Security

It very important that you maintain your server and/or desktop so that it is as secure as possible.  Having your computer compromised can threaten you and others on the network.  When a computer is compromised the following is possible:

  • Your personal identification information can be stolen
  • Other's personal identification information can be stolen
  • Your computer can be turned into a SPAM system
  • Your computer can stage various internet attacks (e.g. DoS- Denial of Service)
  • Passwords can sniffed on the network
  • Spyware/Trojans/Netbots can be put in place and difficult to detect
  • The local network you are on could be disabled

Basic steps you need to take:

Also, make sure that you are handling documents, files and data properly:

Restricted Data = UCSC’s most sensitive information.

Examples:

  • Social Security Numbers (SSN)
  • Driver's license and state ID card numbers
  • Financial account and credit card numbers
  • Personal medical and medical insurance information
  • Passwords
  • Other info with a similar level of sensitivity or risk

Common places where restricted data may be found:

http://its.ucsc.edu/security/pii.html#common

Restricted data requires the highest level of security.

  • Always access securely. Use eduroam or Campus VPN when you’re on wireless.
  • Don’t store on local devices (phones, laptops, desktops, etc.).
  • Don’t email, text, or post it online.
  • Don’t store in Google or other cloud/online services.
  • Only share with authorized people. Restricted data is protected by law. Unauthorized access must be reported.

 

Online Tools to Test your Computers Security

PBSci Information Technology Group 2013