Desktop Security Policy
The purpose of this policy is to secure CoB computers and the UNT network thereby
reducing the risk of external and internal security attacks and the liability associated
with the use of unlicensed software.
Desktop Security Policy
The policy identifies two types of computer users: those users who cannot self install
software to their machines and those users who can install software.
Users will be encouraged to consult with the CoB Business Information Technology Services
with regard to security and compatibility issues associated with any non-standard
software they install.
Default CoB Policy - Users cannot self-install software
The G. Brint Ryan College of Business standard Windows 10 software image will be "secured."
The term "secured" means that users will be able to perform the usual tasks on their
machines such as starting programs, opening and saving files, and most personal customizations
of desktop preferences. However, users will not be able to install any software on
their systems.
When individuals require software packages that are not in the standard image, the
CoB Computing Center's Technical Support Team will perform a short review of the computer
safety, licensing, and business necessity issues and assist in the installation of
those packages that pass the review. If a disagreement occurs on this review, users
can appeal to the CoB Director of Information and Learning Technologies. If the Director,
after consultation with the user and CoB Technical Support, authorizes the use of
the software, CoB Technical Support will assist with the installation.
This policy decreases the risks of "hacker" attacks via software with Internet connections,
i.e. instant messenger programs, peer-to-peer programs and virus attacks, since the
programs will not have the ability to modify the machine's environment.
Administrative CoB Users - Have complete access to computers
For those faculty and staff whose research, teaching, or job duties involve the installation
of software or other changes to their desktop systems, a waiver to this policy can
be secured by obtaining permission from the CoB Director of Information and Learning
Technologies. Once users have obtained the waiver, they will be granted complete administrative
access to their machines.
Importance of Security
While the Internet has transformed and greatly improved many people's lives, this
vast network and its associated technologies have opened the door to an increasing
number of security threats. The consequences of attacks can range from the mildly
inconvenient to the completely debilitating. Important data can be lost, privacy can
be violated, and your computer can even be used by a hacker to attack other computers
on campus or across the Internet.
Threats to Data
As with any type of crime, threats to the privacy and integrity of data come from
a small minority. However, while a car thief can steal only one car at a time, a hacker
working from a single computer can generate damage to a large number of computer networks
that can wreak havoc on our campus, and even country's, information infrastructure.
Whether you want to secure a car, a home, a campus, or a nation, a general knowledge
of security threats and how to protect yourself is essential.
- Viruses
Viruses are the most widely known security threat because they often garner extensive
press coverage. Viruses are computer programs that are designed to replicate themselves
and infect computers when triggered by a specific event. For example, viruses called
macro viruses attach themselves to files that contain macro instructions (routines
that can be repeated automatically, such as sending email) and are then activated
every time the macro runs. The effects of some viruses are relatively benign and cause
annoying interruptions such as displaying a comical message when striking a certain
letter on the keyboard. Other viruses are more destructive and cause such problems
as deleting files from a hard drive or slowing down a system. A computer can be infected
with a virus only if the virus enters through an outside source - most often an attachment
to an email or a file downloaded from the Internet. When one computer on a network
becomes infected, the other computers on the network - or for that matter other computers
on the Internet - are highly susceptible to contracting the virus.
- Trojan Horse Programs
Trojan horse programs, or Trojans, are delivery vehicles for destructive computer
code. Trojans appear to be harmless or useful software programs, such as computer
games, but are actually enemies in disguise. Trojans can delete data, mail copies
of themselves to e-mail address lists and open up computers to unauthorized access
from the Internet. Trojans can be contracted only by copying the Trojan horse program
to a computer, downloading from the Internet or opening an email attachment.
- Vandals
Web sites have come alive through the development of such software applications as
ActiveX and Java Applets. These applications enable animation and other special effects
to run, making web sites more attractive and interactive. However, the ease with which
these applications can be downloaded and run has provided a new vehicle for inflicting
damage. Vandals can take on the form of a software application or applet that causes
destruction of various degrees. A vandal can destroy a single file or a major portion
of a computer system.
- Attacks
Innumerable types of network attacks have been documented and they are commonly classified
in three general categories: (1) reconnaissance attacks, (2) access attacks, and (3)
denial of service (DoS) attacks.
- Reconnaissance attacks are essentially information gathering activities by which hackers
collect data that is used to later compromise networks. Usually, software tools, such
as sniffers and scanners, are used to map out and exploit potential weaknesses in
home computers, web servers and applications.
- Access attacks are conducted to gain entry to e-mail accounts, databases and other
confidential information.
- DoS attacks prevent access to all or part of a computer system. Sending large amounts
of jumbled or other unmanageable data to a machine that is connected to the Internet,
blocking legitimate traffic from getting through, usually achieves them. Even more
malicious is a Distributed Denial of Service attack (DDoS) in which the attacker compromises
multiple machines or hosts and uses them to attack other computers.
- Data Interception
Data transmitted via any type of network can be subject to interception by unauthorized
parties. The intercepting perpetrators might eavesdrop on communications or even alter
the data packets being transmitted. Perpetrators can use various methods to intercept
data. IP spoofing, for example, entails posing as an authorized party in the data
transmission by using the Internet Protocol (IP) address of one of the data recipients.