Services We Provide
|Network Security Services provides the Southern University community with the tools and resources needed to maintain the security of information and the technology that we use to manage it. We keep up with outbreaks that may affect SU network, ensuring that users are aware of possible threats and implement ways to protect them appropriately.
What we do to protect the network is analyze daily network scans and investigate network traffic, while aiding in emergency response and disaster recovery by tracking down and resolving serious incidents, and coordinate with the campus judiciary system and law-enforcement agencies.
We evaluate the security of Southern University's computers, networks, and data as well as personal workstations through general network scans and other methods to determine current vulnerability status. Also, we educate the SU community on how to safely use technology by identifying and promoting the "best practices" regarding security of data and systems by sending alerts for current viruses, attacks, and other security vulnerabilities.
Research is also done to implement new ideas for classes and security initiatives, while reviewing new communications applications and suggesting secure applications for use at the University and in University projects. We introduce campus standards for security, and review applicable policies and procedures in the context of these standards.
|Antivirus (Antivirus Policy)|
|We recommend that users of the SU network install antivirus software to their computers. Most viruses will be caught by antivirus as long as the antivirus software is kept up to date. It is absolutely crucial that users run antivirus software on their computers. SU provides staff and faculty with a antivirus software for University -owned computers. Students are highly recommended to purchase their own antivirus software and installing it on their computers, if not students have the opportunity to download one free of charge.|
|Spam is the sending of unsolicited e-mail. With the abundant increase in spam we have installed the Interceptor, a spam filter device. The Interceptor does exactly what says, it intercepts any spam messages before it reaches your email inbox.|
|Spyware is unwanted software that performs certain behaviors on your computer, such as advertising, collecting personal information, or changing the configuration of your computer, without obtaining your consent. To prevent spyware, it is recommended that you install anti-spyware to your computer.
You may download spyware software free of charge. It is a security technology that helps protect Windows users from spyware and other potentially unwanted software. Known spyware on your PC can be detected and removed. This helps reduce negative effects caused by spyware including slow PC performance, annoying pop-up ads, unwanted changes to Internet settings, and unauthorized use of your private information. Continuous protection improves Internet browsing safety by guarding over fifty (50) ways spyware can enter your PC.
|Password Policies & Recommendations (Password Policy)|
|Password enumeration attacks are becoming more common on Windows workstations.
Recent increases in computer hacking and viruses worldwide have caused many systems to become exploited. Hackers often attempt to gain access to a computer by guessing all possible combinations of passwords. Using a modern PC, a hacker can normally break a simple password remotely in less than 60 seconds. Once broken, your password may allow someone to access your files.
Network Security Services suggest these requirements are met to ensure a good password:
|Investigations (Forensic Systems)|
|Network Security Services is in the process of monitoring the network to determine if there has been any illegal, unauthorized, or unusual activities from computers, laptops, servers, or office workstation that are using the SU network.
This will be done by computer forensics, it is the analysis of information contained within and created with computer systems and computing devices. It involves the preservation, identification, extraction, documentation and interpretation of computer data.
This can be for the purpose of performing a root cause analysis of a computer system that had failed or is not operating properly, or to find out who is responsible for misuse of computer systems, or perhaps who committed a crime using a computer system or against a computer system. Computer forensic techniques and methodologies are commonly used for conducting computing investigations in the interest of figuring out what happened, when it happened, how it happened, and who was involved.
|Firewall Management (Firewall Policy)|
|Network Security Services suggests you install or enable the Microsoft firewall before connecting to the network. A firewall is software or hardware that creates a protective barrier between your computer and potentially harmful content on the Internet. It helps guard your computer against hackers and many computer viruses and worms. A firewall works by examining information coming from and going to the Internet. It identifies and ignores information that comes from a dangerous location or seems suspicious. If you set up your firewall properly, hackers searching for vulnerable computers can't detect your computer.
When installing a Firewall you may visit the Microsoft Security Web site, it provides information about software firewalls made by other companies, as well as hardware firewalls and network routers. This information can help you select a firewall solution if you use an earlier version of Microsoft Windows, such as Windows NT, Windows Millennium Edition (Me), or Windows 98. Hardware firewalls are a good choice for versions of the Windows operating system prior to Windows XP. Windows XP includes an Internet Connection Firewall, which you can turn on. You must have administrator access to your computer to install either of these options.
|Wireless Network (Wireless Policy)|
|The Southern University's wireless networking services has a different method on how to access the internet. When accessing the internet using the wireless network users will be directed to an authentication page in order to provide better security services.
The authentication page is used to give access to the network to authorized users by verifying who they say they are and denying access to clients that cannot authenticate properly. Authorize users will have to provide their login and password; which is the same login as your blackboard account and your campus email account. The wireless network is available to all Southern University students, faculty, and staff.
|Security Network Assessment|
|The Network Security Services offers Security Assessments. Securing workstations, servers, and other devices in a University atmosphere can be a challenge. The SU network is constantly being probed for vulnerabilities. On top of that, new initiatives for security in Grant environments, Federal Regulations such as HIPAA, FERPA, and GLBA have required much more stringent guidelines for security.
We are available to all departments to schedule times and dates to assess your environment. This assessment includes identifying and documenting risks and vulnerabilities to your assets. We will also arrange a time to discuss strategies and/or methods for securing your environment and reducing your exposure to the outside world. This includes working with 3rd party vendors for application security.
Please contact NSS if you are interested in hearing more about how we can assist your department in developing, planning, and designing security protocols in your environment.
In order to use the computer resources and network services available at Southern University, students, faculty and staff must adhere to the policies and procedures defined and authorized by Technology and Network Services.
|For any further information or assistance relating to Network Security you may contact the Technology and Network Services Help Desk at 771-3935 ext 228 located in J. B. Moore Hall.|