CERN must be protected against any kind of successful large-scale attack, while maintaining a balance between security, academic freedom and the use of accelerators and experiments
All owners of computing resources connected to or provided to them by CERN’s computing facilities are ultimately responsible for the compliance of their actions and their resources with these Rules
35 years ago, on 9 October 1989, the CERN Computer Security team issued for the first time a “Computer Virus Warning to all users of IBM Compatible PCs”
If we want to protect CERN and to have a decent level of security, we cannot avoid deploying a certain set of computer security measures… and they all come with inconveniences
If you’re interested in what’s going on at CERN, in professional projects and plans, or in private problems and parties, hanging out at one of CERN’s printers is a very effective approach…