Network Security and Management
Network Security and Management
Procedures)
Purpose
These guidelines and procedures are meant to ensure the availability and security of the shared
network resources which support the learning, teaching and research mission of the University
and the administrative activities that underpin this mission.
These guidelines and procedures supplement and clarify the principles set out in the Policy on
Computing and Information Technology Facilities as they apply to the York University centrally
managed network infrastructure and the operation of systems therein.
System Administrators: Those responsible for installing and maintaining software and/or
equipment attached to or operating via the central network infrastructure.
System Managers: Those who own and/or have management authority for Information
Technology systems attached to or operating via the central network infrastructure.
Central Computing Support Group: Computing and Network Services (CNS) is responsible
for the management of the University’s central information technology services. This includes
Central Network Management and Information Security.
Central Network Management: The department within CNS with responsibility for the
operation of the University data network infrastructure including network-authoritative services.
Information Security: The department within CNS with responsibility for the overall security
of the University Information Technology systems and data.
Definitions
University Network: The University-owned network infrastructure which is managed by the
Central Computing Support Group. This includes the University network backbone, networks for
individual buildings, modem pools, and wireless access points.
Network-Attached Device: Any type of computer system, network equipment, or other device
which operates on the University network infrastructure. This includes personal computers,
servers, network-enabled printers, network hubs or switches, and any other device which uses the
network.
Network-Authoritative Service: Network services which are required for the integrity and
stability of the central network infrastructure, including DNS, DHCP, and routing.
Network Access Point: A device which allows network traffic to flow from any external source
to the University central network infrastructure. This includes wireless access points,
modems, wired network drops, and routers connected to external networks not operated by the
University.
Vulnerability Analysis: Any interaction with, or observation of a system which is used for
determining security vulnerabilities present. Examples include network scanning, encryption
cracking, and system information gathering.
Guidelines
1. Network Access Points: All points of access to the University Network (including
network drops and wireless access points) require authorization by the Central
Computing Support Group. Operators of wireless access points shall also conform to the
University guidelines for usage of unregulated radio spectrum bands.
2. Network Traffic Types and Limits: The Central Computing Support Group will control
bandwidth limits and the types of inbound and outbound network traffic permitted
through the Internet gateway and other points within the University network. Decisions
about the permitted types of traffic and bandwidth limitations will be based on the
business and academic goals of the University and the security exposure involved.
3. Network Monitoring: The Central Computing Support Group will monitor network traffic
as necessary and appropriate to detect unauthorized activity or intrusion attempts, and for
diagnostic purposes. All monitoring will be carried out in accordance with the University
Policy on Computing and Information Technology Facilities. Interception or monitoring
of network traffic without authorization from the Central Computing Support Group is
prohibited.
4. Baseline Security Configurations: The Central Computing Support Group will establish
and provide recommended baseline configuration standards for selected operating
systems. System Managers are responsible for ensuring that systems under their
responsibility are configured in a secure manner, making use of the baseline standards at
minimum.
5. Vulnerability Analysis: System Administrators or System Managers are authorized to
perform vulnerability analysis on systems for which they are responsible for. Information
Security, or its designee, is authorized to perform vulnerability analysis of any device on
the University Network at any time. All other vulnerability analysis of systems on the
University Network requires prior approval of Information Security.
6. IP Addresses: The Central Network Management assigns IP addresses to networked
systems either at system installation time, or dynamically depending on the system and
area of the network it is located. Using or attempting to use a different IP address than the
one assigned is prohibited.
7. 7. Domain Names: All IP addresses within the University Network are assigned within
the "yorku.ca" domain name. Using or attempting to use a non-"yorku.ca" domain name
to resolve to a York University IP address without authorization from the Central
Computing Support Group is prohibited.
8. Network Abuse: Interfering or attempting to interfere with the normal operation of
networks and systems within or external to the University is prohibited. Examples of this
type of abuse include unreasonable use of resources, denial of service, scanning,
monitoring, interception, impersonation, or modification of systems or data without
authorization or consent of the system or data owner.
9. Network Authoritative Services: Operation of network-authoritative services (DNS,
DHCP, and routing-related services) without authorization by Central Network
Management is prohibited.
10. Malicious Software Use: Use or transmission of malicious software such as computer
viruses which could provide unauthorized access and/or infect systems is prohibited.
Computers infected with malicious software are considered a security compromise.
11. Commercial Use: Use of University Network connections to host services for
unauthorized commercial purposes is prohibited.
12. Inappropriate Use: Use of the University Network must not violate the University Policy
on Computing and Information Technology Facilities . Such violations include copyright
violations, distribution of computer viruses or other malicious programs, unauthorized
access, or other unlawful use.
13. Incident Response: In the event of a known or suspected incident of unauthorized access
or other system security compromise, or in response to a violation of any guideline
specified here, Information Security, or its designee, is authorized to investigate any
device on the University Network in accordance with the Incident Response and
Investigation procedures contained herein. This may involve disconnection of the system
from the University Network, copying of system data, and/or physical collection of the
device for examination.
Procedures
Attaching to the Network