°ÄÃÅ¿ª½±½á¹û

ResNet Security Standards

1.0 Overview

This standard defines terms and procedures that are important for understanding the proper use of ResNet.

2.0 Purpose

The purpose of this standard is to provide all ResNet users the appropriate information to abide by the ResNet Use policy.

3.0 Scope

This standard addresses ResNet use only. All other °ÄÃÅ¿ª½±½á¹û networks are bound by other policies and standards.

4.0 Standard

4.1 Connection Requirements

All computers connected to ResNet must meet the minimum requirements that are enforced through a Network Access Control (NAC) System. Some of these minimum requirements:

  • Supported Operating Systems
  • Antivirus/spyware protection with up to date definitions
  • Updated Operating System Service packs and patches

All computers must also abide by the following rules:

  • Users must install the NAC client application
  • Users must use Murray State's DHCP and DNS servers
The following list, while not complete, outlines some of the items that are strictly prohibited on ResNet:
  • Hubs/switches
  • Routers
  • Wireless access points
  • DHCP servers
  • DNS servers
  • Proxy servers
  • Port scanners
  • Vulnerability scanners
  • Key loggers
  • Network sniffers

4.2 Alternative Connections

Users deciding to purchase any type of connection, other than ResNet, must first fill out the Alternative Connection Form and submit it to Information Systems for approval. Once approved, the users must then abide by the following standards:

  • Users may not bridge their alternative connection with ResNet
    • This includes plugging in a switch, router, hub, etc., from the external connection and then also plugging into ResNet
  • Users must still abide by the Wireless Communication Policy, which states no one outside of Information Systems is allowed to install any wireless communication equipment

5.0 Definitions

Network Access Control (NAC)

Is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention and vulnerability assessment), user or system authentication and network security enforcement.

6.0 Revision History

Take the next step

© °ÄÃÅ¿ª½±½á¹ûWe are Racers.