13 887
editací
Bez shrnutí editace |
Bez shrnutí editace |
||
Řádek 5: | Řádek 5: | ||
Even though UP computer network is protected against internet attacks (port filtration, Intrusion Protection system). However, only our security precautions cannot prevent mutual damage of the computers within the UP network. Therefore, we appeal to students and employees to protect their computers against computer viruses and worms. | Even though UP computer network is protected against internet attacks (port filtration, Intrusion Protection system). However, only our security precautions cannot prevent mutual damage of the computers within the UP network. Therefore, we appeal to students and employees to protect their computers against computer viruses and worms. | ||
== | == Security of network devices == | ||
Each insufficiently secured computer represents a risk not only for its users, but also for other users of the network. If your computer is infected by computer viruses or worms, it can also become an easy target for computer hackers who might use your device to attack other systems in the network. Therefore, the computer security is a mandatory requirement for every UP network user. This is based in Rector's directiveː | Each insufficiently secured computer represents a risk not only for its users, but also for other users of the network. If your computer is infected by computer viruses or worms, it can also become an easy target for computer hackers who might use your device to attack other systems in the network. Therefore, the computer security is a mandatory requirement for every UP network user. This is based in Rector's directiveː |