Network Security – 208.2

Back to Administration

University of Arkansas at Little Rock
Policy Name: Network Security
Policy Number: 208.2
Effective Date: January 3, 2008


This document establishes network security and computer usage guidelines for the University of Arkansas at Little Rock (UA Little Rock).


  1. Guidelines
  2. Network Connection Policy
  3. Minimum Network Hook-up Requirements
  4. Escalation Procedures for Security Incidents
  5. Network Naming Conventions

1.0 Guidelines

1.1 Introduction

These guidelines incorporate the elements of the UA Little Rock Information Technology Acceptable Use (AUP) policy. The purpose of these guidelines is to protect the rights and privacy of UA Little Rock campus users, as well as those of UA Little Rock faculty and staff.

Back to top

1.2 Other Applicable Guidelines/Policies

Members of the UA user community are required to comply with the items outlined in the campus AUP.

Members of the UA Little Rock campus faculty, staff, and students require access to servers and systems on the UA Little Rock campus. Access is defined as having the logon and password to use an account on a system. The first time a member of the UA Little Rock faculty/staff requests access, he or she is asked to read and sign the AUP Agreement. The AUP presents general guidelines for using UA Little Rock systems in a responsible and ethical manner, as well as behaviors and practices that are prohibited. The document may be accessed via UA Little Rock’s web page, Information technology Services under the title Acceptable Use Policy.

Back to top

1.3 Privacy of Clients Data/Information

User files and information stored on or in UA Little Rock computers are to be protected for privacy. Written consent of the user must be first obtained prior to disclosing any user information. In all cases the user must be advised that his or her file(s) must be viewed or accessed to assist the user in problem resolution.

When assisting UA Little Rock users, members of the UA Little Rock faculty/staff should use the following guidelines:

  • Use and disclose the user’s data/information only to the extent necessary to perform the work required to assist the user. Particular emphasis should be placed on restricting disclosure of the data/information to those persons who have a definite need for the data in order to perform their work in assisting the user.
  • Do not reproduce the user’s data/information unless specifically permitted by the user.
  • Refrain from disclosing a user’s data/information to third parties unless the user provides written consent.
  • Return or deliver to the user, when requested, all data/information or copies thereof to the user or someone they designate.

Back to top

1.4 Proprietary Information

Due to the nature of the UA Little Rock computing and network environment, there is significant potential proprietary information stored on or in UA Little Rock computers, laptops, and resources. For example, proprietary information would include vendor programs and source code, benchmark programs, scientific codes, and personnel records. Members of the UA Little Rock faculty/staff are responsible for ensuring that proprietary information is protected from disclosure and/or unauthorized access. When dealing with proprietary information, members of the UA Little Rock faculty/staff should use the following guidelines:

  • Ensure appropriate measures are in place for protecting proprietary information.
  • Do not attempt to access proprietary information for which you have not been given authorization.
  • Do not make copies of proprietary information unless specifically permitted by the owner of the information.
  • Refrain from disclosing to third parties the types of proprietary information you can access.

Back to top

1.5 Security Investigations

If a member of the UA Little Rock faculty/staff discovers evidence of a violation of the UA Little Rock campus AUP, he or she must notify the network security officer (NSO) or the UA Little Rock chief information officer (CIO) as soon as possible. If the NSO or the CIO determines there is probable cause to believe a security violation has occurred, additional investigation may be authorized. Any additional investigation will normally be performed by the NSO or someone designated by the NSO or the CIO.

If you are requested to participate in an investigation or you must view a user’s files (after receiving consent) during the normal course of your job duties, you must not disclose information about that user or the contents of the user’s files to other people. Information concerning the user should only be disclosed to the NSO, the CIO, or to a law enforcement agency. A detailed record and log of actions under investigation will be maintained by the NSO.

Back to top

1.6 Summary of Guidelines

To summarize, follow these guidelines:

  • Read and follow the campus AUP.
  • Do not inspect a user’s files without consent of the user or the proper authorization.
  • Inform the proper person when you feel there is evidence of a possible violation.
  • When performing an investigation on a user or system, which involves viewing user’s private files/data/information, keep a detailed record/log of why the investigation was initiated and what actions were taken.

Back to top

2.0 Network Connection Policy

The Network Connection Standard describes the requirements and constraints for attaching a computer, server, and/or printer to the UA Little Rock network. All computers installed on the UA Little Rock campus network fall under the authority and responsibility of the NSO and, as such, must meet the minimum-security requirements of UA Little Rock regulations and policies. The security requirements and practices at UA Little Rock are outlined in the UA Little Rock campus AUP (included as Appendix I) and this document. The intent of this policy is to ensure that all systems installed on the UA Little Rock network are maintained at appropriate levels of security while at the same time supporting the ability of UA Little Rock users and faculty/staff to perform their work.

Any UA Little Rock faculty/staff with questions or concerns regarding UA Little Rock security should send inquires to

Back to top

3.0 Minimum Network Hook-Up Requirements

The requirements listed below are the minimum requirements, which must be satisfied before a new host can be installed on the UA Little Rock campus network.

Back to top

3.1 Designation of a Responsible Person

Each computer attached to the UA Little Rock network must have an assigned individual that provides support for the system and is responsible for ensuring the requirements of this policy are met. In addition, the responsible person ensures that the security of the system is maintained by installing necessary security software, patches and security checking programs. The person who is responsible for support must have full access to the system.

In most cases, the responsible person for a computer would be the faculty and/or staff member that uses the computer in their daily work. Some departments on campus have a technical person responsible for initial problem resolution. The technical person would be the responsible person for the department’s computers. In the case of servers, the system administrator is the responsible person for that system.

Back to top

3.2 Notification of New System Installation

The NSO or his designee must be notified each time a new host requiring a fixed IP address is added to the campus network. Prior to installation on the campus network, the network support group of Information Technology Services must assign a valid IP address number. As part of the IP address request, the requestor must specify the new host, requested domain name, designated administrator, location, and administrative logon and password. The NSO will maintain the logon and password in a secure location accessible only by the NSO and his or her designee.

If the computer system does not require a fixed IP address, the user may set up the computer to acquire an IP address via the campus DHCP server (Dynamic Host Configuration Protocol). Dynamically obtaining an IP address via DHCP does not require notifying Information Technology Services’ network support group.

Back to top

3.3 Required Account(s)

Each UA Little Rock server attached to the campus network must have a system account (administrator ID for logons are not allowed) to allow members of the support team access to the system in the event of a problem. When requested by the NSO, individual campus users must disclose the administrative computer logon and password.

Back to top

3.4 Security Installation

Each system administrator should review the Appendix III and IV for Windows and/or Unix security installation recommendations. Additional recommendations may be found at

Back to top

4.0 Escalation Procedures for Security Incidents

This procedure describes the steps to be taken for network and computer security incidents occurring on the UA Little Rock campus. The physical security incidents covered in this procedure include, but are not limited to theft, illegal building and network closet access, and property destruction.

The types of incidents have been classified into three levels depending on severity:

  1. Level one incidents are least severe and should be handled within one working day after the event occurs. Level one incidents usually require that only the UA Little Rock NSO be contacted via telephone or email. Examples of level one incidents are sharing of user accounts, cannot remember password, and computer virus.
  2. Level two incidents are more serious and should be handled the same day the event occurs (usually within two to fours hours of the event). Level two incidents must be escalated to the UA Little Rock NSO. An example of a level two incident is a stolen logon and/or password.
  3. Level three incidents are the most serious and should be handled as soon as possible. Examples of a level three incident include, but are not limited to computer system break-in, use of UA Little Rock campus network or facilities for personal gain, denial of service attacks, or email spamming.

Level two and three incidents may result in notification to a law enforcement agency for possible criminal prosecution. Incident levels are assigned by the NSO and if an incident occurs that is not designated, then the NSO should be notified as soon as possible.

Back to top

4.1 Network Security Committee

A standing network security committee is established with a term of three years for each member. One third of the members are to be appointed annually by the chancellor. Membership of the committee is comprised of the following organizational members.

  • Information Technology Services – CIO/NSO
  • Office of Communications
  • Office of Human Relations
  • Public Safety
  • Student Government
  • Faculty

The Network Security Committee is a standing committee, which is called into session by the CIO and/or NSO when either person has reason to believe that a security incident has occurred to warrant a coordinated action on behalf of the university. Possible outcomes of security incidents investigations by this committee include:

  1. Forwarding the information on to a law enforcement organization with a recommendation for criminal prosecution.
  2. Forwarding the information to appropriate faculty and/or student organizations for censure and discipline. Existing UA Little Rock rules, policies, and procedures will be employed for possible action against the individual and/or individuals.
  3. The information submitted does not warrant further action.

Back to top

4.2 Computer Security Incidents Procedures

All campus network security incidents require notification to the NSO. The NSO will establish the security incident level and create an incident report. All security violations require incident reporting and closure indicating security resolution.

Back to top

4.2.1 Level One Incident
  1. Notify the UA Little Rock NSO within one working day. UA Little Rock NSO will document all pertinent information on a UA Little Rock incident report and if necessary disable appropriate user accounts.
  2. Change any effective password(s).
  3. The UA Little Rock NSO will call person(s) suspected of account sharing and determine the severity of the incident. In most cases, people who share accounts have a valid need to have their own UA Little Rock accounts. In these cases, the UA Little Rock user’s account will remain disabled until account request forms are received and processed for the person who was using the UA Little Rock user’s account.

Back to top

4.2.2 Level Two Incident
  1. Notify UA Little Rock NSO within two hours. If the NSO cannot be reached within two hours, contact the CIO.
  2. Upon request from UA Little Rock NSO disable all UA Little Rock system accounts for the employee account to prevent further access.
  3. Change system(s) logon id’s and/or passwords.
  4. The UA Little Rock NSO will call person(s) suspected of account sharing and determine severity of the incident. In most cases, people who share accounts have a valid need to have their own UA Little Rock accounts. In these cases, the UA Little Rock user’s account will remain disabled until account request forms are received and processed for the person who was using the UA Little Rock user’s account.

Back to top

4.2.3 Level Three Incident
  1. Isolate infected systems from the remaining UA Little Rock network as soon as possible. Consult the UA Little Rock NSO to determine the best method to isolate the infected systems from the remaining UA Little Rock network.
  2. Notify UA Little Rock NSO within one hour. UA Little Rock NSO will report the incident to higher-level management.
  3. Notify all involved system administrators within two hours.
  4. The NSO will attempt to trace the origin of attack and determine how many systems (if any) have been compromised. Save copies of system log files and any other files, which may be pertinent to incident.
  5. UA Little Rock NSO will decide what further actions are needed and assign appropriate people to perform the tasks.
  6. The UA Little Rock NSO may activate the Network Security Committee to manage the incident, including reporting to the media and the law enforcement.
  7. Upon completion of the investigation, the UA Little Rock NSO will write an incident summary report and submit to the Network Security Committee.

Back to top

4.3 Physical Security Incidents
  1. If an unauthorized person is in a network controlled area, call or page UA Little Rock Public Safety immediately. Public Safety will escort the unauthorized person out of the area and notify the NSO.
  2. The NSO will log the incident and generate a network security incident report.
  3. Physical security incidents are considered level three security violations.

Back to top

4.4 Network and/or Personal Computer Property Destruction or Theft
  1. Notify UA Little Rock Public Safety as soon as possible.
  2. Contact the NSO as soon as possible.
  3. If destruction involves a UA Little Rock computer, notify the system administrator for that system as soon as possible.
  4. Network and/or personal computer property destruction or theft is considered a level three security incident.

Back to top

5.0 Network Naming Conventions

5.1 Connecting to the Campus Backbone Network

Naming conventions for microcomputer networks, servers, and other devices that connect to (or will connect to) the UA Little Rock Campus Backbone Network will help eliminate unwanted interference across the backbone. All local area networks on campus are encouraged to use the same standards in order to allow for proper network management.

Back to top

5.2 Administration of TCP/IP Addresses

Every computer attached to the Campus Backbone Network, which uses TCP/IP, must be assigned an IP address. At UA Little Rock, IP addresses are of the form 144.167.XX.YY.

XX is called the IP subnet number and is assigned by UA Little Rock Networks Services. Computers attached to the same physical network all use the same subnet number. YY is a unique number assigned to each computer on the subnet by the corresponding department and can range from 1 to 254. Therefore, there can be up to 254 computers on a given subnet.

Back to top

5.3 UA Little Rock Domains

5.3.1 Internet Domains

Internet domains (e.g., refer to a delegated zone from a central authority. UA Little Rock’s Internet domain is Examples of web sites hosted under the UA Little Rock domain include:;

All Internet sites for this university will reside under that ( domain. Under no circumstances will the university network host a commercial (.com) Internet site.

Back to top

5.3.2 Windows NT/2000 Domains

Windows NT/2000 domains are a collection of computers grouped for administrative convenience and to apply a consistent security policy. Refer to Appendix III for information regarding Windows security.

The primary administrative domain is BACKBONE. All faculty or staff machines must be members of this domain (or, at a future date, its replacement) except in cases of slow network bandwidth (off-campus location) or where additional security is needed.

All faculty and staff Windows user accounts will likewise reside on the BACKBONE (or its future replacement) domain. Any user account not hosted on the BACKBONE will be denied access to servers, shared files locations, shared printers, and other resources.

To group computers primarily used by students (i.e., labs), a domain dedicated to students, existing or new, will be used.

Back to top