We’re excited to announce the launch of our new website, designed to enhance your experience with improved navigation and fresh content. If you encounter any broken or relocated pages, please use the search tool to find what you’re looking for. Thank you for your patience as we continue to refine and improve the site!
Cyber Security
A central resource for advising the campus on how to ensure the confidentiality, integrity and availability of vital information technology resources and information. Compliance to information security policies is the foundation for a successful security program. Compliance serves both the needs of the individual and the university as a whole; keeping your personal computer secure protects it from outside intrusions, which, in turn, minimizes attacks on the university network.
Reporting a Security Issue
For reporting security issues and reporting incidents of fraud, waste, or misuse,
contact the Helpdesk at 912-358-4357 or [email protected]It is the responsibility of each user to read and understand the Savannah State University Information Security policies.
Best Practices
- If you are asked for personal information, learn how it is going to be used and be sure that the site is secure. A secure site has the ‘https’ in front of the web link. Notice the small letter ‘s’ in https, which stands for ‘secure’.
- Do not open unsolicited e-mail, especially attachments.
NOTE: If you do not know the sender — do not open the e-mail. - Read website privacy policies.
- Do not send personal information through e-mails especially on ListServs that go out to a large number of people.
- Be sure to encrypt or password-protect important information on hardware devices like flash drives, disks or hard drives that can be lost or stolen.
- Use Anti-Virus software, a Firewall and Anti-Spyware software.
- On your home computer update your operating system and Web browser regularly. Download Patches when available.
- Use complex passwords
Complex Passwords
- Passwords should be changed on a regular basis.
- Passwords should be complex.
- Passwords should be at least eight characters long.
- Passwords should NOT contain all or part of the users account name
- Passwords MUST contain at least three of the four following categories of characters:
- Uppercase characters
- Lowercase characters
- Base 10 digits
- Symbols found on the keyboard (such as !, @, #)
- Do not use your name, birth date, social security number, mothers name, dogs name or any other information that someone may know about you.
- Do not write down your password. Choose a password you can remember.
- Try to create a non-dictionary word for your password as a good practice.
- If you think someone has obtained your password, reset your password.
Cyber Security Important Information
- Lock your computer when you leave your office. You can lock your computer by pressing the Windows Key and “L”. To unlock your computer when you return, press CTL+ALT+DELETE and re-enter your password.
- Always ‘Reboot’ your computer before calling the SSU Helpdesk Students or SSU Helpdesk Faculty with a problem. Turn it completely off and back on. A machine running a Microsoft Windows Operating System must be rebooted regularly.
- Do not give your password to anyone.
- If you must write your password down, put it in a secure place. Do not write it on a sticky note and place it on your monitor.
Cyber Security Measures at SSU
- Updated Anti-Virus & Anti-Spyware software runs on all SSU computers.
- Operating Systems updated via patches / service packs on all SSU computers
- We provide Firewall Protection.
- We perform daily backup of Servers, so be sure to save important data to the shared drives.
- We require login authentication on all SSU computers even through wireless access.
- We require passwords to expire every 90-days and the use of complex passwords.
- Security access roles are given to all user accounts.
- Passwords can be changed by yourself or by contacting the campus helpdesk at 912-358-4357 or by sending an email to [email protected].
Security Policies
Please read and annually review the SSU Security Policies
Savannah State University Security Plan
If you have questions concerning these policies, please contact:
Symptoms of a Compromised Computer
- Slow or non-responsive? Experiencing unexpected behavior?
- Running programs that you weren’t expecting?
- Showing signs of high level of activity to the hard drive that is not the result of anything you initiated?
- Displaying messages on your screen that you haven’t seen before?
- Running out of disk space unexpectedly?
- Unable to run a program because you don’t have enough memory – and this hasn’t happened before?
- Program constantly crashing?
- Rejecting a valid and correctly entered password?
- All e-mail sent from computer is refused (bounced back)?
Terms to Know
Adware
Software application in which advertising banners or ‘pop ups’ are displayed on your computer screen while the program is running.
Anti-Spyware
Software that is designed to protect your computer from malicious spyware that monitors your online activities and collects personal information while you surf the web. This should be set to update automatically.
Anti-Virus
Anti-virus software protects your computer from viruses and should be set to update automatically.
Encrypt
To convert information or data into a cipher or code in order to prevent unauthorized access.
Firewall
A firewall is like a guard, a wall, or fence, watching for outside attempts to access your system and blocking communications from and to sources you don’t permit in order to protect your personal information.
Hacker, attacker, or intruder
These terms are applied to the people who seek to exploit weaknesses in software and computer systems for personal, political or financial gain.
Malicious code
This is computer code (instructions) meant to do harm to your computer. This category includes code such as viruses, worms, and trojan horses. Although some people use these terms interchangeably, they have unique characteristics.
Phishing
(Pronounced ‘fishing’) is a highly prevalent online scheme used by Internet cyber-criminals to ‘lure’ you into providing your personal and financial information online through e-mail and/or pop-ups.
Spam
Sometimes companies or individuals purchase e-mail address lists to send ads for products and services. The unsolicited e-mail is defined as “Spam”. They fill your e-mail boxes up with junk e-mails.
Trojan horses
Software that claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder.
Viruses
This type of malicious code requires you to actually do something before it infects your computer. This action could be opening an e-mail attachment or going to a particular web page. Once you take the action then the virus begins doing what it is programmed to do, like delete all of your files or make your machine reboot constantly.
Worms
Worms propagate without user intervention. They typically start by exploiting a software vulnerability (a flaw that allows the software’s intended security policy to be violated), then once the victim’s computer has been infected the worm will attempt to find and infect other computers. Similar to viruses, worms can propagate via e-mail, websites, or network-based software. The automated self-propagation of worms distinguishes them from viruses.