Skip to main content
School Logo Link
MENU
University of Florida
IT Info
For Students
For Faculty
For Staff
For Researchers
University of Florida
MENU
Services
Administrative and Business
AI Services
Communication and Collaboration
End-Point Computing
Infrastructure
IT Professional Services
Research
Security
Teaching and Learning
Get Connected
Connect to the VPN
Connect to WiFi
Gator Cloud Services
GatorLink Account Management
IT Service Management
Multi-Factor Authentication
Remote Work Resources
Get Help
Classroom Support
Information Security Office
Learning Spaces Support
Submit a Help Desk Ticket
Troubleshooting Common Problems
Visit Help Desk
Log into
Canvas
DocuSign
Dropbox
GatorMail
Google Drive
HiPerGator
Microsoft Copilot
Microsoft Office Online
Microsoft Teams
OneDrive UF
Zoom
About UFIT
Current Project Portfolio
Governance
IT Policies
Opportunities
Organization
Strategic Plan
Student Technology Fee Grants
UFIT Brand
Unizin
Information Security
Quick Links
Risk Assessment
Fast Path Solutions
UF Data Guide
Find Your ISA/ISM
Information Security Leadership
UF Cybersecurity Framework (CSF)
Unit Security Plans
Information Security Training
How to De-Identify Data
IRM Toolkit
IRM FAQs
Risk Assessment
Report an Incident
About Us
Policies
Security Guidance
Learn Security
Audiences
Students
Faculty & Staff
IT Staff
it.ufl.edu
Security
Learn Security
Games and Contests
Social Engineering Flip
Social Engineering Flip
Back
Quick Links
Risk Assessment
Fast Path Solutions
UF Data Guide
Find Your ISA/ISM
Information Security Leadership
UF Cybersecurity Framework (CSF)
Unit Security Plans
Information Security Training
How to De-Identify Data
IRM Toolkit
IRM FAQs
Risk Assessment
Report an Incident
About Us
Policies
Security Guidance
Learn Security
Audiences
Students
Faculty & Staff
Risk Assessment
Creating an Information System / Data Flow Diagram
Review Request
Fast Path Solutions
Suggest a Fast Path Solution
UF Data Guide
Integrated Risk Management (IRM)
How to De-Identify Data
IRM Toolkit
IRM FAQs
Traveling Abroad
UF Data Storage Solutions
IT Staff
Menu
Close
Back
Quick Links
Risk Assessment
Fast Path Solutions
UF Data Guide
Find Your ISA/ISM
Information Security Leadership
UF Cybersecurity Framework (CSF)
Unit Security Plans
Information Security Training
How to De-Identify Data
IRM Toolkit
IRM FAQs
Risk Assessment
Report an Incident
About Us
Policies
Security Guidance
Learn Security
Audiences
Students
Faculty & Staff
Risk Assessment
Creating an Information System / Data Flow Diagram
Review Request
Fast Path Solutions
Suggest a Fast Path Solution
UF Data Guide
Integrated Risk Management (IRM)
How to De-Identify Data
IRM Toolkit
IRM FAQs
Traveling Abroad
UF Data Storage Solutions
IT Staff
Menu
Close
Suspicious
Harmless
Your score is :
0
Press any key on your keyboard to continue or click the next button
Next ›
Game Over! You scored