Frequently Asked Questions

Information Security Frequently Asked Questions

Forward the following information to date/time of attack, intruder information, intruder’s IP, port numbers and logs.  Logs are important; submit all logs, e.g. Firewall/Event logs as evidence to assist on the investigation.  We may be able to contact the perpetrator and resolve the incident.

Scanning or Probing is a technique hackers use to gather as much information as possible about a an application and/or a network infrastructure. The hacker looks for vulnerabilities to exploit and when found, uses the vulnerability to gain access to your computer or network.

If you detect that someone has attempted to access, scan/probe, or “break into” a computer without authorization, please send the logs of the access attempts to  For assistance in obtaining the logs call the IT Help Desk at ###-###-####.

Cracking includes breaking into computers or computer systems without authorization and copying, altering, deleting or destroying files or creating new files which may be destructive to existing data or to the system. These activities are illegal under the Louisiana Computer Crimes Act and may constitute a felony.

Notify the IT Security Office at 337-482-1597 or Change all of your passwords IMMEDIATELY. Please keep notes and report any unusual behavior or contact.

Encryption is the process of obscuring information to make it unreadable without special knowledge.  There are many legitimate uses for encryption; however, use of encryption tools for purposes of violating policy or law is prohibited.

UL Lafayette Information Technology promotes network security and coordinates response to unauthorized accesses. This includes working with local supporters, computer users and our Internet Service Provider to protect the campus from network intrusions, denial of service attacks and other unauthorized or inappropriate activities that impair network access and use.

Do not retaliate against senders of chain mail or unsolicited mailings. This will only aggravate the situation and complicate your position by making you a party to the policy violation. UL Lafayette Information Technology has an anti-spam.  All students, faculty and staff are automatically subscribed to this service. The solution protects more than 22,000 students and employees from the estimated 700,000 to over a million spam messages sent to the university's email servers every day. 

For more information on spam filtering go to:

For information regarding computer law refer to the following sites:

Computer Fraud and Abuse Act 1986 (US) 18 USC 1030

Louisiana Computer Crime Statutes
Louisiana Revised Statute 14:73, which sets state law for computer crime including offenses against intellectual property, destruction of computer equipment, and committing computer fraud.

The Digital Millennium Copyright Act

A copyright infringement is when you download, store, use, copy, and/or share something created by someone else without the permission from the person or entity who created it.  Violating a copyright is against UL Lafayette policy and Federal/State law.  Title 17, Chapter 12, Section 1202, of the United States Code and the DMCA (Digital Millennium Copyright Act) of 1998 criminalizes and heightens the penalties for copyright infringement on the Internet.

Louisiana Criminal Statutes cites several acts which constitute computer crime. Some examples include unauthorized access of a computer, using a computer to commit fraud or control monies and threatening and harassing emails.  Please view the link below to read the Louisiana Computer Crime Statutes.

If you need to report an incident, please email or call 482-1597.  For more information on services provided by IT, go to:  If the incident is a loss of physical assets or you feel threatened by any form of computer communication, retain as much of the evidence as possible and contact the UL Lafayette Police Department.

We aid the police in many investigations; however, these types of situations fall under police jurisdiction.

A computer security incident is an instance where a computer has been used as a tool to perform an act that violates university policy or the law.

These and other devices allow multiple computers to connect to a network jack. They require approval by the Telecommunications department before they can be installed.

If your notebook/laptop comes with a wireless Ethernet card then you will be able to connect to the Internet without a LAN cable.

Wireless connectivity is not offered everywhere; a wireless coverage map can be viewed at WEBSITE LINK.

It is against UL Lafayette policy to use another’s account without authorization. Failure to comply may result in suspension of the User ID or other action as outlined in policy or federal/state law.

Contact the IT Help Desk for further informaion (###-####).

There are many ways to clean an infected computer. Antivirus software can assist; however, many times there are malicious applications other than viruses which need removed.

Currently we recommend Windows Defender, which is a free application for genuine Microsoft Windows operating systems:

You must have antivirus software. UL Lafayette retains a site license for Sophos Endpoint Protection.  Standard University machines come pre-configured with this software.  Non-standard machines including MacIntosh, etc. can download a copy on the Helpdesk website.