can create requirements for activities that are taken into account as part of Aalto University's activities

Cyber Security
Two people walking in a tree-lined alley in Otaniemi

A17 Operational continuity

The key to ensuring the continuity of Aalto University’s operations is the continuity of processes. At Aalto University, operational continuity management means that we safeguard our core operations according to predefined models in normal conditions, during incidents in normal conditions and in emergency conditions. Continuity planning is aprocess that is an integral part of Aalto University’s operations, processes, and services.

Cyber Security
Otaniemi Âé¶¹´«Ã½ in the summer

A16 Information security incident management

Information security incident management includes defining responsibilities, preparing for information security incidents, identifying vulnerabilities and responding to incidents and learning from them. An information security incident can be intentional or unintentional. As a result of the incident, the integrity, confidentiality or level of availability of the information and services under the organization's responsibility has been compromised or may be compromised.

Cyber Security
Aalto-yliopiston kauppakorkeakoulun opiskelijoita istuu työskentelmässä tietokoneen ääressä

A15 Supplier relationships

Supplier relationships (ISMS A15) binding guideline defines how Aalto University takes care of the security of supplier relationships. The guideline also describes how services are supervised and how changes can be made.

Cyber Security
Four students studying together. Three of them have their computer and one is having papers in front of them.

A14 System acquisition, development and maintenance

System acquisiton, development and maintenance (ISMS A14) binding guideline defines security and privacy guidelines for information systems in Aalto university. The guideline also describes usage of test data as well as secure development and support processes.

Cyber Security
Poikkeustilanne-kuvitus

A13 Communications security

Communications security (ISMS A13) binding guideline defines the permitted management and use of Aalto University's networks. The guideline also describes the protection of data transmission, communications and non-disclosure agreements

Cyber Security
Computer and a padlock, security and privacy illustration by Matti Ahlgren, Aalto University

A12 Operational security

Operational security (ISMS A12) illustrates the principles of governing the secure use of IT systems and the monitoring of data processing operations. Guideline defines operational security's responsibilities and processes.

Cyber Security
2020_Computer_Science_building_photo_Matti_Ahlgren_Aalto_University-8

A11 Physical and environmental security

Physical and environmental security (ISMS A11) binding guideline illustrates how physical environmental cyber security needs to be taken care of. This guideline defines facility protection levels, access rights processes, protection of physical devices and processing of classified materials.

Cyber Security
Creative Sustainability students gathered around a laptop

A10 Encryption

Encryption (ISMS A10) binding guideline defines why and when it is required to use encryption. Guideline also deals with principles of encryption key management. Technologies used for encryption are decided by Aalto Cyber security team.

Cyber Security
Opiskelijat kannettavan tietokoneen ääressä. Kuva: Unto Rautio / Aalto-yliopisto

A9 Access control

Access control (ISMS A9) binding guideline defines requirements and processes for Aalto University usernames and access control. Access control binding guideline outlines how access is restricted and monitored to Aalto systems and spaces where confidential data is stored or processed.

Cyber Security
Aalto-yliopiston logo

A8 Asset management

Asset management (ISMS A8) binding guideline defines what are assets in Aalto point of view and how these assets can be used. Assets include for example terminal devices, data systems and data.

Cyber Security
Oppimiskeskus

A7 Human resources security

This binding guideline (A7 Human resources security) describes the practices related to human resources security in terms of information security.

Cyber Security
Aalto University / students sitting in armchairs / photo: Unto Rautio

A6 Organization and responsibilities of information security in Aalto university

Information security and data protection are involved in the daily work and studies of every Aaltoer at Aalto University. The organization and responsibilities of information security at Aalto University (ISMS A6) binding guideline describes information security responsibilities and obligations related to different roles.