1 Developing a Data Management Plan C&IT Resources for Data Storage and Data Security Patrick Gossman Deputy CIO for Research January 16, 2014.

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
What is the “Cloud”? Eric Moore Computer Users Group of Greeley November 8, 2014.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Let’s Get Set Up By Michael Crawford. Situation at Hand Basic Needs ◦ Budget of $25-50,000 ◦ Connection to an ISP to access internet Security ◦ Network.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Module 1 – MIS Careers & Intro to Systems Architecture MIS5122: Enterprise Architecture for IT Auditors.
F1031 COMPUTER HARDWARE CLASSES OF COMPUTER. Classes of computer Mainframe Minicomputer Microcomputer Portable is a high-performance computer used for.
November 2009 Network Disaster Recovery October 2014.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
Effectively Explaining the Cloud to Your Colleagues.
 Cloud Computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.  Your software applications.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
Computer Lab Teachers are welcome to change or add slides within this presentation to suit the needs of their students or better accommodate the structure.
Corporate Information Systems Delivery of Infrastructure IT Services.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
 System of computers and peripherals that are linked together  Purpose › Share files › Share hardware › Share data › Share software › Transfer funds.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 2.
Chapter 6 of the Executive Guide manual Technology.
Deans/VPs Meeting January 2009 UB’s Strategic Plan for IT Elias G. Eldayrie CIO.
Campus Computing Resources for Researchers Rutgers University Office of Information Technology Presented By:Joe Sanders University Director, OIT Rutgers.
Chapter 8: Operating Systems and Utility Programs Catherine Gifford Dan Falgares.
1 Data services and computing. 2 We tend to be dealt the computing environment in which we must operate. Few of us have enough influence to steer the.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
September 19, 2002CSG - Seattle1 Toward Sustainable Models for Funding IT in Higher Education Common Solutions Group September 19, 2002 Jack McCredie.
Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
CLOUD COMPUTING. What is cloud computing ? History Virtualization Cloud Computing hardware Cloud Computing services Cloud Architecture Advantages & Disadvantages.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Communications & Networks National 4 & 5 Computing Science.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Introduction TO Network Administration
Bio-IT World Conference and Expo ‘12, April 25, 2012 A Nation-Wide Area Networked File System for Very Large Scientific Data William K. Barnett, Ph.D.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Galaxy Community Conference July 27, 2012 The National Center for Genome Analysis Support and Galaxy William K. Barnett, Ph.D. (Director) Richard LeDuc,
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Computing Strategies. A computing strategy should identify – the hardware, – the software, – Internet services, and – the network connectivity needed.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Our Mission. Computer Purchasing Website Design and Development Services.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Vodafone Business Cloud
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Ben Rogers August 18,  High Performance Computing  Data Storage  Hadoop Pilot  Secure Remote Desktop  Training Opportunities  Grant Collaboration.
«My future profession»
Server Machines By Brett Gunder COSC 101.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Clouds , Grids and Clusters
Cloud Computing.
UNIT 19 Data Security 2.
3.2 Virtualisation.
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Welcome To : Group 1 VC Presentation
IS4550 Security Policies and Implementation
IT Development Initiative: Status & Next Steps
Emerging technologies-
IS4680 Security Auditing for Compliance
Online software and backups
ENA Cloud Services.
LO3 – Understand Business IT Systems
Toward Sustainable Models for Funding IT in Higher Education
Presentation transcript:

1 Developing a Data Management Plan C&IT Resources for Data Storage and Data Security Patrick Gossman Deputy CIO for Research January 16, 2014

2 Key Goals  Preserving Your Data  Protecting Your Data from unauthorized access or tampering  Providing Secure Access to Your Data

3 Is this you?

4 What do you see?  Office environment –Secure? –HVAC/Electrical?  Backup next to computer?  Both devices very portable  Self maintained equipment?

5 Key Data Questions  Is this your only copy?  Is this your only backup?  What if someone steals your computer or external hard drive?  What will you do WHEN your disk drives fail?  Can you regenerate data or pull down a copy from elsewhere?

6 Key Access Questions  Is your environment secure?  Water? Electrical problems?  Who has access to your computer or local server?  Operating system vulnerable?  Has your security been tested? Security audit? Penetration test?

7 How C&IT Can Help  Consulting  Assistance with preparing grants  Computing, data storage and security solutions

8 Resources  High Performance Computing Grid –Free access and some storage –Buy-In for a priority cluster (free mgt)  Colocation of your physical server –Physical security, power (free) –file backup (fee)  Hosted services under VM (fee) –Server and file backup included –Good solution for a Web server

9 HPC Grid  Research and teaching  Free access  Multiple queues  Two main architectures –High core (64 per processor) –Faster processors (8 cores each)  415 TB of High Speed Storage 

10 Colocation

11 Virtual Machines (VM)

12 Other Resources  Special data storage/replication solutions  Virtual Private Network  SSL Certificates  Nessus (vulnerability) scans  Penetration testing (fee)  Science DMZ for fast and secure data transport

13 Science DMZ?  Demilitarized Zone  Separate high-speed (10 gbs) network with restricted access  Funds - Physics/C&IT NSF grant  Uses –Move large (TB size) files between instruments/data repositories –Provide low-latency, real-time connections to instruments or performers

14 10 Gbps Science DMZ Physics Mott CompSci Medicine C&IT To Universities, National Labs, Businesses via Internet2, ESnet, LHCNet, LHCONE… Funded by NSF grant to Physics/C&IT. Est. completion June, 2013

15 Wish List  More storage  Private cloud  Desktop backup  Cyberinfrastructure (Research Computing) Strategic Plan --- Have you answered the survey?

16 Links  C&IT computing.wayne.edu  Colocation and Hosting Services computing.wayne.edu/services/hosting.php  High Performance Computing

17 C&IT Contacts Hosting David Thompson, lead applications technical analyst ( HPC Grid Aragorn Steiger, senior systems software engineer (313) Michael Thompson, lead systems software engineer ( Any research question Patrick Gossman, PhD, Deputy CIO, Research (313)