Note: This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run host intrusion prevention.
Currently, personal networking devices used on the RIT residential network (such as routers, switches, etc.) do not need to meet the Network Security Standard. Resnet has created separate guidelines for Using a Router/Wireless Router on the RIT Network.
The following products have all been tested by the Information Security Office and approved for use on RIT-owned/leased computers.
Recommended Host-based Intrusion Prevention Software
Open source intrusion
Use a Secure Computer
Make sure your computer meets the RIT Desktop & Portable Computer Standard before getting online. In addition to up-to-date anti-virus, make sure that your operating system and your web browser have the latest security patches installed.
Don't use public computers to send private information over the Internet. You cannot... ...
Wireless Networking Safety
Wireless networks are generally considered to be less secure than wired networks. However with proper configuration and encryption enabled, they can provide more than adequate security for most users.
Wireless at RIT
RIT offers four different wireless networks across campus:
- RIT - Encrypted WPA2 network and the preferred network for all devices. Devices using this netowrk must be registered using RIT account credentials.
- RIT-Guest - Open public network for campus visitors, authorized ... ...
Everyone connected to the Internet is a potential target. Use of anti-virus and firewall software is critical in protecting your computer online; however, simply protecting your computer is not enough.
Cyber criminals often target vulnerabilities in web browsers. Because Internet Explorer was a web browser used by most people, it quickly became a primary target. Using a different browser can reduce your risk while on the web. The table below lists alternative browsers: