Learn something new every day
More Info... by email
There are a number of different considerations that someone should keep in mind when it comes to college computer security. Whenever someone is using a shared computer on a college campus, for example, he or she should be sure to delete any temporary data that may be stored on that computer and log out after use. With regard to someone’s personal computer (PC), people should be sure to keep their computers secured in a safe area while not in use and enable passwords to prevent use by others. Other tips for college computer security are often provided by different colleges, and people should be aware of the computer policies at their schools.
College computer security typically refers to procedures and methods by which people can better ensure secure and safe computer use on a college campus. Many colleges provide public computers for shared use among numerous students, often utilizing a username and password to prevent use of computers by non-students. Anyone using one of these computers should be sure to indicate that any passwords entered on websites are not saved, as well as remove any temporary Internet files. Files created or downloaded onto a computer should be deleted to improve college computer security, and anyone using a public computer should always log out of his or her account before leaving the computer.
Many of these same procedures for college computer security can also be applied to the use of personal computers on a college campus, though there are some other considerations for PC use. Anyone with his or her own computer should not leave the computer unattended, and lock it in a cabinet or other secure location when it is left in a room. PC owners should also enable a password for logging onto the computer, to prevent others from gaining unauthorized access to the computer. College computer security can be improved by computer users turning off their computers while not in use, to better ensure that others cannot easily gain access to their systems.
There are also typically policies and rules provided by many colleges and universities to help assist students with college computer security. Students should be familiar with the computer policy for the school they attend. This can provide a great deal of information regarding specific tips and concerns for college computer security. These policies also typically indicate behavior that is approved or inappropriate while using college computers and networks, which students should consider if they wish to avoid potential punitive action such as educational suspension.
@Terrificli -- Good points but the people should be worried about online security even if they are using their own computers in their own rooms on campus networks. Colleges offer public computers in labs, but the activity on them is often no more viewable than that of private computers logged onto the network.
And I would argue that anyone who logs onto one of those college networks has a greater chance of being observed online. In your example, 20,000 people is a big number but not nearly as large as the number of people who go through ISPs at home (some of those networks have millions of customers). If a hacker targets someone on a college network, then sheer
numbers suggest you are more vulnerable than non-students on networks with millions of subscribers.
And computer security has a lot to do with hackers. I don't care if system administrators look at what I do online or not. From a safety standpoint, I'm more concerned about hackers getting my information. You have to be extra careful of them when on comparatively small, college networks.
Most colleges these days offer students the chance to log into campus wide networks from the convenience of their own dorm rooms, apartments, etc.
Those networks are public, but how closely are they monitored? I mean if you have a campus with 20,000 people enrolled, is the fact you are dealing with a public network mean that much? Do network administrators have time to follow what you are doing online?
The thing about a campus wide network is that it is as public as the one non-students have at home. We can all be watched by someone, but who has the time to follow our activity all that closely?
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!