This document is intended to clarify the reasons surrounding network suspension imposed by Information Security and address quick-recovery methods to assist users in regaining network connectivity. While this document may not address all recovery procedures, we hope to increase the awareness of the university community by promoting a self-service methodology which will aid in your education for future problems.
Information Security will suspend network connectivity when the computer, or individual using the computer, poses a direct threat to the university network or Internet. Hosts compromised by malware (worms, viruses, Trojans, etc.), hosts acting as part of a botnet, hosts sending unsolicited electronic mail (UCE) and other violations of network security policies will also be suspended from network connectivity.
A computer infected with these worms may allow unauthorized access by a malicious user and/or the propagation of malicious code onto other Internet-connected computers, including university computers. Along with this is an imminent loss of response time on the network as more and more infected computers scan the network for vulnerable hosts.
If you have noticed that your network connectivity has been suspended, immediately call the Technology Contact Center at (312) 362-8765. If you are using your own personal laptop computer, you can bring your computer to the Genius Squad.
Most Internet based worms or exploits take advantage of unpatched computers, easily guessable passwords, no passwords, or the lack of an anti-virus scanner. To combat this, we recommend the following.
We strongly recommend that all users of Windows 7/8 utilize the Internet Connection Firewall which can prevent a large percentage of attacks against your computer.
Microsoft also provides a feature called "Windows Update'' in Windows 7/8 Professional. This is a feature built into the operating system and provides friendly reminders when updates are needed.
The Microsoft Baseline Security Analyzer is useful for detecting the weaknesses of your computer. We recommend downloading and running this tool frequently.
If you have questions regarding computer or network security, feel free to contact us with those questions. We will help in any way possible.