WINS Monthly Meeting www2.widener.edu/wins 04/04/2008 www2.widener.edu/wins

Slides:



Advertisements
Similar presentations
Alabama’s Ban on Texting While Driving 32-5A-350
Advertisements

Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
PRODUCT FOCUS 2/3/14 – 2/14/14 INTRODUCTION Our Product Focus for the next two weeks is VMware. VMware is the current industry leader in server / data.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
ONLINE LEARNING ORIENTATION West Georgia Technical College Dr. Rosalita Troutt.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Winner Follow Me Presented by Telecom Transborder Services.
Chapter Presidents’ Winter Meeting January 22, 2011.
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
April, 2008 Microsoft Rights Management Service (RMS) Review.
1. 2 MySpectrum Enrollment May 12th, 2010 Meeting Format All phone lines will be muted. To ask a question, use the chat window as shown to the right.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
A personal account An autobiographical recollection of the parallel development of “e” technology and my industry.
New Employee Orientation Session 2: Human Resources Classified Employees.
METRO TORONTO CONVENTION CENTRE | NOVEMBER 08, 2011 | TORONTO Proprietary and Confidential | © 2011 Avaya Inc. All rights reserved. MOON only as background.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
JURY Janaya Di Pietro. INTRODUCTION A jury is a group of ordinary citizens brought to a court to hear evidence and decide on issues of fact on the basis.
Call Control Toolbar Introducing the simplest call control interface in the telecom industry!
Directors’ Duties in the On-line Environment Simon Rubenstein Solicitor ASIC.
Region 5 Portal Registration Guide 1 Portal Registration: A Quick Start Guide 12/31/08 Aum Sri Sai Ram Sathya Sai Baba Centers of North Central Region.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Whiteboard Zoom In Attend a train-the-trainer session on value- added models in spring or summer 2014 Get Training Develop and implement plan for distributing.
Parent Orientation 2011 Presented by: Elvis Rushing Director of Technology.
WINS Monthly Meeting www2.widener.edu/wins 10/12/2007 www2.widener.edu/wins
Winning Wireless Applications Corina Moore PrinterOn Corporation
WINS Monthly Meeting WINS Support (610) /06/2011
WINS Monthly Meeting 10/1/2004 WINS Monthly Meeting 10/1/2004.
WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 www2.widener.edu/wins.
Welcome to EDUC 2110, 2120, & 2130 Field Experience Julie Gray Certification Office University Hall Room 340 Augusta State University.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins
NAGE IT REPORT December 2015 MICHAEL ARIAS – IT DIRECTOR.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /05/2008 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 6/2/2006 www2.widener.edu/wins
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
WINS Monthly Meeting www2.widener.edu/wins 11/02/2007 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 www2.widener.edu/wins.
WINS Monthly Meeting www2.widener.edu/wins 5/5/2006 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 www2.widener.edu/wins.
Page 1 of 17 To the ETS – Password Reset Online Training Course Clients have the ability to automatically update passwords at any time through the automated.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /07/2008 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /04/2011 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /02/2008 www2.widener.edu/wins
1 Fortinet Confidential What is the Campaign Messaging? Campaign Messaging/Overview Today’s enterprise is increasingly looking to upgrade traditional firewalls.
WINS Monthly Meeting www2.widener.edu/wins 10/05/2006 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 12/01/2006 www2.widener.edu/wins
WINS Monthly Meeting 02/04/2011
WINS Monthly Meeting 4 /2/2004 WINS Monthly Meeting 4 /2/2004.
WINS Monthly Meeting www2.widener.edu/wins 03/02/2007 www2.widener.edu/wins
How Information Flows via the Internet By: Lee Farrell.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /06/2009 www2.widener.edu/wins
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
ProofPoint Encryption Project Kansas Health Solutions Patrick Yancey, Director of Information Technology.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Options for the future 28 th November Agenda Welcome and Introduction Who are Exa Networks – Quick overview Key points Our key services to education.
WINS Monthly Meeting www2. widener. edu/wins internet2
WINS Monthly Meeting www2. widener. edu/wins internet2
WINS Monthly Meeting www2. widener. edu/wins widener
To the ETS – Password Reset Online Training Course
Welcom e Welcome to BKD! This presentation will show you some of the technology that you’ll be using everyday here in and out of the office.
Welcome to the Webinar: Audio Options
Welcome to the Webinar: Audio Options
WINS Monthly Meeting www. widener. edu/wins internet2
To the ETS – Password Reset Online Training Course
State Cyber Incident IT Q&A CALL
Presentation transcript:

WINS Monthly Meeting www2.widener.edu/wins 04/04/2008 www2.widener.edu/wins

Agenda Introductions Tripplite Presentation Fortinet Presentation WINS Support Phone Number Banner Security Warning ISP Update Question & Answers

Introductions Name Title Location

Tripplite Brought to you by Tim Slattery (610) of CNI : Barry Winters Eastern Region Accounts * Office – Cellular

Fortinet Brought to you by Tim Slattery (610) of CNI : Jim Criscuolo Director of Sales, Northeast Region (860) (Office) (860) (Cell) (860) (Fax) Local Sales : Alan Currie (484) Local SE : Kai Yuan (646) Fortinet: LEADER in Gartner's 2007 Enterprise Firewall Magic Quadrant---

WINS Support Phone Number New Phone Number – (610) To Reach : On-Call Option 1 Perry Drayfahl Option 2 Tom Erbe Option 3 Mike Blanche Option 4 Jay Buttacavoli Option 5 ITS Help Desk Option 6 Then Option 1 to leave message at desk or Option 2 to go to cell phone

Banner Security Warning With everything becoming more and more interconnected via the Internet as an unsecured communication medium, there raises several questions/issues regarding legalities. One of these issues is the issuance of the word “welcome” in the login banner and headings for any given system, server or network appliance. Many discussions have ensued (and still continue today, though not as intensely as several years ago) pertaining to the simple, but powerful, word “welcome”. The prosecution of an individual in a criminal case must show that the individual’s actions were intentional in nature. It would be extremely difficult for anyone to argue that an individual’s intrusion attempts (or actions) were by accident or inadvertent insofar as to go past such without encountering any type of warning or disclaimer on the target system or throughout the network. It may still be possible (though highly unlikely) that an individual that attempted an unauthorized and/or illegal intrusion attempt admit that their actions were intentional. However, upon their sentence, they may argue that they were ignorant to any specified law or that they were unaware that their actions were unauthorized, thereby inducing the court to mitigate whatever penalty may be imposed.

ISP Update Most recent PLAN : Yipes to 200 Mb (mid Aug) SNIP - 40 to 100 Mb (July) I to 30 Mb (mid Aug)

Questions & Answers Next Meeting May 2nd, 2008! Server Virtualization Discussion? Summer Projects?