Server Registration Guidelines:
Servers are integral to many computer systems and networks. By their nature, they provide special challenges to ensure the confidentiality, integrity, and availability of computer and network resources.
A server is defined as any device that provides computing service to multiple computers or individuals. See NDUS Procedure 1901.2, Section 1.
All servers on the NDSU networks or operated by NDSU entities must be registered with the Vice President for Information Technology (VPIT).
All servers are subject to established NDUS and NDSU policies, procedures,and standards.
- NDUS Policy and Procedure 1901.2
- NDSU Policy 710, Computer and Electronic Facilities
- NDSU Policy 158, Acceptable Use for Electronic Communication Devices
To register a server, it (the server) must be compliant with NDSU Server Standards. A "Request to Register a Server" form must be completed and submitted to the Chief IT Security Officer. The registration process needs to be completed before a static IP number can be assigned to the server.
Click the links below for more information.
- NDSU Server Standards and Procedures (printable PDF)
- NDSU Server Standards and Procedures
- NDSU Server Check List and Registration Form (printable PDF)
- NDSU Server Check List and Registration Process
An E-Mail will be sent to the Network Engineering and Operations team, after that the security team will be in contact with you to request a time to do an initial server audit, once that has been completed an email will be sent to you stating the IP address that has been assigned to your device. In most instances this will be done through our DHCP service and you will not need to statically assign your IP address.
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.
Feb 17, 2015
Over-sharing on a first date could lead to no second date, but over-sharing on a social media site could lead to data theft, real property theft, or physical danger to yourself or your family. There are lots of automated scripts already running on the Internet looking for keywords that are posted to social media, these scripts do everything from changing the word "meet" to "meat" and posting the results to twitter, to alerting potential thieves that a family is now on vacation and away from their house. Be safe on social media
Feb 6, 2015
New Slim Spray Diet ... Want a Cruise ... Fight Hair Loss Now ... SPAM SPAM SPAM ... It seems to get into every e-mail inbox beofre the account is even setup. But there are some ways to fight this menace.
- Don't reply to it
- Don't tell vendors your e-mail account
- If your service has the option, report it or mark it as spam
There are more ways to fight in the link below.
FEB 4, 2015
Its Tax Refund Season, Time for a new phone or tablet. But what about the old one? Do you have information on that device that could be used against you? How can you make sure that your old phones and devices don't come back to haunt you when you are done with it? Many people buy old equipment off ebay just to see what kind of data is left on those devices. Follow this guide to make sure that your device is wiped clean before you dispose of it.
FEB 3, 2015
When you download an app on social media or your mobile device, you may be allowing it to collect personal information like your contacts list or location. If possible, look at an app’s permissions before downloading and make sure you are comfortable with the information it collects. If the app does not tell you what information it collects, error on the side of caution and assume that it may be collecting information.
FEB 2, 2015
There is a security and privacy threat almost everywhere you go. Most don't even think about it. Free WIFI, if its free how can that be bad? In fact most Free WIFI could be quite safe, but a few access points could have an active sniffer on the line watching every single nibble of data that goes across its interface, looking for passwords, usernames, or e-mail addresses. Click Below for more information on safely using WIFI when traveling.