Skip to main content
Home
  • Home
  • About University
    • President Message
    • Gallery
  • Colleges
    • College of Administration and Economics
    • College of Veterinary
    • College of Law
    • College of Medicine
    • College of Islamic Sciences
    • College of Applied Sciences
    • College of Education
  • Centers & Departments
    • Departments
    • Centers
    • Consulting Offices
  • Staff
    • Presidency Staff
  • Programs
    • Scholarships - Undergraduate
    • Scholarships - Postgraduate
  • Contact us
  • English
  • Arabic
Home
  • Home
  • About University
      1. President Message
      2. Gallery
  • Colleges
      1. College of Administration and Economics
      2. College of Veterinary
      3. College of Law
      4. College of Medicine
      5. College of Islamic Sciences
      6. College of Applied Sciences
      7. College of Education
  • Centers & Departments
      1. Departments
      2. Centers
      3. Consulting Offices
  • Staff
      1. Presidency Staff
  • Programs
      1. Scholarships - Undergraduate
      2. Scholarships - Postgraduate
  • Contact us

Breadcrumb

  1. Home
  2. News
  3. Remote access policy

Remote access policy

News
Information Security Policy
November 07, 2024
Profile picture for user
by Anonymous (not verified)
  • facebook-f
  • twitter
  • envelope
  • print
Remote access policy

Objective: To secure university network remote access, minimizing risks and ensuring data integrity.

Scope: All remote access components, wired and wireless.

General Rules:

  • Permissions: Role-based access, regularly reviewed.
  • Credentials: Confidentiality of login data.
  • Encryption: Mandatory IPsec/SSL VPN with strong passwords.
  • Control: Access via a secure control point.
  • Logging: Centralized logs, regular reviews.
  • Device Security: Compliant personal devices, documented.
  • Network Safety: Avoid unsecured public networks.
  • Branch Connections: Secure, encrypted Site-to-Site connections.

Acceptable Policy Example:

  • Strict, role-based access.
  • SSL VPN encryption.
  • Device security compliance.
  • Regular log reviews.
  • Result: Secure remote work, verified by logs.

Unacceptable Policy Example:

  • Uncontrolled access.
  • Lack of encryption.
  • No log reviews.
  • Use of unsecured public networks.
  • Result: Data breach via unsecured connection, undetected.

Conclusion:

  • Effective policies require controlled access, encryption, and monitoring.
  • Poor policies lead to security breaches and data loss.
  • Proper implementation protects university resources.

Read more articles

Anti-virus and malware policy
Newer
Anti-virus and malware policy
Password policy
Older
Password policy
University Presidency
Profile picture for user
Anonymous (not verified)
1
min read
A- A+
  • facebook-f
  • twitter
  • envelope
  • print

logo

Metrics & Ranking Profiles

University of Fallujah in Times Higher Education ranking 
University of Fallujah in QS ranking 
University of Fallujah in RUR ranking 
University of Fallujah in GreenMetric ranking 
University of Fallujah in Webometrics ranking 
 
 

footer menu 1

  • News
  • Scientific Events
  • Announcements
  • Community Service
  • University Presidency
  • Related Links
  • Sustainability
  • Sitemap

footer menu 2

  • Alumni
  • Library
  • Journals
  • Conferences
  • Scholarships
  • Publications
  • Contact us

Contact us

  • Address: Al-Sadd Street, near the Fallujah Passport Office
    31002, Fallujah, Anbar, Iraq
  • Phone: +9647500577943
  • Official Email: [email protected]
  • Official Email: [email protected]
  • Website Email: [email protected]
All Rights Reserved © 2025, University of Fallujah
Powered by Computer & Information Center
Home
University of Fallujah
  • Home
  • About University
    • President Message
    • Gallery
  • Colleges
    • College of Administration and Economics
    • College of Veterinary
    • College of Law
    • College of Medicine
    • College of Islamic Sciences
    • College of Applied Sciences
    • College of Education
  • Centers & Departments
    • Departments
    • Centers
    • Consulting Offices
  • Staff
    • Presidency Staff
  • Programs
    • Scholarships - Undergraduate
    • Scholarships - Postgraduate
  • Contact us
Clear keys input element