Impact of the Recent UC Denver Remote Computing Audit May, 2010.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
HIPAA Security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
UCD IT Services Update January, UC Denver IT Overview IT Services (central IT organization) facilitates IT policy/governance and provides “core”
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
Remote Access Network Management Kelly Given Allison Traina.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Remote Access Mark Nicolay Computing & Communications.
Penn State University College Of Education Understanding College of Education Resources.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Your storage on the ground; Your files in the cloud.
Internet.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Chapter 7: Using Windows Servers to Share Information.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Introduction to VPN for MVS. Presented by Kevin D. Burney Computer Systems and Network Architect Office of the Vice Chancellor of Budget and Finance.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
The School District of Philadelphia Office of Information Technology Division of Technology Services Gary Brookstein Carmen Verrilli “Collaboration
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Ch CHAPTER The Internet and the Web Irfan A. Ilyas Lecture 23.
 Standardized version of software / operating system  Enhance the user experience  Minimize login time  Automated installation of software  Simplify.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Computing at HSSOE Lisa Preble Instructional Lab Manager & Faculty computer support contact
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Data Security Project PROJECT WRAP-UP Timeline – July 2011 through December 2012 Project Charge – Compile resources and best practices for the proper handling.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
EasyAccess 2.0 A secured way to remotely access your Weintek HMIs and their PLCs Wherever they are on the globe.
Server Administration, Server Management and Networking Alokes Chattopadhyay.
Chapter 7: Using Windows Servers
ZIMBRA DESKTOP USER MANUAL
Office 365 is cloud-based productivity, hosted by Microsoft.
Instructor Materials Chapter 5 Providing Network Services
Self-service enrollment for Windows desktops
CompTIA IT Fundamentals Study Guide (FC0-U51)
Welcome To : Group 1 VC Presentation
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
Connecting Remotely Winter 2014.
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
Presentation transcript:

Impact of the Recent UC Denver Remote Computing Audit May, 2010

Summary of Changes to Campus IT Services (2-Year Phase-In) Consolidate and simplify IT policies as part of current campus initiatives Develop new policy language that explicitly covers the definition of remote computing and how devices are secured Require that all devices connecting to campus (via a non-campus remote network) have passwords, security patches and are encrypted. Four methods available to securely access campus computing/data: Web-based remote desktop (mydesktop.ucdenver.edu) will replace majority of virtual private network (VPN) services Security monitoring software (fee-based) for users who have a business need to continue using VPN technology Webmail Smartphones that are Blackberry or ActiveSync compliant Faculty, staff and students should select a smart phone that can be encrypted at their next contract renewal. A list of example devices will be published on the IT Services website soon.

Before/After Implementation If you currently access campus information remotely via… The impact after implementation is… Webmail (webmail.ucdenver.edu) using a desktop, smartphone, or any other type of computer No change. Blackberry smartphone (requires license fee and setup by ITS)No change. This is the recommended solution for safe, secure usage via smartphone at UC Denver. iPhone 3Gs or 4 smartphone configured to use campus system (Microsoft Exchange) Beginning January, 2011 these phones will have settings automatically downloaded requiring a password, encryption and “auto lock” of the screen after a time delay. iPhone 3G or older smartphone configured to use campus system (Microsoft Exchange) Discontinuing support in May, Individuals must upgrade to a newer model iPhone (3Gs or 4). Droid or other Android-based smartphone configured to use campus system (Microsoft Exchange) Beginning January, 2011 these phones will have settings automatically downloaded requiring a password and “auto lock” of the screen after a time delay. We will have to discontinue support after May, 2012 if manufacturer does not offer the ability to encrypt the phone. Virtual Private Network (VPN)Beginning June, 2011 must install security monitoring software and encrypt the computer (requires license fees and setup by ITS) OR use web-based remote desktop solution (mydesktop.ucdenver.edu) OR webmail. Secure shell (SSH), telnet, file transfer protocol Individuals and/or units will need to work with ITS on how to comply with audit findings. Direct Simple Mail Transport Protocol (SMTP) or Internet Message Access Protocol (IMAP) download (similar to how personal is downloaded from Comcast or Qwest) Discontinuing support in January, Use webmail or web-based remote desktop solution (mydesktop.ucdenver.edu).

Launch Awareness & Communication Campaign Consolidate and simplify IT policies Require passwords for all smart phones Discontinue non- secure transmissions (POP/SMTP/IMAP) Transition campus from VPN to web- based remote desktop Require encryption for all smart phones June, 2010 January, 2011 December, 2010 January, 2011June, 2011June, 2012 Remote Computing Audit Remediation Timeline