Background
This policy describes the requirements and rules for the structure and use of passwords for authentication to the systems of the Hebrew University. The purpose of this policy is to protect the university's resources and information and to prevent unauthorized access to the organization's information and systems.
Scope
This policy applies to all users of the university's information systems, including students, academic and administrative staff, and external partners.
Policy
Password Structure for Authentication to University Systems (General Requirements)
Background
The use of removable media (disk-on-key, external hard drive) is common and accepted in the university despite many drawbacks. The recommended way to store organizational information is the employee's personal home folder.
However, sometimes there is no alternative but to use removable media for organizational purposes as well. To prevent leakage of organizational information in case of loss/theft of the drive, encryption must be performed.
Policy
Regular updating of Microsoft Windows and other software such as browsers Office products is a critical factor in protecting your computer against hacking. Make sure the system updates automatically.
MIcrosoft provides two sets of updates for a Windows 10 computer. The first set of updates are security updates and are ususally distributed once a month. The second type of updates are called feature updates. These are usually distributed once every six months. Security updates are only delivered to computers that have received one of the last three availabe feature update.
Windows systems 7 or higher have a built-in firewall program. In general this program is activated by default. To ensure that your firewall is activated look at the instructions below:
What is spam and who are spammers?
Spam is a problem for anyone who gets mail. The word "spam", in the context of e-mail, means mail that has not been given consent to be sent by the recipient. In addition, mail is sent as part of a collection of messages that all have the same content. Mail is considered spam if it is sent without the recipient's consent and as part of a large collection of messages. If you've sent or received an e-mail message, you'll probably also receive spam known as spam. Spam is a profitable business for its senders: it is cheap to send messages in millions or billions of messages, even if a small percentage of recipients will buy something in response to a message.
Through newsgroups and chat rooms, mainly through large sites. There are millions of websites that contain e-mail addresses. These pages are scanned by the spammers.
Through sites that are specifically designed to collect e-mail addresses by encouraging users to register to the site and by doing so the data on them are collected. The most common source of e-mail addresses is the search for "dictionaries" of mail servers of e-mail storage companies.
The university uses a server-level anti-spam filter, which eliminates the need to install and update anti-spam software on any computer. If you did not receive mail that you expected, it may be on the Quarantine list. We keep suspicious messages in the "quarantine" for one week. If you have not received the expected mail, please send mail to infosec@savion.huji.ac.il.
The university also checks for spam in outgoing mail. Here are some tips on how your mail will not be considered spam:
Any mail that arrives at the university mail is scanned for viruses. When a virus is detected, the attachment is thrown and the rest of the message is sent to the recipient with a new attachment that contains a message from the antivirus of the university gateway. File extensions: Files that are attached to the mail and have the following extensions: .exe, .rar, .pif, .vbs, .scr, .cmd, .bat are blocked by most e-mail programs. If you still want to send mail with a file with one of the above suffixes, perform a zip operation first and only then send the mail.
Phishing is a deception attempt that is designed to steal your personal information. In phishing scams, predators try to obtain personal information, such as credit card numbers, passwords, account details, and other details, by misleading customers to fill their personal details with fake emails. Phishing scams can be obtained online via spam messages or pop-up windows.
Notice the following example - it is real, and it was sent to university researchers. In this example, we try to "catch" the user's passwords by sending an e-mail on behalf of the faculty’s computer unit:
From: administrator@agri.huji.ac.il mailto: administrator@agri.huji.ac.il]
Sent: Tuesday, June 07, 2005 12:52 AM
Subject: Security measures
Dear Valued Member,
According to our site policy you will have to confirm your account by the following link or else your account will be suspended within 24 hours for security reasons. http://www.agri.huji.ac.il/confirm.php?email=tripler@agri.huji.ac.il
Thank you for your attention to this question. We apologize for any inconvenience.
Sincerely, Agri Security Department Assistant.
Safety Rules: