What We Do
Information Security and Policy (ISP) continuously scans the campus network for security vulnerabilities on connected devices. We use a number of scanners using Tenable Nessus, along with Tenable's Professional Feed of network vulnerability "plugins", to detect systems which may be vulnerable to attack. When detected, high-risk vulnerabilities are reported to designated security contacts for investigation and remediation. Vulnerabilities may include:
- Missing patches and updates
- Misconfigurations allowing unintentional data exposure
- Weak and default system passwords
- Unsupported operating systems and software
- Insecure and unecessary network services
Why We Do It
In order to gain control of computers and other network systems, hackers must first find a way in. Much like a burglar testing the door locks and windows before breaking in to a house, hackers will often test a system's defenses for weaknesses. Once a weakness is found, it can be exploited to take control of the system. Our network vulnerability scanning services are designed to find these weaknesses, or "vulnerabilities", on campus systems before they are discovered by hackers.
All systems connected to the campus network are scanned, so all members of the campus community with conencted devices can benefit from our scanning services. This includes:
- Researchers using the network for storage and transmission of research data
- Students using electronic resources to complete their coursework
- Staff supporting University administrative functions requiring information technology resources
- University administration meeting legal and ethical requirements to protect private information
- Individuals with private information on campus information technology systems
Devices with data classified at higher data protection levels receive additional benefits from more frequent scanning.
How to Get Started
All devices connected to the campus network receive basic scanning services. To receive security notifications from scanning alerts, you must be connected to a supported network (wired, Airbears, or VPN) and not the CalVisitor wireless guest network, and any firewalls must be configured to allow access from our scanners.
For enhanced scanning services for machines with data classified at higher protection levels, make sure your systems are registered in the Restricted Data Management application.