On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung.

Slides:



Advertisements
Similar presentations
MD025 Clonezilla Server Andrew Fang. School of Information Technology Computer Systems Major.
Advertisements

Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Introduction to Computer Essentials. Information Systems 1. People 2. Procedures 3. Software 4. Hardware 5. Data.
Cloud Computing Don Young MIS 304 Professor Fang.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Module 8: Implementing Administrative Templates and Audit Policy.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
SPEEPLER Spencer Handberg and Tyler Kellond. AGENDA Introductions Project Background How it works Accomplishments Challenges How We Overcame Them Lessons.
Solids Modeling System Migration Presented By 3Tech: Ryan Scott, Jimmy Vuong, Samson Tran.
Faye Business Systems Group presents: The Top 10 Reasons Why CRM Implementations Fail.
SQL Server for Green Building By HCH Servers Ltd..
Module 14: Configuring Server Security Compliance
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
NUOL Campus Intranet (Team 5) Final presentation NUOL Intranet Project Final Presentation Team 5
Tyler Hellard, Taylor Kraft and Zachary Preece.  Project Background  Project Accomplishments  Budget  Conclusion  Acknowledgements  Question and.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
By Colin Phan, Ken Lee Marquez, Gyu Beom Choi. Agenda  Introductions  Project Information  Challenges  Successes  Lessons Learned  Budget  The.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Agenda Introductions Project Background AccomplishmentsChallenges Lessons Learned Budget The Journey Final Product Recommendations.
Interaction Styles Interaction Designs. Interaction Style Selection 1.User Centered Design – Do the users like cartoons, video? – Visually and/or physically.
Josh Garay Jake Chipperfield Connor Huskins
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Bubble Wrap Green Solutions: Kenneth Ho Rajwinder Maan William Wong.
DEA IT CONSULTING THE TEAM: DAVID CLARKE EMMANUEL CAUBALEJO ADAM WHEATON CIITS Server Infrastructure Optimization.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Microsoft Windows 2008 Features and Functionality Guy Wilkin.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Data recovery in 15 minutes or less UsingKnoppix.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Creating and Managing Networks CSC February, 1999.
Introduction to the Mac Introduction to the Mac Using Apple’s OS X with Jim Mollé Learn iT! Computer Software Training.
CyberPatriot: Operating System Security Overview 9/31/10 Joshua White Director of CyOON R&D Adam Pilbeam Lead Network Engineer
Windows Administration How to protect your computer.
WIRELESS NETWORK SECURITY TSS 3243 "WIRELESS GATEWAYS" NAME :AIZAT BIN ABDUL RAHMAN NO.MATRIK : CLASS : 2TSK2.
Prepared by K.Phani Kumar.  Introduction:  This project is aimed at developing a system by which the employees in the organization submit the bills.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Module 9: Preparing to Administer a Server
Chapter 6 Application Hardening
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
By CES Tech Connor Plouffe, Eric Gavlin, and Stephen Costa
HARDENING CLIENT COMPUTERS
Introduction to Computers
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
Implementing Client Security on Windows 2000 and Windows XP Level 150
Bethesda Cybersecurity Club
Online software and backups
BACHELOR’S THESIS DEFENSE
Module 9: Preparing to Administer a Server
SET, Inc. Software Education and Training
TitaNet Security Flaw Identification
Nicholas Novello, Shayne Gradwell, Nikolas Todd
Client/Server and Peer to Peer
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Restaurant IT Solutions
G061 - Network Security.
Tonight – Finishing off workshop
Presentation transcript:

On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung

Agenda Introductions Agenda Project Background Accomplishments Budget Conclusion Acknowledgements & References

Introductions Project Name: On Demand Internet Group Name: Coolbeans Initiative Hugh Becking: Project Leader/Hardware Specialist Gary Chung: Software Specialist Former Member: Rob Stallard

Project Background Project is based around a Cyber Cafe Customer access terminals are booted over the network Server holds the boot images for the terminals and controls when customers can access the terminals. Terminals feature web access, productivity software, and basic games.

Accomplishments Client computers successfully and automatically boot off of the network Server can successfully control Secured and encrypted C&C server Secured and locked down account on the terminals for customer access. Server also hosts a basic game server that the terminals can connect to.

Budget Item Cost Hardware Cost$ Software Cost$ Labor Cost$ Total$

Lessons Learned Do some research and testing of software and hardware before you try to implement it. Keep a backup or secondary way to access your system Review requirements for meetings and prepare for meetings ahead of time Be Flexible

Acknowledgements & References Acknowledgements Colin Chamberlain for being our project sponsor Jason Fisher for help, guidance and for getting us back on track when we went astray References Windows server 2008 r2 security baseline. (2010, September 29). Retrieved from Moussa, T. (2011, September 22). Windows 2008r2 server hardening checklist. Retrieved from R2 Server Hardening Checklist Kashyap, V. (2009, August 13). How to disable usb ports to prevent malware infection. Retrieved from disable-usb-ports-to-prevent-malware-infection/

Questions?