Guidelines
The foundation of network security is based on the premise that all equipment attached to the network adheres to appropriate security procedures. To accomplish this objective, it is necessary that only Southeastern owned, configured, and updated equipment reside on the network. Any non-college owned equipment destined for network connectivity must have institutional approval (president or vice president of administrative services) and its’ configuration approved by the IT department prior to installation. It is also very important to make sure that any college owned equipment that has been connected to another network is free of any malwares (virus, trojan, adware, etc) it may have picked up from the other network. It is essential that employees take the time to scan and clean the equipment with antivirus software BEFORE it is connected back to the campus network.
Perimeter Defense
The first step in preventing network security breaches is to establish traffic patterns that allow information packets to go where they need to go and nowhere else. This process begins at the point where Internet traffic meets the colleges local network (SCCNET) traffic and encompasses three (3) broad strategies.
Intrusion Prevention
The second step in preventing network security breaches is intrusions or incident detection.
The IT department uses a combination of tools to monitor the network for abnormal patterns. These abnormal patterns are picked-up from various logs (Firewall, Error, Authentication, etc.),
console screens, graphics, etc. The various monitoring points are defined and checked-off in a monthly document entitled SCCNET Monitoring.
Intrusion Response
The final step is to respond appropriately when there appears to be a security breach. The IT department will follow internal procedures (IS Business Continuity Plan) whenever an intrusion or incident is detected. The procedures will include steps such as:
Reviewed and Last Updated on October 19, 2020.