Johnson & Wales Kate E. Smith, PMP Senior IT Project Manager.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

© , Actuate Corporation Engineer Orientation IT Facility.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Campus Computing Basics The College of St. Scholastica.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
C AMPUS C OMPUTING AT SUNY O SWEGO Joseph Moreau, Chief Technology Officer Nicole Decker, Assistant Director – User Support.
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How to use Windows Live Account for JJC & eResources Presented by: Rama Raghuraman Assistive Technology and Computer Systems Specialist Student Accommodations.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Penn State University College Of Education Understanding College of Education Resources.
Effective Customer Service: Exploring the process from beginning to end.
Induction in IT Services for New Students IT Services Training Team.
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Otterbein University Welcomes You New Student Information Guide Sep 2010.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Division of Information Technology What You Need To Know About Technology On Campus Welcome!
Information Technology Readying Your Computer on Campus Resident Students.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Troubleshooting Windows Vista Security Chapter 4.
University Health Care Computer Systems Fellows, Residents, & Interns.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
Networks.
Computer Labs Orientation September 2003 Prepared by Computer Services.
Who are Orakelet? l IT-support service for students and employees at the University of Tromsø l IT-support service for the student hostels owned by studentsamskipsnaden.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
BroncoFusion September 25, 2013 Instructional & Information Technology (I&IT) Carol Gonzales, Assoc. CIO, Projects & Support Candie McDougall, Lead,
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Division of Information Technology Information Technology at the University of Maryland Welcome!
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
NETWORKING & SYSTEM UPDATES
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2016 Orientation: Parent Presentation.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Vista Configuration MCTS : Productivity Applications.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Managing Windows Security
Technology and You!.
What they are and how to protect against them
Student Monmouth College
IT services Miki Kallio Liaison Manager (IT and Research), PhD
Discovering Technology
G061 - Network Security.
Presentation transcript:

Johnson & Wales Kate E. Smith, PMP Senior IT Project Manager

Agenda J&W Account Information Residential Network Network Admission Control (NAC) Computer Labs Telecommunications Cable TV Computer Specifications Responsible Computing

Account Information Why is needed? Primary form of J&W Provides secure access to , public folders, shared network disk space, various applications on University servers Provides access to the computer labs Address & Password Generated automatically  format is Username and default password information: uconnect  Personal Information  View Addresses

Account Information Microsoft Outlook Web Access (OWA) Web-based program Access your mail through your web browser – from anywhere on the Internet .jwu.edu

Password Reset Manager Allows you to securely reset your own forgotten password Otherwise, you must visit a computer lab Available 24 x 7 – no waiting! Requires you to set up a Q&A Profile Create as soon as you log in for first time!

Password Information Password Requirements Must contain at least six letters or numbers Cannot be the same as your username Password Expiration Passwords expire every 90 days You must change your password before it expires to keep your account active Ample warning will be given for passwords that are about to expire Password changes are required to protect your account

Spam Management – MX Spam Guard To protect from nuisance s and viruses they may carry Intelligently filters all inbound Quarantined mail is kept for 14 days, then deleted Spam Summary Report Appears in your Inbox if someone sends you messages that are possible "junk" or "spam"

J&W ResNet Each res hall room has network access Must have an Ethernet ready port and a network cable Due to an increase in devices that some students bring (e.g. gaming consoles), there may be fewer jacks than needed You can purchase an Ethernet hub to solve this problem For specific settings, visit helpdesk.jwu.edu  students  on-campus network  res net

J&W ResNet To learn how to connect gaming systems, visit “student news” on the Help Desk web site main page Personal wireless access points, routers and DHCP servers are not allowed due to security risks Peer-to-peer file sharing is restricted An attempt is made to prioritize academic traffic over entertainment traffic

Network Admission Control A network authentication and validation security system Prevents infected computers from accessing the network and infecting other computers Ensures a safe, secure and reliable network Prevents outbreaks of viruses/worms by scanning your computer for patches and anti-virus requirements

Network Admission Control To access the University network, you are required to install the NAC Agent Your computer must meet these requirements to gain full access to the network: critical Windows updates are installed the automatic updates feature is enabled antivirus software is installed virus definitions are updated

Network Admission Control If your computer does not meet the requirements, you will have temporary access to various sites to fulfill requirements J&W provides McAfee anti-virus software at no cost to all students Your system will be forced through this check on a weekly basis Keep your computer up to date!!

J&W Wireless Access Connect to the "WIFIJWU" network Open a browser and log into NAC for access Same requirements for NAC will apply Reminder: personal access points are not allowed in rooms Academic Center – All hallways CBCSI – 1 st floor lounge and 2 nd floor meeting space East Hall – 1 st floor lounge Edmund Place – Dining room and all lounges Harborside Recreation Center – 2 nd floor meeting room Hospitality Center – Dining room and 3 rd floor lounge Imperial Hall – Basement lounge John Hazen White – University Club, 2 nd, 3 rd and 4 th floor hallways McNulty Hall – 2 nd thru 7 th floor lounges Paramount Building - Library and 1 st floor mall Renaissance – 2 nd, 7 th and 9 th floor lounges Snowden Hall - All dining areas, lobby and all lounges South Hall - All 1 st and 2 nd floor lounges Washington Apartments West Hall – 1 st floor lounge Xavier Academic - All hallways and basement lounge Xavier Mercy Hall Yena Center - Library (both floors)

Computer Labs Three primary lab areas Harborside, Xavier and Academic Computer access is available in both libraries General-purpose labs and labs equipped with specialized software applications for certain curricula Students need an active J&W account to access the computers Black-and-white printing is available Duplex printing is required Students are allowed to reserve designated computer labs to practice presentations Visit helpdesk.jwu.edu  students  computer labs  providence for hours

Student Storage 50MB of server storage space available from computer lab or library machines Data stored should be considered convenient "working copies" (nothing archival or static in nature should be there) Can't store illegal or illegally obtained/copyrighted material there

Telecommunications All res hall rooms are equipped with one telephone line on the University's telephone system An analog telephone is needed to use the system Students may bring their own answering machine J&W is the customer of record for all telephone numbers in the residence halls Students must make any network service provider aware of this before signing up for credit cards, 800 service or pay-per-call services Collect calls should not be accepted J&W does not provide access to long distance service Students may want to purchase prepaid calling cards or utilize cell phones

Cable TV J&W provides one cable jack for cable TV service in each room in all residence halls Students are responsible for providing a TV and TV cable For channel lineup, visit helpdesk.jwu.edu  students  on- campus network  cable tv

Computer Specifications CPU/processorPentium 4, 1.8GHz or faster Memory (RAM)1 GB RAM or more Hard DriveMinimum: 40 GB DrivesCD-RW or DVD-RW Operating SystemMicrosoft Vista or Windows XP Professional SoftwareMicrosoft Office, Anti-Virus Warranty3 or 4 year option Security Computer lock and/or have computer engraved with name or other identifying information If you are going to purchase a new computer, here are some things to look for:

Responsible Computing Review and adhere to the Computer Use Policy helpdesk.jwu.edu  students  computer use policy Protect all passwords & never share with others! Use “strong” passwords Keep it secret just like you would an ATM number University employees, including the Help Desk, will never ask you for your password, nor should you offer it Visit microsoft.com/protect Do not participate in illegal file sharing Copyright violations Do not leave valuable equipment unattended Purchase locks!

University IT Help Desk Hours Monday-Thursday: 8a-7:30p Friday: 8a-3p (summer hours) Web site: helpdesk.jwu.edu Phone: 401-JWU-HELP ( ) or