Network Security

Information security is an area of utmost concern and importance to the District. With current changes in technology, it is increasingly important to protect our students’ private data. By plugging in unauthorized electronic equipment (e.g. wireless hubs, switches) into our networks, our firewall protection is defeated, by allowing direct connection into our network without any origination checking. In addition, the district has a standard for the equipment that we use so that security rules are propagated properly throughout the switches. Different vendors use different programming schemes. It is critical that the campus or district IT Departments be contacted before utilizing private or non-standard equipment.

With the proliferation of viruses on the Internet, it has become critical for all computer systems to be kept up to date on their operating system patches. Each day viruses are mutated and improved. Any system that is not patched is at risk. ARC has agreed to leave their computer systems on so that our patching server can locate them on the domain and ensure that they are patched. Often systems are turned off for periods of time and patching cycles are missed. This is particularly true of laptops that may be stored in closets or taken off-site.

Any personal laptop computers from home that will be used on the ARC network needs to be brought to the IT office for patching updates and virus software updates prior to use on our network. If the computer has been off the domain for more then a month, please, contact the IT office for a virus/patch check.

Due to lack of resources, personal computers belonging to students cannot be supported by campus IT. Therefore, they cannot be plugged into spare ports anywhere on campus (ports are typically blue in color and located on walls). This not only breaches the security of their personal data, but it puts the network at risk to malicious behavior and virus attacks. If there is a specific reason that students in an Area need internet connections and lab resources are inadequate, “chair rail” locations can be designated by the area and implemented by campus IT. These “Chair rail” locations go straight to the internet and never intermingle with our computing environment. They should also be clearly designated for that specific purpose