You are here:
IT Security

IT Security

Computer Security Guidelines for Users

  • Back up your data regularly.

  • Ensure that a password is required to log on to your machine.  When the machine is unattended (e.g. evenings, weekends), ensure that you are logged out or have locked the machine so that a password is required.

  • Use strong passwords. In particular, blank passwords should never be used.
  • Encryption can be used to secure data on your hard drive. In particular, encryption of laptops (and other mobile equipment such as USB sticks) is required if you have the personal data of other people stored. Contact School staff for assistance if you are considering encryption of your hard drive. 

  • Operating System(s) must have automatic updates enabled.  Sophos Anti-virus and Remote Update must be installed.
  • Be aware of security issues when using email. Do not reply to any mails that look like spam. 
  • All instances of viruses should be reported to CSI Help.

  • All services / applications installed should be secured.

    • Only required services should be enabled.

    • Any additional required updates must be installed.

    • Any additional security tools should be run.

  • A firewall should be installed where practicable.

  • File-sharing (peer-to-peer) software should not be used except for research purposes.

  • All machines must be registered to use the wired (cabled network).

    • Only the registered IP address may be used.

    • DHCP must be used for configuring IP addresses.

  • The regulations for the use of computer systems and networks in UCD are available from UCD IT Services. Non-compliance will be viewed as a breach of policy leading to a possible loss of network services. The University has implemented an Intrusion Detection System to enhance the security of the network, and machines found to be in breach of the regulations will be removed from the network. Regularly check this page and UCD IT Services for security information.
  • Send any security queries to CSI Help.