What is the OITMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet, and other institutions.

Slides:



Advertisements
Similar presentations
Hub A hub is a device that connects PCs together All hubs Contain multiple access ports the hub simply forwards the packets to all the other devices connected.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
What is the OSTEMMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OSU, OneNet, and other.
What is the OSTEMMP?  The Oklahoma Science, Technology, Engineering, and Mathematics Mentorship Program is an educational outreach connecting IT professionals.
Johnson Logistics Solutions Office of Systems and Information Technology.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Network Terminology … Remember: Knowledge is Power!
System Software, functions of an operating system
What is the OITMP? o The Oklahoma Information Technology Mentorship Program is an educational outreach connecting IT professionals from OU, OneNet, and.
First of all, set your Keyboard Language. This may have changed correctly when "Time and Currency" option was selected, if not change as needed. Click.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
A Day in the Life of a Network Professional Jim Glover Network Manager Oklahoma Department of Corrections.
INDEPENDENT PROFESSIONAL RECRUITERS ORGANIZATION. RECRUITING. REDEFINED. COMBINING TECHNOLOGY WITH RECRUITING EXPERTISE.
Wireless Networks. Why go wireless? C Don’t have to be tied to a N, furniture or infrastructure Can retrieve , access the Internet, a corporate database.
Management Information Systems/Information Technology and Engineering Lynnetta Eyachabbe – Technology Strategist for the College of Engineering Lisa Morales.
Epworth Villa Tony Gaeddert Directory of MIS (Management Information Systems) Men’s Coffee August 20, 2007 Computers and Technologies Management Team.
Presentation Design & Delivery Word Processing & Publishing.
Wireless policies & network lockdown. school computers OPAC/web only research computer full workstation student laptops.
Introduction. » How the course works ˃Homework ˃Project ˃Exams ˃Grades » prerequisite ˃CSCI 6441: Mandatory prerequisite ˃Take the prereq or get permission.
What is the OITMP? o The Oklahoma Information Technology Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet,
Introducing… …taking desktop computing to the cloud making business effortless!
Making money from network security David Strom CMP Xchange Emerging Techs October 2002.
What is the OSTEMMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OSU, OneNet, and other.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
Security Issues, Ethics, & Emerging Technologies in Education
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
Online Marketing Basics AWESOMELY PROVOCATIVE INFO FOR SUCCESSFUL RELATIONSHIPS ONLINE Lee Brogden Culberson | ProfessionalMojo.com.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
A Day in the Life of a Network Professional Jim Glover Network Manager Oklahoma Department of Corrections.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Protecting Students on the School Computer Network Enfield High School.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
COMP1321 Networks in Organisations Richard Henson March 2014.
TECHNOLOGY TERMS BY:SHAQUILLA WATSON&SIMONE TAYLOR.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Networking Components BY: JOSON ABRAHAM LTEC 4550.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
OITMP David Stone University of Oklahoma. A little about OITMP The Oklahoma Information Technology Mentorship Program (OITMP) is an outreach initiative.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Smarter Balanced Assessments: Chromebooks and Tablets and More, Oh My! [Handouts, PPT, and links posted.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
1.4 wired and wireless networks lesson 1
Unit Communication Hardware
Introduction to Computers
Oklahoma Information Technology Mentorship Program
Oklahoma Information Technology Mentorship Program
Tony Gaeddert Directory of MIS (Management Information Systems)
Firewalls Routers, Switches, Hubs VPNs
IS4680 Security Auditing for Compliance
Unit 36: Internet Server Management
Online Learning.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
To connect to the Internet, you must record the computers’ MAC Address. Follow these instructions. Click on Start Then Run.
Sending Binary Messages- Internet
Presentation transcript:

What is the OITMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet, and other institutions with students in the technology field. o It is part of an NSF grant to enhance Oklahoma’s educational and research capability through network improvements. 2

Job Shadowing o The goal: IDENTIFY, DEVELOP and RECRUIT Talent o Activities include: o Presentations to students throughout OK o Job shadowing opportunities (on-site & virtual) 3

Job Shadowing o On-Site o Schedule a time with us to see what we do! o Virtual o us at (OU IT Network o Facebook: 4

Other Opportunities/Resources o Jobs at OU o o Jobs at OneNet o 5

About This Presentation o What do I do in the IT field? o Lessons learned for getting this job. o Recommendations for keeping the job. o Being successful in this field. 6

About This Presentation (cont.) (But not this time…) 7 [Cyber Security] Things that keep Me awake at night…

Number 5… The Users…

Number 5… The Users…

Number 5… The Users… Too intimidated to ask questions Only has a computer because a grandchild gave it to him Assumes all s are legitimate Typically a member of several botnets

Number 5… The Users… Too intimidated to ask questions

Number 5… The Users… Fluent in at least three languages, including Klingon, Gallifreyan, and the binary language of moisture vaporators. Devorkian keyboard layout. Member of a local Cyber Security club. Calls Help Desks to let them know what is wrong. Extremes

Number 5… The Users… Calls Help Desks to let them know what is wrong Too intimidated to ask questions

Number 5… The Users… Calls Help Desks to let them know what is wrong Too intimidated to ask questions The rest of us…

Number 5… The Users… Calls Help Desks to let them know what is wrong Too intimidated to ask questions The rest of us… AKA: “ID10T” “Loose nut between keyboard and chair”

Number 5… User education is important!!!

Number 5… User education is important!!!

Number 4… “Expectation” vs. “Reality” Example: The “firewall”…

Number 4… The “Firewall”… (or: “User Expectations”) Internet Users assume that there is a “firewall” between them and the Internet.

Number 4… The “Firewall”… (or: “User Expectations”) Internet EXPECTATION: This “firewall” is a “morality filter” that separates the “good” from the “bad”.

Number 4… The “Firewall”… (or: “User Expectations”) Internet REALITY: IT knows that firewalls are just a “screen door”.

Number 4… “Expectation” vs. “Reality” Firewall is just one example… IT is watching everything that I do… Wireless is available everywhere for free… My antivirus software can clean up anything… What works at home should work in the corporation…

Number 3… Governance and “Big Data”

Number 3… Governance and “Big Data” Active Directory

Number 3… Governance and “Big Data” Active Directory NetFlow Data

Number 3… Governance and “Big Data” Active Directory MAC Address Database NetFlow Data

Number 3… Governance and “Big Data” Active Directory MAC Address Database NetFlow Data Syslog Data

Number 3… Governance and “Big Data” Active Directory MAC Address Database NetFlow Data Syslog Data Wireless Location

Number 3… Governance and “Big Data” Independently, these are “benign”. Tie them together, and you may create privacy concerns! Worse yet, who watches the watchmen?

Number 2… Next Generation Networking

Number 2… Next Generation Networking

Number 2… Next Generation Networking SDN

Number 2… Next Generation Networking SDN Cloud Computing

Number 2… Next Generation Networking SDN Cloud Computing Circuit-Based Networking

Number 2… Next Generation Networking SDN Cloud Computing Circuit-Based Networking

Number 2… Next Generation Networking Security Policies have yet to be developed!

Number 1… Internet of “things”…

Number 1… Networks used to be simple:

Number 1… Now everything is network attached:

Number 1… But what about the “protocols” used?

Number 1… But what about the “protocols” used? Location

Number 1… But what about the “protocols” used? Location Over-the-air transmission

Number 1… But what about the “protocols” used? Location Tunneling Over-the-air transmission

Number 1… But what about the “protocols” used? Location Tunneling Over-the-air transmission Firewall Traversal

Number 1… But what about the “protocols” used? Users assume that the devices that they connect to are both KNOWN and TRUSTWORTHY!

If you got ‘em, ask ‘em!

Please take a moment to fill out the evaluations… or NOT! The evaluations are completely optional! No personal or personally identifiable data is collected. Data is used by the grant providers to gauge success. Evaluation Time!

The End (about time too…) (and now for Chris Mallow…)