13 620
editací
Bez shrnutí editace |
Bez shrnutí editace |
||
(Není zobrazeno 22 mezilehlých verzí od 2 dalších uživatelů.) | |||
Řádek 1: | Řádek 1: | ||
<languages /> | <languages /> | ||
== UP network | == UP network securit y == | ||
Even though UP computer network is protected against internet attacks (port filtration, Intrusion Protection system). However, only our security precautions cannot prevent mutual damage of the computers within the UP network. Therefore, we appeal to students and employees to protect their computers against computer viruses and worms. | Even though UP computer network is protected against internet attacks (port filtration, Intrusion Protection system). However, only our security precautions cannot prevent mutual damage of the computers within the UP network. Therefore, we appeal to students and employees to protect their computers against computer viruses and worms. Computers. | ||
== Security of network devices == | == Security of network devices == | ||
Each insufficiently secured computer represents a risk not only for its users, but also for other users of the computer network. If your computer is infected by computer viruses or worms, it can easily become a target for computer hackers who might use your device to attack other network systems. Therefore, the computer security is a '''mandatory requirement''' for every UP network user. This is based in Rector's directiveː | Each insufficiently secured computer represents a risk not only for its users, but also for other users of the computer network. If your computer is infected by computer viruses or worms, it can easily become a target for computer hackers who might use your device to attack other network systems. Therefore, the computer security is a '''mandatory requirement''' for every UP network user. This is based in Rector's directiveː | ||
''"Every end instrument connected to UP computer network must be secured in appropriate manner, by suitable system configuration, by application of security patches, etc. Should there be an infected, insufficiently secured end instrument, computer network administrator can suspend the right to access to the UP computer network."'' | ''"Every end instrument connected to UP computer network must be secured in appropriate manner, by suitable system configuration, by application of security patches, etc. Should there be an infected, insufficiently secured end instrument, computer network administrator can suspend the right to access to the UP computer network."'' | ||
[http://www.upol.cz/fileadmin/user_upload/dokumenty/2011/SRB3-11-14.pdf Směrnice rektora UP B3-15/7-SR,] Article 7, paragraph. 3 | [http://www.upol.cz/fileadmin/user_upload/dokumenty/2011/SRB3-11-14.pdf Směrnice rektora UP B3-15/7-SR,] Article 7, paragraph. 3 | ||
Řádek 15: | Řádek 14: | ||
'''Students''': All the necessary security measures must be set up by students themselves before connecting to university network. | '''Students''': All the necessary security measures must be set up by students themselves before connecting to university network. | ||
=== Essential security measures: === | === Essential security measures: === | ||
<ol style="line-height: 20.8px;"> | <ol style="line-height: 20.8px;"> | ||
<li>'''You should use only updated''' antivirus program. Antivirus programs protect computers against most of the viruses, worms and | <li>'''You should use only updated''' antivirus program. Antivirus programs protect computers against most of the viruses, worms and Trojan horses. Palacký University uses ''MS Forefront''. Students are advised to use ''AVG'', ''Avastǃ'' or ''NOD32''.</li> | ||
<li>'''Keep your operating system updated.'''Microsoft publishes list of updates on their website on regular basis. Apple publishes updates for their products regularly as well. These updates deal with existing security flaws, which can | <li>'''Keep your operating system updated.'''Microsoft publishes list of updates on their website on regular basis. Apple publishes updates for their products regularly as well. These updates deal with existing security flaws, which can be used by hackers and computer viruses.</li> | ||
<li>'''Turn on your Firewall'''Firewall is a security gate between your computer and dangerous contents on the internet. Furthermore, firewall restricts users and programs to access your computer according to specific rules. If you're using Windows OS, your firewall should be turned on by default.</li> | <li>'''Turn on your Firewall'''Firewall is a security gate between your computer and dangerous contents on the internet. Furthermore, firewall restricts users and programs to access your computer according to specific rules. If you're using Windows OS, your firewall should be turned on by default.</li> | ||
Řádek 44: | Řádek 42: | ||
**right-click the USB drive you want to check and choose option ''check by antivirus program''. | **right-click the USB drive you want to check and choose option ''check by antivirus program''. | ||
'''8.''' All university employees should contact their '''computer network administrator''' if they suspect any computer to be infected ( | '''8.''' All university employees should contact their '''computer network administrator''' if they suspect any computer to be infected (contact Computer Center preferably through Helpdesk at [http://portal.upol.cz/ http://portal.upol.cz]). | ||
[[Category: | [[Category:Information Technology]] | ||
[[Category:Computer Network|Computer Network]] |