Any unprotected computer connected to the Internet is likely to be infected within minutes! And CERN computers are permanently under attack – even right now. Therefore...
Keep your system up to date.
Enable the regular (e.g. monthly) automatic installation of updates/patches. If you can, use operating systems managed by CERN’s IT department which are securely configured and automatically updated for you;
Use anti-virus software.
The CERN anti-virus solution is even free for your home and private usage. Usually, infected computers at CERN need to be re-installed from scratch;
Do not install untrusted software.
Indeed software from untrusted sources may infect or compromise your computer... or violate copyrights;
Run without administrator privileges.
On today's operating systems these are just needed in special cases;
Lock your screen with a password,
when you leave your office;
Contact Computer.Security@cern.ch for help
if your computer has been compromised.
Cybercriminals are trying to trick you! Be cautious and...
Do not open unexpected or suspicious e-mails or
delete them if they do not concern you or if they appear weird. If in doubt, contact Computer.Security@cern.ch;
Protect your passwords!
Do not provide your passwords to Web sites you do not trust, and do not type them on untrusted computers (e.g. in Internet Cafés);
do not click on suspicious links, but only click if you trust their origin;
Do not install untrusted software or plug-ins.
Indeed software from untrusted sources may infect or compromise your computer... or violate copyrights.
Never share your passwords with anybody,
do not make them public, and beware of attempts to trick you into revealing them (so-called “phishing” attempts). Nobody legitimate will ever ask you for your password, not even the CERN Service Desk or the CERN Computer Security Team. However, report “phishing” attempts to Computer.Security@cern.ch;
Choose good passwords,
i.e. passwords which are hard to guess and cannot be found in any dictionary. They should be at least eight characters long and contain a mixture of capital and small letters, numbers and symbols.
Check http://cern.ch/security/passwords for more information;
Do not reuse old passwords
and do not use the same password for different purposes or at different sites;
Change your passwords regularly.
In particular when somebody else knows them, and inform Computer.Security@cern.ch, if your passwords got disclosed.
Cybercriminals are trying to find confidential or sensitive information, also here at CERN. So...
Restrict access to your documents and folders,
including access to Web sites and Web applications, minutes of meetings, contracts, shared file spaces, software repositories, public or private folders;
Follow the principle of least privilege
and ensure that only people who need to access your files and data can do;
Do not run file sharing applications
like Bittorrent, eDonkey, Emule, KaZaA. In particular, respect copyrights
Help us to protect CERN’s mission and reputation.
Follow the CERN Computing Rules.
You have committed to do so. In particular, any activity must not be illegal, political, commercial, inappropriate, offensive, or detrimental to official duties. It must not violate applicable laws in CERN's Host States. In particular, the consultation of pornographic or other illicit material is not allowed. Check http://cern.ch/ComputingRules for details;
Everyone is responsible for securing their computer, data, systems & services;
Remember that the personal use of CERN’s computing
facilities is tolerated
if the frequency and duration are limited and the resources used are minimal;
Do not run restricted applications,
i.e. software which has negative impact on CERN’s network or computer security;
Respect confidentiality and copyrights
of third party documents and files, like music, videos and software applications. In particular, do not share copyrighted material via file sharing applications or store them publicly on CERN file systems
The Computer Security Team offers training courses, code reviews, Web and servers scanning etc., and is there to help you:
or contact Computer.Security@cern.ch.
In computer security emergencies,
Act immediately and contact Computer.Security@cern.ch
to limit damage from security incidents!
CERN computers under attack?
of the following scenarios is compliant with the
"Principle of Least Privilege"?
pop-up window asks you to install a "plug-in" (software
component that can be installed in order to add specific
functionalities to a software application)?
CERN allow personal use of computing facilities?
are asked to click on a strange link which looks like
gibberish, what should you do?
you allowed to store commercial music and films on CERN
screenshot to the right (below!) is...
you receive a telephone call from someone claiming to
need your password, what should you do?
there any software restrictions at CERN?
may give someone your password if:
In order to use the CERN computing facilities, you have to sign digitally that you have read, understood and will obey the CERN Computing Rules governed by the Operational Circular Nº5 (OC5).
With this signature you commit yourself to
You take note that violation of these rules might entail exclusion from the CERN computing facilities, independently of any disciplinary actions or civil or penal proceedings.
You also take note that logged information, including information provided by you for registration purposes, shall be used for administrative, operational, monitoring and security purposes only.
|Your training validity for Computer Security|
|If you have problems with or questions about this course, please contact...|