Wireless policies & network lockdown. school computers OPAC/web only research computer full workstation student laptops.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Northside I.S.D. Acceptable Use Policy
Windows 7 at NDSU During 2010, ITS will be adopting Windows 7, 64 bit, as a supported operating system During 2010, ITS will be adopting Windows 7, 64.
Moving Your Computer Lab(s) to the Cloud Rick O’Toole & Dave Hicking University of Connecticut Libraries.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
PC Security 101 Keeping your data and your computer safe.
Securexam Student Information Session November 9, 2011.
Digital citizenship 21st century learning.
Wireless policies & network lockdowns Deb Ranard Scott Matheson.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 6 Enterprise Security.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
Pay Attention! Erin Wolfe 5/1/08 CC 590. Many universities are requiring students to purchase laptops Free wireless internet access is very common on.
Al Williams / DLT October 13,2009
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
OIT's Unity Labs Active Directory Windows Environment.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
E - Safety What is it?. When do we need to be e-safe?
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
+ Navigating Campus Technology Presented by Stephanie Jasmin.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
WNAG: Advisory Report Presented to: UCIST by: Stephen Sempson.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Information Technology School of Nursing. LHSON Technology Computers –PCs with Win 7 and Office 2013 Computer Lab –Open 24/7 Printing –LRC and Computer.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Digital Citizenship: Active Participants in a Digital World.
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
ETHICS and COMPUTERS An Overview 23/04/2017.
IT Staff Survey Overview Over 1,300 responses were received. Staff across all faculties and support services were represented. 50 % of respondents.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Nebraska Training Webinar March 17, Welcome!  Maryjan Fiala, Coordinator  Central Community College, Cargill Community Learning Center  Ryan.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Company LOGO School of Nursing Information Technology.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.
Natick Public Schools Technology Update October 6, 2008 Dennis Roche, CISA Director of Technology.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Unit 11 - Computer Networks Assignment A Investigation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Smarter Balanced Assessments: Chromebooks and Tablets and More, Oh My! [Handouts, PPT, and links posted.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Orientation - students IT Department. Agenda – IT services Help Desk office Computers (PC labs) Print services Wi-Fi network UNYP IT accounts.
Policies, Pitfalls and the Pursuit of BYOT Dave Mirra Jay Cooke Stafford County Public Schools.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
LIT 100 Ethics, Infrastructure, and Troubleshooting This introduction course is 1 hour long and takes new staff through the minefield of computer ethics,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Digital Citizenship Grades 4-6
Introducing, Installing, and Upgrading Windows 7
IT Information for Graduate Students
Otterbein University Welcomes Class of 2021
HARDENING CLIENT COMPUTERS
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

wireless policies & network lockdown

school computers OPAC/web only research computer full workstation student laptops

OPAC/web only older x86 Windows XP SiteKiosk physically remote & scattered

research computer newer iMacs Mac OS X (10.3) refreshed by script physically close, well watched

full lab workstation new x86 (Dell) Win XP XP User accounts (tied to AD) AD-enforced law students only

network policies wired or wireless: same local network is open internet requires MAC self-registration router enforced

classroom policies all rooms have wired desks no “off switch” for professors most rooms now have wifi — intentionally or not access is similar throughout the building

summary: student open access from my computer pretty open from lab computers fairly open library computers pay-to-print

summary: guest no internet access from my computer fairly open library computer can save to USB or CD-R no word processing pay-to-print

levels of locking our computers: locked +/– their computers: patched (we hope) could require control software classroom network: no “off” switch could provide faculty a big red switch could limit access (students would rebel)

the more the better less CONTROL or TRUST more

exam policies

other resources printing on Pharos UniPrint, 7¢ students get $50/year credit free west/lexis Blackboard communities lists are staff only

issues students surfing in class exam honesty/collection inappropriate network use list abuse printing abuse

issues: solutions we can (and do) address these issues with technological “locks” does this really solve anything? what messages does it send?

are locks a solution? detriment to technology literacy encourage “helpless” users communicate lack of trust unlocked cabin deadbolts on NYC apartment

are locks a solution? give us a false sense of security annoy legitimate users seldom stop determined bad guy undermine professional values

professional values ABA Model Rules of Professional Conduct, Rule 8.4(c): It is professional misconduct for a lawyer to: … engage in conduct involving dishonesty, fraud, deceit or misrepresentation;…

professional values expectations for new lawyers are clear, why should law students be different? community values protecting a community good even non-lawyers will likely enter a field with similar expectations

suggestion student laptops enough restrictions to keep them out of real trouble (require patches and antivirus) open enough to allow experimentation profs/staff set rules peers address disruptive activity directly

discussion open/closed balance technology literacy honor codes personal ethics outside pressures