Security

Protecting Your Computer

Many software programs help you protect your computer from attack and damage.

Anti-Virus

The first step in protecting a computer is having anti-virus software installed and kept up-to-date. Anti-virus software is a class of program that searches the computer for any known or potential viruses.  Ithaca College and Apogee ResNet require that all computers have anti-virus software on them. College owned computers are protected with McAfee Anti-virus protection set to scan automatically once a week. If a virus is found, the software will prompt the user to do something typically "remove" or "quaantine" the virus.

Malware and Spyware

Anti-malware and spyware software scans computers looking for malware and spyware. College owned computers have McAfee's anti-malware and anti-spyware software installed on them. Many free options are available for personal use.  If malware and/or spyware is installed on a computer, users may see a decrease in performance; it takes longer to load and/or search websites.

Personal Firewalls

A personal firewall is computer application which controls network traffic to and from a computer. With personal firewalls, the security policies are managed by the computer user. Personal firewalls may also provide some level of intrusion detection, allowing the software to terminate or block connectivity where it suspects an intrusion is being attempted. The latest Windows operating systems come with personal firewalls.

Common personal firewall features include:

  • Alert the user about outgoing connection attempts
  • Allows the user to control which programs can and cannot access the local network and/or Internet
  • Hide the computer from port scans by not responding to unsolicited network traffic
  • Monitor applications that are listening for incoming connections
  • Monitor and regulate all incoming and outgoing Internet users
  • Prevent unwanted network traffic from locally installed applications
  • Provide the user with information about an application that makes a connection attempt
  • Provide information about the destination server with which an application is attempting to communicate

Laptop Security

Lockdown Kits

Because of the portability of laptops, it is important to secure the hardware so it is not stolen. Lockdown kits provide this security. For college-owned equipment, these kits can be purchased from ITS. For personal laptops, these kits can be purchased from the IC Bookstore or a local vendor.

Tracking Software

Monitoring software is available that tracks a computer and if the computer is reported lost or stolen, the vendor will work with local law enforcement agencies to track down the computer based on specific details provided by the software. Data can also be remotely deleted by the data owner. This data could include files and applications containing personal photos, internet bookmarks, browser cookies, financial information, and stored passwords.  Several vendors sell this type of software including Lo/Jack for Laptops and Adeona, Prey or Pombo.