Skip to end of metadata
Go to start of metadata
The Computer Protection Program (CPP) continuously scans LBNL computers for security flaws, a process commonly referred to as "vulnerability scanning." CPP checks for flaws ranging from bugs in services that allow remote code execution to accounts with weak passwords. Checks are performed using a variety of software, including Nessus, Nmap, and custom-written scripts.
Security incidents cost time and money. If your system is compromised, it must be backed up, rebuilt from original media, its applications reinstalled, and data restored. Recovery can be a time-consuming process and your computer will be offline for the duration. There are also costs to CPP to detect and respond to the security incident. Important considerations are the impact a system compromise has on the reputation of your project and LBNL.
CPP scanning discovers vulnerabilities ahead of the attackers. By discovering these vulnerabilities in advance, CPP can notify you about the vulnerability. The vulnerability can then be fixed before a malicious attacker exploits it. In addition, when priority warrants, CPP will isolate your host from malicious traffic to prevent it from being compromised while the vulnerability is being removed. CPP scanning can save you time and money by preventing a security incident on your host.
Create a blog post to share news and announcements with your team and company.
If you think your system is blocked, contact the LBNL Computer Helpdesk at firstname.lastname@example.org or ext. 4357.
You can also check the status of your network connection at onestop.lbl.gov.
- If you think your system is blocked, contact the LBNL Computer Helpdesk at email@example.com or ext. 4357. The Helpdesk will determine what has happened and will restore your system if its security has been compromised and/or will install any missing patches.
- Contact CPP at firstname.lastname@example.org.
- These procedures are overhead-funded