Orientation for International Students 2016 Information Services & Techology Pekka Kuronen.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Laptop Maintenance Presentation 1.Plug your laptop into the nearest power source. 2.Please keep your laptop turned off until the technology session at.
New Teacher Technology Orientation August 6, 2007.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Information and Technology Services Customer Services.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
Information systems at Metropolia UAS Mikko Mäkelä & JHH.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Information about the computer By Sophia and Christina C.
Remote Access Mark Nicolay Computing & Communications.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
©2006 Academic Computing Services, NJIT ©2011 Academic Computing Services, NJIT Academic Computing Services Efficient Use of Computing at NJIT.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
© 2015 MONASH SOUTH AFRICA CONFIDENTIAL & PROPRIETARY.
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
Learning In A Techno World How Safe is Your Cyberspace?
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
Corporate Information Systems Delivery of Infrastructure IT Services.
+ Navigating Campus Technology Presented by Stephanie Jasmin.
Introducing… …taking desktop computing to the cloud making business effortless!
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
BUCS / Department of Pharmacy & Pharmacology Pharmacy & Pharmacology Computing Services Pascal Loizeau Computing Services Supporter Dept. of Pharmacy &
IT security By Tilly Gerlack.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Warm welcome to our international students at Pforzheim University! 1 IT Guide.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
IT Services for Students and Information Security at Aalto University (OTANIEMI) Jaakko Salonen Development Manager / Aalto IT.
A secure internet site that allows posts access to their Legion and SAL membership.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Copyright © First Option 2008 First Option WebCheck The 1st Option in IT.
Voice Mail Options Unified Messaging Voice Mail Web Browser David Howard Les Cottrell August SCCS Managers’ Meeting.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
Who are Orakelet? l IT-support service for students and employees at the University of Tromsø l IT-support service for the student hostels owned by studentsamskipsnaden.
Metropolia IT Services Principle of Operations IT Services Unit:  Supports teaching at Metropolia University  Is responsible for the support and.
Small Business Security Keith Slagle April 24, 2007.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NETWORKING & SYSTEM UPDATES
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ESolutions Service Desk IT Services for Students
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
IT information Students’ user administration and user IDs LUC services, IT services.
Unit 4 IT Security.
Information Hub.
Information Security Session October 24, 2005
Information Services and IT Support Information Services
Ove Ritola & Henna Toivola
Homework.
Presentation transcript:

Orientation for International Students 2016 Information Services & Techology Pekka Kuronen

Information Services & Technology −Part of University’s administration, supporting unit −Staff: 26 −Goal: To support and provide well managed IT infrastructure for both students and staff

IT / Services −Communication network −Connectivity to the rest of the world -> FUNET −Local area network; about 2000 PCs, roughly 150 servers −Wireless internet access for students – EDUROAM ( −Download eduroam installer −LOAS campus network LNET

IT / Services contd. − accounts (512 MB) −Home directories (1024 MB) −Origo −PC classrooms −Printing services (4 cents/page + vat 23%) −Noppa, Moodle, Oodi −Software benefits: − usehttps://uni.lut.fi/en/web/lut.fi-eng/software-for-home- use −

IT / Remote access −Portti – remote access service −Browser based (IE, FF, Safari) −Provides access to: −Library databases −Nelli-information portal

IT / User Accounts / Access rights −Access to any service requires user account −The account is personal −The account owner commits to follow usage guidelines and rules −You’ve already got accounts −If not, get one from Origo service desk −The validity of the account expires when your right to study expires or you forget to enrol on a new school year.

IT / Information Security −There’s a real threat of spyware and viruses −You should take care about your home pc too −Updates, antivirus software −LUT has automatic virus and attachment filtering −Phishing −Unfortunately very common −IT staff will never ever ask you for your password −Remember service certificates (LUT IT uses LUT-CA, Sonera and TERENA)

IT / Information Security −Passwords −Password renewal and instructions − or − Check out password requirements if you are using windows or webmail to change your password. −Don’t use same password in different systems.

IT / Support for Students −Where you can ask help for IT problems? −Origo’s service desk: Mon-Thu 8:30 – 18:00, Fri 8:30 -15:30 − phone

IT / Questions −Any questions? Footer

Thank you, and welcome!