About OIT About the OIT
Directories Directories
Connect to Network Connect to Network
Network Services Network Services
Security IT Security
Voice Services Voice Services
Cable TV Cable Television
Computing Computing
Information Resources Information Resources
Committees IT Committees
Jobs IT Jobs at UCSB
spacer spacer
spacer Office of Information Technology  
spacer view site index contact OIT staff
  OIT Home > Security > Securing and Protecting
spacer spacer

Securing and Protecting Your Computers and Networks


Basic System and Network Security

All home computer owners should read the U.S. Computer Emergency Response Team (US-CERT) document on Home Network Security.

Microsoft Windows Users and Administrators

There are three steps you can take to improve your computer's security. They are explained in the Protect Your PC section of the Microsoft Security website. You can follow the three steps online, or print them for easy reference.

Whether you are a novice computer owner or an experienced network administrator you will probably find Microsoft Baseline Security Analyzer (MBSA) is an effective streamlined method of identifying common security misconfigurations. Version 1.0 of MBSA includes a graphical and command line interface that can perform local or remote scans of Windows systems. MBSA runs on Windows 2000, Windows 2003 Server, and Windows XP systems.

Microsoft's TechNet Security Center provides security tools, security response information, such as security bulletins and virus alerts, and the most prescriptive security guidance Microsoft has to offer to assist IT Professionals in securing their systems.

The Australian Computer Emergency Response Team (AusCERT) and the CERT Coordination Center jointly publish the Windows NT Configuration Guidelines. This document explains common Microsoft Windows NT 4.0 configuration problems that have been exploited by intruders, and recommends practices for deterring several types of break-ins.

UNIX and Linux Administrators

AusCERT and the CERT Coordination Center also publish a UNIX and Linux Security Checklist which details steps to improve the security of UNIX and Linux operating systems.

The CERT Coordination Center has also published a list of UNIX Configuration Guidelines.

Tools for both Windows and UNIX Systems

Anti-Virus Software Licensed to UCSB

Intrusion Detection and Log Analysis

  • Snort: An Intrusion Detection System
  • SWATCH: The Simple Log Watcher
  • Log Surfer: An alternative to SWATCH


spacer University of California Santa Barbara Home Page
  Copyright 2003-2019 The Regents of the University of California, All Rights Reserved
Web contactTerms of UseAccessibility
Last modified: 8/24/2009