Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries.

Slides:



Advertisements
Similar presentations
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Advertisements

Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Breaking Trust On The Internet
Internet, Intranet and Extranets
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Sangeet Bhullar Director, WISE KIDS Promoting Positive and Safe Internet Use WISE KIDS Pilot Internet Mentor Programme.
Threats To A Computer Network
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Magic Jack Magic Jack is a computer attachment that, in combination with telephone service from the related YMAX Corporation, provides internet-based.
The Microsoft vision for Unified communications James O’Neill IT pro evangelist, Microsoft UK
By Janea Tate  Skype is a software application that allows users to make voice calls over the Internet. Calls to other users within the Skype service.
David Birch Melquan Huntly Ledin Romero Tia Edwards.
What’s this “Skype” thing? Katrina Belogorsky Skokie Public Library July 19, 2011.
Title Date. Play video [:30 seconds]video Micael BergerDaniel Alm ProduktchefTeknisk säljspecialist.
1 Computer Security: Protect your PC and Protect Yourself.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Threats to I.T Internet security By Cameron Mundy.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
LESSON 3 – ONLINE COMMUNICATION Mr Cole. ONLINE COMMUNITIES  People who are computer literate, and have the equipment, can form groups or ‘societies’
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
Lecture 5 Title: Networks and Businesses
IPNexus Briefing Instant Messaging and Collaboration.
Virtual Workplace Prepared By Bassam Kehail
Introduction Our Topic: Mobile Security Why is mobile security important?
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Using Skype. Overview What is it? –Skype is a software based VOIP application and network. What is VOIP? –VOIP = Voice Over Internet Protocol.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Venique Harris Shenae Wint. (FTP) -File Transfer Protocol (FTP) is the name given to the transfer of files across the Internet. i.e a standard protocol.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
FITT Fostering Interregional Exchange in ICT Technology Transfer Communication & Collaboration Tools.
Specialist communication channel. Sarah-Jane king.
Technology to enhance WBL Chris Turnock Head of LTech Northumbria University
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network Security & Accounting
CYBER INTERACTION & COLLABORATION MODULE 4. LEARNING OUTCOMES By the end of this module, you should be able to: 1.Identify current digital tools for communication.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
Communications and Collaboration. Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
Multi - Site Collaboration Systems Senior Design & Development - Spring 2016 Dan Jarvinen.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.

SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
The best independent Business Instant Messenger any organization can get.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
How To Remove Flooders?-Get Help Website:
By Asma Hamad Alharbi.
Port Knocking Benjamin DiYanni.
A Digital Tool for the Classroom
Living in a Network Centric World
Living in a Network Centric World
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Malware, Phishing and Network Policies
Progress leisure OCR GCSE ICT.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Ian Ramsey C of E School GCSE ICT Smart working Any time, anywhere.
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Protocols 2 Key Revision Points.
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Presentation transcript:

Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Malware 15 years to end 2007 – 358, ,000 in 2007 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)

What are the dangers ? Keyloggers – Get your passwords – And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack

How does it happen ? Opening an attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website

Why do they do it ? Financial gain What damage can they do? Slow PC/system Crash system

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 Scenario: You want groups of students studying at various universities across the world to collaborate on a group project with external business partners. Can this be achieved without compromising IT infrastructure of all partners?

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September Collaborated with 4 Industry Partners and 6 Universities partners On the Move II: Mobile Computing Now On the Move I (Design for Experience, Imagining a Notebook and Futures of Mobile Computing) Thinking Outside of the Box (Product /Service Design) Constructing Constructs (Constructing Luxury and Constructing Technology) Global Heath, Local Solutions (Well-Being and Vitality) Entertainment on the Go 6 Projects

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September June

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009

Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand

So… We tested various collaboration tools Plone - problematic Choose Wordpress – more user friendly, easy to administer

Skype Skype got a bad reputation Seen as a threat by network security Its traffic is encrypted Its protocols were kept secret It commandeered PCs for its own purposes

So… We initially had a dedicated wireless network We now have it on our normal wireless network If there are no issues we would consider it on main network

FTP Huge security risk Do use a bit of Secure FTP (SFTP) Not sensible to open up your systems to allow other people to send you files

Instant Messenger We needed a corporate version Self installers use ‘external authentication’ Contacts needs to be self populated

So… We chose Office Communication Server Works well internally Now communicates externally

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 JISCinfoNet Project: Goal is to support collaboration using ICTs between the university and its external collaborative business & community partners Objectives: ICT tools enable secure exchange of information ICT tools embedded into university IT infrastructure Groups (staff/students) able to collaborate

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 The Open ICT Tools

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 Wikis Videoconferencing Teleconferencing VoIP (Voice over Internet Protocol such as Skype) Blogs Instant messaging Interactive Whiteboard Technology FTP Plone 2009

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 Wikis Videoconferencing Teleconferencing VoIP (Voice over Internet Protocol such as Skype) Blogs Instant messaging Interactive Whiteboard Technology FTP WordPress 2010

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 JISCinfoNet Project: What would be a marker of success?

Open ICT Tools JISC infoNet project Northumbria Conference 2009 Tuesday 8th September 2009 JISCinfoNet Project: Markers of success: Usability & accessibility of chosen tools Use of open source software Tools compatible with university IT infrastructure Collaboration within project teams

NORTHUMBRIA UNIVERSITY IT SERVICES AND LTECH HELP YOU? How can