What Is Secure Computing? Computer Security (Also Known As Cyber Security or IT Security) Is Information
What Is Secure Computing? Computer Security (Also Known As Cyber Security or IT Security) Is Information
What Is Secure Computing? Computer Security (Also Known As Cyber Security or IT Security) Is Information
If you don't take basic steps to protect your work computer, you put it and all the
information on it at risk. You can potentially compromise the operation of other
computers on your organization's network, or even the functioning of the network
as a whole.
1. Physical security:
Technical measures like login passwords, anti-virus are essential. (More about
those below) However, a secure physical space is the first and more important line
of defense.
Is the place you keep your workplace computer secure enough to prevent theft or
access to it while you are away? While the Security Department provides
coverage across the Medical center, it only takes seconds to steal a computer,
particularly a portable device like a laptop or a PDA. A computer should be
secured like any other valuable possession when you are not present.
Human threats are not the only concern. Computers can be compromised by
environmental mishaps (e.g., water, coffee) or physical trauma. Make sure the
physical location of your computer takes account of those risks as well.
2. Access passwords:
The University's networks and shared information systems are protected in part
by login credentials (user-IDs and passwords). Access passwords are also an
essential protection for personal computers in most circumstances. Offices are
usually open and shared spaces, so physical access to computers cannot be
completely controlled.
To protect your computer, you should consider setting passwords for particularly
sensitive applications resident on the computer (e.g., data analysis software), if the
software provides that capability.
3. Prying eye protection:
Because we deal with all facets of clinical, research, educational and administrative
data here on the medical campus, it is important to do everything possible to
minimize exposure of data to unauthorized individuals.
4. Anti-virus software:
5. Firewalls:
Anti-virus products inspect files on your computer and in email. Firewall software
and hardware monitor communications between your computer and the outside
world. That is essential for any networked computer.
6. Software updates:
Almost all anti-virus have automatic update features (including SAV). Keeping
the "signatures" (digital patterns) of malicious software detectors up-to-date is
essential for these products to be effective.
8. Report problems:
If you believe that your computer or any data on it has been compromised, your
should make a information security incident report. That is required by University
policy for all data on our systems, and legally required for health, education,
financial and any other kind of record containing identifiable personal information.