We deliver data and technology services and, through collaboration with partners, transform the role of Information Technology to advance the UC mission. From a security and privacy perspective, we are not only concerned about the confidentiality, integrity and availability of the data contained in the systems embedded deep in the nation’s critical infrastructure, but also of our personal information.
NIST leads national and international consensus standards activities in cryptography, biometrics, electronic credentialing, secure network protocols, software and systems reliability, and security conformance testing—all essential to accelerate the development and deployment of information and communication systems that are interoperable, reliable, secure and usable.
This may mean breaking down a large problem or an end goal into multiple steps so that the stakeholder can see exactly what it will take to accomplish it. Taking time to define and explain what’s needed can help an IT department better manage stakeholders’ expectations and maximize the department’s hours in the best way possible, according to Keri Peterson, IT business analyst and project manager at University of Northwestern-St.
As an IT graduate, students can work in area such as operations, database administration, PC support, networking and communications, internet design, IT management, business analysis, system design, system development and programming, software engineering and technical support.
The Information Technology Department does not provide support for the installation, repair, or maintenance of computer hardware, or the installation and configuration of computer software (including the operating system) for personally owned computers.