+ All Categories
Home > Documents > Matthew H. Bain, MGT '01

Matthew H. Bain, MGT '01

Date post: 14-Jan-2015
Category:
Upload: johnsondon
View: 253 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
42
Matthew H. Bain, MGT ’01 Senior Systems Support Manager, Georgia Tech Alumni Association
Transcript
Page 1: Matthew H. Bain, MGT '01

Matthew H. Bain, MGT ’01Senior Systems Support Manager,Georgia Tech Alumni Association

Page 2: Matthew H. Bain, MGT '01

• Student Computer Ownership Initiative

• Security

• Online Integrity

Page 3: Matthew H. Bain, MGT '01

Student Computer Ownership Initiative(SCO)

“The computer should be fast enough and have enough memory and disk space to provide satisfactory performance over a usable life of two to three years.*”

*Moore’s Law:In 1965, Intel co-founder Gordon Moore

predicted that the number of transistors on a chip would double about every two years.

Page 4: Matthew H. Bain, MGT '01

Laptop computers are now required!

Page 5: Matthew H. Bain, MGT '01

SCO Laptop Recommendation

• 88% of Fall 2006 freshman brought a laptop with them to Georgia Tech.

• Starting this Fall, laptops are required for incoming Computer Science majors.

• In 2008, laptops will be required for everyone.

So what does this mean?

Page 6: Matthew H. Bain, MGT '01

SCO Laptop Implications

Pros:• Wireless coverage in most buildings,

including the library and many dorms.• Easier collaboration on team projects.• Ability to take home during holidays

and breaks, or on study abroad.• Increased Mobility!

Page 7: Matthew H. Bain, MGT '01

SCO Laptop Implications

Cons:• Increased potential for theft…• More expensive.• Less upgradable.• More wear and tear (overheating

hdds, drops, spills, etc.)

Page 8: Matthew H. Bain, MGT '01

SCO Minimum Laptop Requirements

Processor At least a Pentium M class or AMD equivalent (PC),G4 or Intel Core Duo (Mac)

Memory 1GB or more

Hard Drive 80GB or larger

Display Supports1024 x 768 resolution or better

Network Card 10/100 Base-T Network Adapter,Wireless adapter*

Other Features CD-R, Sound Card, Speakers

*The Georgia Tech LAWN (Local Area Wireless/Walkup Network) supports walkup connections through wired Ethernet in the library and wireless connections through IEEE 802.11b/g cards utilizing wired equivalent privacy (WEP), with a 64-bit key. For Mac users, Apple's AirPort and AirPort Extreme cards are compatible.

Page 9: Matthew H. Bain, MGT '01

Other Hardware Recommendations

• Personal printer• Security cable• External hard drive

• Other considerations:– Extended warranty– Media shredder

Page 10: Matthew H. Bain, MGT '01

Software Recommendations

• OS: Windows XP/Vista, Mac OSX, Linux

• Productivity/Office Suite• Security software• Other software as needed…

Page 11: Matthew H. Bain, MGT '01
Page 12: Matthew H. Bain, MGT '01

Software Recommendations

• Don’t pay full price!– Microsoft Office Standard 2007

• MSRP: $399.95• Educational Distributors like e-academy,

Inc.: $56.15

• See what is available for free• Only purchase software if and when

it is needed

Page 13: Matthew H. Bain, MGT '01

Security

• Physical Protection

• Information Security

• Secure Communication

• Other Best Practices

Page 14: Matthew H. Bain, MGT '01

Security – Physical Protection

• Increased Mobility = Increased Theft!

• Keep an inventory list

• Software tracking

Page 15: Matthew H. Bain, MGT '01

Security – Passwords

• Choose good passwords

Page 16: Matthew H. Bain, MGT '01

Security – Passwords

• Ch0o5e Go0d p@s5w0rDs– Minimum of 7 characters– Doesn’t contain dictionary words– Uses different character classes, i.e.

• alphabetic (the letters of the alphabet): a-z, A-Z• numeric (digits): 0-9• special (punctuation, etc.): !@#$%^&, and

others

• Use different passwords for different resources

Page 17: Matthew H. Bain, MGT '01

Security – Passwords

• Use a locking screen saver

• Manually lock the screen

• Set clients and browsers to not remember

• Set a BIOS password (and document it)

Page 18: Matthew H. Bain, MGT '01
Page 19: Matthew H. Bain, MGT '01

Security – Passwords

• Ch0o5e Go0d p@s5w0rDs

• Use different passwords for different resources

• Password Safe / Keychain

Page 20: Matthew H. Bain, MGT '01

Security – Software

• Anti-Virus Software– Keep it updated!– Keep it active (on-access scan)– Perform full system scans regularly– Be cautious about opening links

and attachments

Page 21: Matthew H. Bain, MGT '01

Security – Software

• Anti-Spyware– Can use several different products– Campus distribution: WebRoot /

McAfee– Others: Windows Defender, SpyBot,

Ad-aware– Use a locked-down “hosts” file– Be cautious about opening links and

attachments

Page 22: Matthew H. Bain, MGT '01

Security – Software

• Host-based firewalls– Many different ones available– Built-in Windows/Macintosh Firewall

is easiest to use and maintain– Choose only one– Keep it enabled on all adapters

Page 23: Matthew H. Bain, MGT '01

Security – Software

• Encryption Software– Might want to consider using

encryption software– TrueCrypt, GPG, Macintosh

FileVault

Page 24: Matthew H. Bain, MGT '01

Security – Software

• Operating System– Keep it patched and updated!

(easy to do using automatic updates)

– Don’t forget your applications, too!(Acrobat, Firefox, MS Office, etc.)

Page 25: Matthew H. Bain, MGT '01

Security – Secure Communication

• Email– Encrypt sensitive information– Don’t open attachments– Don’t click on links

Page 26: Matthew H. Bain, MGT '01

Security – Secure Communication

• Instant Messaging– Don’t open attachments– Don’t click on links– Beware stored chat logs

Page 27: Matthew H. Bain, MGT '01

Security – Secure Communication

• Wireless– Use secure protocols (https://)– Turn off when not in use– If you have a wireless router at home*,

secure it

*if you live off campus; unauthorized wireless access points are not allowed on the campus network

Page 28: Matthew H. Bain, MGT '01

Security – Other Best Practices

•Regular Backups– Inexpensive media available–Make this a habit / automate it–Encrypt sensitive data

Page 29: Matthew H. Bain, MGT '01

Security – Other Best Practices

•Upgrading or replacing a hard drive–Securely destroy your drive

•Darik's Boot and Nuke (DBAN)•Macintosh Disk Utility

•Don’t run as an administrator–OS-supported authentication

Page 30: Matthew H. Bain, MGT '01

Online Integrity

• Piracy

• Hacking

• Cheating

• Everything lives forever…

Page 31: Matthew H. Bain, MGT '01

Online Integrity - Piracy

• “Anyone who sells, acquires, copies or distributes copyrighted materials without permission is called a pirate.”

• “Downloading music/movies without paying for them is no different than walking into a store and stealing a CD/DVD off the shelf.”

Page 32: Matthew H. Bain, MGT '01

Online Integrity – Piracy

• According to the RIAA, more than half of college students download music and movies illegally

• Very easy and tempting to do• P2P clients can open the door to

malware and other bad things• RIAA/MPAA regularly send pre-

litigation letters to colleges and students

Page 33: Matthew H. Bain, MGT '01

Online Integrity - Hacking

• Attempting to gain unauthorized access to any system that does not belong to you, regardless of intent

• Violates CNUSP

• May result in termination of service and civil and criminal charges

Page 34: Matthew H. Bain, MGT '01

Online Integrity - Cheating

• Plagiarism / Collaboration

• Student Code of Conduct

• 2002 Scandal: College of Computing Cheatfinder

Page 35: Matthew H. Bain, MGT '01

Online Integrity - Services

• Be careful before you click the send button

• Think twice before posting

• Everything lives on the Internet forever

Page 36: Matthew H. Bain, MGT '01
Page 37: Matthew H. Bain, MGT '01
Page 38: Matthew H. Bain, MGT '01
Page 39: Matthew H. Bain, MGT '01
Page 40: Matthew H. Bain, MGT '01

Online Integrity - Services

• Use third party applications at your own risk

• Protect your privacy

• Don’t add friends that you don’t actually know

• Look out for the addictive nature of these services

Page 41: Matthew H. Bain, MGT '01

As Facebook Grows, Longtime Users Draw Privacy VeilMary Jane Irwin 07.17.07

Facebook used to be all about the location of the next kegger, who hooked up with whom and maybe keeping in touch with the foreign student you studied with for a semester. Now this formerly exclusive community is increasingly being used for business networking -- and that's causing some of the service's longtime users to be a lot less forthcoming about the information they share on the site.

For longtime users, the influx of grownups means that information once intended for a circle of fellow students is now available for anyone to see. That has introduced a new social conundrum: Deciding whose invites should be accepted -- and how much of your profile they should be able to see.

"You can't really unfriend your mom," says Hillary Woolley, a junior at the University of California at Davis. "So I've been upping my privacy settings."

Page 42: Matthew H. Bain, MGT '01

http://www.prism.gatech.edu/~mb320/


Recommended