Matthew H. Bain, MGT '01

Post on 14-Jan-2015

253 views 0 download

Tags:

description

 

transcript

Matthew H. Bain, MGT ’01Senior Systems Support Manager,Georgia Tech Alumni Association

• Student Computer Ownership Initiative

• Security

• Online Integrity

Student Computer Ownership Initiative(SCO)

“The computer should be fast enough and have enough memory and disk space to provide satisfactory performance over a usable life of two to three years.*”

*Moore’s Law:In 1965, Intel co-founder Gordon Moore

predicted that the number of transistors on a chip would double about every two years.

Laptop computers are now required!

SCO Laptop Recommendation

• 88% of Fall 2006 freshman brought a laptop with them to Georgia Tech.

• Starting this Fall, laptops are required for incoming Computer Science majors.

• In 2008, laptops will be required for everyone.

So what does this mean?

SCO Laptop Implications

Pros:• Wireless coverage in most buildings,

including the library and many dorms.• Easier collaboration on team projects.• Ability to take home during holidays

and breaks, or on study abroad.• Increased Mobility!

SCO Laptop Implications

Cons:• Increased potential for theft…• More expensive.• Less upgradable.• More wear and tear (overheating

hdds, drops, spills, etc.)

SCO Minimum Laptop Requirements

Processor At least a Pentium M class or AMD equivalent (PC),G4 or Intel Core Duo (Mac)

Memory 1GB or more

Hard Drive 80GB or larger

Display Supports1024 x 768 resolution or better

Network Card 10/100 Base-T Network Adapter,Wireless adapter*

Other Features CD-R, Sound Card, Speakers

*The Georgia Tech LAWN (Local Area Wireless/Walkup Network) supports walkup connections through wired Ethernet in the library and wireless connections through IEEE 802.11b/g cards utilizing wired equivalent privacy (WEP), with a 64-bit key. For Mac users, Apple's AirPort and AirPort Extreme cards are compatible.

Other Hardware Recommendations

• Personal printer• Security cable• External hard drive

• Other considerations:– Extended warranty– Media shredder

Software Recommendations

• OS: Windows XP/Vista, Mac OSX, Linux

• Productivity/Office Suite• Security software• Other software as needed…

Software Recommendations

• Don’t pay full price!– Microsoft Office Standard 2007

• MSRP: $399.95• Educational Distributors like e-academy,

Inc.: $56.15

• See what is available for free• Only purchase software if and when

it is needed

Security

• Physical Protection

• Information Security

• Secure Communication

• Other Best Practices

Security – Physical Protection

• Increased Mobility = Increased Theft!

• Keep an inventory list

• Software tracking

Security – Passwords

• Choose good passwords

Security – Passwords

• Ch0o5e Go0d p@s5w0rDs– Minimum of 7 characters– Doesn’t contain dictionary words– Uses different character classes, i.e.

• alphabetic (the letters of the alphabet): a-z, A-Z• numeric (digits): 0-9• special (punctuation, etc.): !@#$%^&, and

others

• Use different passwords for different resources

Security – Passwords

• Use a locking screen saver

• Manually lock the screen

• Set clients and browsers to not remember

• Set a BIOS password (and document it)

Security – Passwords

• Ch0o5e Go0d p@s5w0rDs

• Use different passwords for different resources

• Password Safe / Keychain

Security – Software

• Anti-Virus Software– Keep it updated!– Keep it active (on-access scan)– Perform full system scans regularly– Be cautious about opening links

and attachments

Security – Software

• Anti-Spyware– Can use several different products– Campus distribution: WebRoot /

McAfee– Others: Windows Defender, SpyBot,

Ad-aware– Use a locked-down “hosts” file– Be cautious about opening links and

attachments

Security – Software

• Host-based firewalls– Many different ones available– Built-in Windows/Macintosh Firewall

is easiest to use and maintain– Choose only one– Keep it enabled on all adapters

Security – Software

• Encryption Software– Might want to consider using

encryption software– TrueCrypt, GPG, Macintosh

FileVault

Security – Software

• Operating System– Keep it patched and updated!

(easy to do using automatic updates)

– Don’t forget your applications, too!(Acrobat, Firefox, MS Office, etc.)

Security – Secure Communication

• Email– Encrypt sensitive information– Don’t open attachments– Don’t click on links

Security – Secure Communication

• Instant Messaging– Don’t open attachments– Don’t click on links– Beware stored chat logs

Security – Secure Communication

• Wireless– Use secure protocols (https://)– Turn off when not in use– If you have a wireless router at home*,

secure it

*if you live off campus; unauthorized wireless access points are not allowed on the campus network

Security – Other Best Practices

•Regular Backups– Inexpensive media available–Make this a habit / automate it–Encrypt sensitive data

Security – Other Best Practices

•Upgrading or replacing a hard drive–Securely destroy your drive

•Darik's Boot and Nuke (DBAN)•Macintosh Disk Utility

•Don’t run as an administrator–OS-supported authentication

Online Integrity

• Piracy

• Hacking

• Cheating

• Everything lives forever…

Online Integrity - Piracy

• “Anyone who sells, acquires, copies or distributes copyrighted materials without permission is called a pirate.”

• “Downloading music/movies without paying for them is no different than walking into a store and stealing a CD/DVD off the shelf.”

Online Integrity – Piracy

• According to the RIAA, more than half of college students download music and movies illegally

• Very easy and tempting to do• P2P clients can open the door to

malware and other bad things• RIAA/MPAA regularly send pre-

litigation letters to colleges and students

Online Integrity - Hacking

• Attempting to gain unauthorized access to any system that does not belong to you, regardless of intent

• Violates CNUSP

• May result in termination of service and civil and criminal charges

Online Integrity - Cheating

• Plagiarism / Collaboration

• Student Code of Conduct

• 2002 Scandal: College of Computing Cheatfinder

Online Integrity - Services

• Be careful before you click the send button

• Think twice before posting

• Everything lives on the Internet forever

Online Integrity - Services

• Use third party applications at your own risk

• Protect your privacy

• Don’t add friends that you don’t actually know

• Look out for the addictive nature of these services

As Facebook Grows, Longtime Users Draw Privacy VeilMary Jane Irwin 07.17.07

Facebook used to be all about the location of the next kegger, who hooked up with whom and maybe keeping in touch with the foreign student you studied with for a semester. Now this formerly exclusive community is increasingly being used for business networking -- and that's causing some of the service's longtime users to be a lot less forthcoming about the information they share on the site.

For longtime users, the influx of grownups means that information once intended for a circle of fellow students is now available for anyone to see. That has introduced a new social conundrum: Deciding whose invites should be accepted -- and how much of your profile they should be able to see.

"You can't really unfriend your mom," says Hillary Woolley, a junior at the University of California at Davis. "So I've been upping my privacy settings."

http://www.prism.gatech.edu/~mb320/