Fermilab Computing Sector

Computer Security Awareness Checklist

sidemenu
Policy Guidelines

Restricted Access

All lab employees and visitors are asked to take a few minutes to complete the following simple computer security awareness checklist. This will help ensure that they understand some basic principles and are following proper computer security practices. (We'll help you out you with one small hint: the correct answer to questions 1 through 8 is YES.) More detailed information about particular topics will follow in subsequent articles; some additional information about each question can be seen by following the web links.

In addition, a Computing Checklist for Connectivity to a Fermilab Operated Network or Resource is also available.

  1. Passwords
    Are all of your accounts protected by distinct strong secure passwords that are not written down or shared with others?
    YES ___ NO ___
    Tell me more
  2. Unattended machines
    When your desktop machine is left on in an unsecured area (such as an unlocked office) is it protected with a password-based screen saver (and physically secured as well)?
    YES ___ NO ___
    Tell me more
  3. Local system administration and registration
    Do you know exactly who is responsible for system administration of the machine on your desktop, and in particular for installing new security patches and maintaining a secure configuration? (This could be yourself.)
    YES ___ NO ___
    Has that local system administrator (perhaps yourself) registered your machine and his/her identity in the lab's computing equipment database (so that he/she can be quickly notified of urgent computer security issues concerning your machine)?
    YES ___ NO ___
    Tell me more
  4. Data backup
    Are you aware of the procedures used to create backup copies of any data that you are responsible for, and have you ever tested these procedures by retrieving backed up data?
    YES ___ NO ___
    Tell me more
  5. Reporting suspected computer security incidents
    Do you know how to report a suspected computer security incident?
    YES ___ NO ___
    Tell me more
  6. Virus protection
    Is virus protection software running, with up to date virus signatures, on all Windows PCs that you use?
    YES ___ NO ___
    Tell me more
  7. Safe email practices
    Do you exercise extreme care in dealing with email, in particular almost never opening attachments unless you are absolutely certain of their origin? In addition, it is recommended to read email in plain text format instead of rendering email in HTML.
    YES ___ NO ___
    Tell me more
  8. Safe web browsing
    Do you exercise extreme care in browsing the web, in particular using safer and patched browsers (Internet Explorer is specifically not recommended for general use), turning off ActiveX, and being cautious in clicking on new links?
    YES ___ NO ___
    Tell me more

If you needed to answer NO to any of these questions please follow the web link for more information on that topic.

For assistance contact helpdesk@fnal.gov.
Information compiled and maintained by Computer Security Team ; last modified by TR on July 13, 2006.
(Address comments about page to the Computer Security Team.)