Matthew H. Bain, MGT '01

  • 240 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
240
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • First, we’ll talk about the student computer ownership initiative. This topic may be more relevant to the families of freshmen and high school students, but there should be some good information here for everyone. I’m going to cover what the initiative recommends and some of its implications as well as some other considerations that you may not have thought about. Next, we’ll get in to Information Security, and I’ll cover some best practices in this area. Finally, I’m going to talk a bit about what I call online integrity, or how your student can protect his or her reputation.
  • Since 1997, Georgia Tech has required all undergraduate students to own a computer. There is a campus committee made up of representatives from the Office of Information Technology, various academic departments, the office of housing, and students. This committee meets regularly and determines the minimum set of requirements for computers coming to campus. There’s two schools of thought on this one. First, I think most individuals will try to get the most bang for the buck and attempt to purchase a hefty-enough machine that will last throughout the student’s entire undergrad career. So, this second school of thought comes from the idea that since you will most likely need to replace your student’s computer during their time at Tech, you might as well go for a middle-of-the-road model and plan on replacing it after 2 years. The first machine may make an excellent computer for home use…
  • Now, a word about platforms… the kind of computer you get, whether it be a Mac or a PC, is entirely up to you and your student – I’ve used both platforms, and there are pros and cons to each. (And… if you have a CS student, they’re already using some version of Linux.) The one thing to consider is your student’s coursework, and its software requirements. Most of the software packages out there for the various classes are Windows-only. Fortunately, this is much easier to get around with the new Intel-based Macs and Boot Camp, Parallels, and VMWare. The down side to these methods is that you still have to be fully licensed for whatever software you install.
  • Good comparison chart on Intel’s website… but beware the megahertz myth.
  • A personal printer is not absolutely necessary, but it’s a good idea. There are various printing facilities on campus, but may not be the most convenient. Printers are relatively cheap so there’s not really a reason not to have one. Security cable: again, not a necessary item, but a good idea to have one… the problem with security cables is that no one uses them. Your student needs to get in the habit of using a cable, and logging out or “locking” their machine, even in their dorm room. Just because they’re good about shutting and locking the door behind them doesn’t mean that their roommate is. Your insurance company won’t be too sympathetic when they ask how a stolen laptop was secured and your reply is “it wasn’t.” External Hard drive: This is a must. It doesn’t matter what kind you get, whether it be a flash drive or something larger. Again, your student will need to get into the habit of backing up their files and programs regularly (weekly). Especially with the wear and tear of a laptop, you will always want a good backup, and there’s software available that will automate this for you so that you don’t have to remember to do it. Extended warranties: These go by many names but you basically want to get full coverage on breakage, spills, drops, and the like. Also, a media shredder is a great idea to have when discarding credit card offers, etc. They sell media shredders as well to securely dispose of CDs, credit cards, etc.
  • OS: preinstalled Office Suite – MSOffice 2003/2004/2007, Apple iWork; avoid buying a suite up front if possible Security Software (Antivirus, antispyware, firewall) Course-specific: buy it when you need it. A quick word about Windows Vista. To date, it is not officially supported on campus. That is to say, if your student has issues with Vista not working properly with campus services, OIT will provide a “best effort” level of support, but it is very possible that any issues that crop up may not be fixable in the short term. The same thing goes for Office 2007. Office 2007 sports a new interface, and by default, saves files in a new “open” format that is not compatible with previous versions. You do have the ability to save and open previous versions of files. There are many different office suites available out there. Some of them are free (OpenOffice). SCO recommendations specify that whatever you get, it needs presentation software (like PPT). The main thing to keep in mind is maintaining compatibility with others.
  • Office Matrix: Don’t need most of this, but the table is available online to help you sort through the confusion of what is/is not included. My recommendation is to shoot for either the Home & Student edition or the Standard edition. They both include the three main applications, Word, Excel, and PowerPoint. I love Outlook, but most students won’t care about it – they prefer to use webmail (and starting January, there will be a major upgrade to the campus mail system that will make a thick client obsolete.)
  • Never pay full price. See what’s available for free (both in terms of on-campus availability, as well as open-source alternatives). Only purchase additional software as it’s needed.
  • Increased theft: again, get a security cable and get into the habit of using it. Often the most devastating thing is not the loss of the equipment, but the loss of data! (This is where regular backups are a life saver.) Just as you would for any insurance purposes, keep a detailed inventory list (at home) that contains the exact make, model, serial number, hardware address, photos, etc. Also, check your homeowners’ policy coverage – it should extend to students away at college. There is software available for tracking stolen computers. I don’t know how effective it is vs. the cost to purchase it, but it’s worth investigating.
  • Choose good passwords… People talk about this all the time, but they never really explain what this means. Let’s look at a couple of examples…
  • Good passwords have these characteristics… Passwords don’t need to be difficult. Figure out a method that works for you and stick to it. GT Account password changes every 90 days, and you are restricted from reusing your last three passwords. Use different passwords for different resources, and use them whenever possible, i.e. don’t let your mail client or web browser “remember” your password for you.
  • Use a locking screen saver with a maximum timeout of 15 minutes Purposefully lock your screen when you walk away for a few minutes (this applies to both personal and lab machines) Set email clients and web browsers to not “remember” passwords – this forces you to not forget them The computer BIOS (Basic Input/Output System) allows you to assign a password to it, so that others cannot modify any of its settings. Use this feature, and document the password so that you don’t forget what it is… So, if you are going to choose good passwords, and get in to the practice of using different ones for different systems, how do you keep track of them all?
  • … not like this!
  • Password Safe is a free, open-source utility that assists you with password management. Think of it literally as a safe. You need a master combination (password) to open the safe, and inside is a listing of all of your usernames, passwords, and the resources they access. If you’re having trouble thinking up a unique, secure password, it will generate them for you (you can even specify a level of complexity/character classes). Macs have a built-in system utility called “Keychain” which does the same thing.
  • Most pre-installed suites maintain too much control, use too many system resources, and expire after a short timeframe. Uninstall it and use the campus McAfee distribution, or a free alternative.
  • Again, many all-in one suites will include an anti-spyware component. A hosts file is a text file that can be found on any system (Mac/Windows/Linux). This file essentially tells your computer where to find other systems on a network (like a local DNS file). You can download a custom hosts file that prevents your computer from seeing “bad” sites and will block advertising and tracking cookies.
  • Again, many all-in one suites will include a software firewall. Unlike anti-spyware software, with a software firewall, you want to use only one!
  • Depending on the information you have and the level of protection you need, you might want to consider using encryption software. Encryption basically takes files in their native form (plaintext) and scrambles them using a password that you provide.
  • Every OS has an automated way to download updates and patches frequently. This is a must! Sometimes these updates arrive at inconvenient times, and you can delay them a bit, but it’s best not to ignore them for too long and get them done at your earliest possible convenience. Also, don’t forget about your applications… many of these will have a way to automatically update as well.
  • Email is not secure! Never email sensitive information like credit cards, SSNs, etc. unless it has been encrypted. Don’t open attachments Never click on links in emails (phishing schemes for PayPal, eBay, WaMu, etc.)
  • Instant Messaging: Much like email, don’t open attachments or links. Many instant messengers will maintain logs of your chats… so be careful not to type anything that you don’t want to come back and haunt you.
  • Most laptop users have come to depend on the availability of wireless access. The big thing to keep in mind here is that wi-fi is completely insecure! The way this stuff works is that they’re basically radios, and anyone with a radio can receive the transmission. Anything transmitted in plaintext can be easily seen, so you always want to use secured protocols that are encrypted, i.e. SSL/SSH, https:// Laptops will always be looking for an available access point to connect to, and specifically, if they’re looking for APs that they’ve already connected to and are aware of, they’ll be broadcasting that information to anything that will listen! The best thing to do with your wireless connection is to disable it when you’re not using it. Not only will it keep you secure, it will also prevent campus resources from getting overloaded and will save you battery life. If you live off campus and have a wireless access point at home, be sure to secure it using WPA (Wifi protected Access) and not WEP (Wired Equivalent Privacy). I have a document posted on my website giving instructions for securing a Linksys WRT54G.
  • When you get rid of an old computer, or it comes time to replace or upgrade your hard drive, don’t just give it away/throw it away! When you erase files on a disk, you’re not actually erasing anything. Your data can be easily recovered! The best thing to do is to find a means of completely destroying your drive. At the very least, use software to “zero out” your data. One free program is DBAN. It will automatically take care of this for you. Macs have a built-in utility called Disk Utility; it will allow you to write zeros to your drive up to 35 times! Don’t run as an administrative user on your system. If you happen to download some kind of malware, it can use your credentials as an admin to install itself and cause other damage. New OSes now handle a good portion of this for you… Linux has a command called sudo, Macs will automatically prompt you for authorization when you change a system setting or install a program, and Vista includes User Account Control (UAC).
  • This topic covers some things that you may want to consider when it comes to protecting your reputation.
  • Pre-litigation letters is the latest installment of a broad education and deterrence campaign that the RIAA launched earlier this year focused on illegal file trafficking on college campuses. This program gives students the opportunity to resolve copyright infringement claims (www.p2plawsuits.com) against them at a discounted rate before a formal lawsuit is filed.
  • I’m using an overly-broad definition here, but for the purposes of this discussion, hacking is… This kind of activity can range anywhere from using programs to reboot your friend’s machine all the way to trying to break into the registration system to change your grades. Anything in here is a clear violation of the Computer and Network Usage Security Policy.
  • Online abuse in regard to cheating specifically applies to plagiarism and collaboration. No one ever got in trouble for citing too many sources.
  • Maintain your integrity while using online services… There’s a certain amount of this that is based on etiquette; for instance, you probably want to re-read and revise your emails before clicking that send button. Blogs, Wikis, personal web pages, MySpace, Facebook, etc. are all online services that allow you to express yourself, but before you post something online, think twice about it. “Free speech doesn’t protect hate speech, and inside jokes aren’t funny to everyone.” Once it’s on the Internet, it will live forever. This applies not only to potentially embarrassing things, but also maintaining control over your privacy. Consider what you type when using IM clients – many of them are set up to keep logs of your chats, and even if you’re not using that feature, the person you’re chatting with may be.
  • There’s been a lot of press lately about information that people have posted on services that are assumed to be closed and private.
  • There’s been a lot of press lately about information that people have posted on services that are assumed to be closed and private.
  • Online services like Facebook and MySpace are just as susceptible to cyberthreats as your computer is, and can be used as a vector for infecting your machine.
  • Again, online users need to be careful about how much they’re willing to share. In this case, we’re not talking about potentially embarrassing incidents, but instead about revealing enough personal information to have your identity stolen.
  • Use third party applications at your own risk. Protect your privacy: avoid posting everything about yourself just because you can… Don’t add or confirm friends to your profile unless you actually know them in person. Also, look out for the addictive nature of these social networks. It’s easy to be drawn in to these services and become distracted from studies and other work.
  • Luckily, some users are catching on to this notion of protecting their privacy. Now that Facebook is open to a broader audience, users are realizing that they may not necessarily want all this information out there.

Transcript

  • 1. Matthew H. Bain, MGT ’01 Senior Systems Support Manager, Georgia Tech Alumni Association
  • 2.
    • Student Computer Ownership Initiative
    • Security
    • Online Integrity
  • 3. Student Computer Ownership Initiative (SCO)
    • “ The computer should be fast enough and have enough memory and disk space to provide satisfactory performance over a usable life of two to three years .*”
    • *Moore’s Law:
    • In 1965, Intel co-founder Gordon Moore predicted that the number of transistors on a chip would double about every two years.
  • 4. Laptop computers are now required!
  • 5. SCO Laptop Recommendation
    • 88% of Fall 2006 freshman brought a laptop with them to Georgia Tech.
    • Starting this Fall, laptops are required for incoming Computer Science majors.
    • In 2008, laptops will be required for everyone.
    • So what does this mean?
  • 6. SCO Laptop Implications
    • Pros:
    • Wireless coverage in most buildings, including the library and many dorms.
    • Easier collaboration on team projects.
    • Ability to take home during holidays and breaks, or on study abroad.
    • Increased Mobility!
  • 7. SCO Laptop Implications
    • Cons:
    • Increased potential for theft…
    • More expensive.
    • Less upgradable.
    • More wear and tear (overheating hdds, drops, spills, etc.)
  • 8. SCO Minimum Laptop Requirements * The Georgia Tech LAWN (Local Area Wireless/Walkup Network) supports walkup connections through wired Ethernet in the library and wireless connections through IEEE 802.11b/g cards utilizing wired equivalent privacy (WEP), with a 64-bit key. For Mac users, Apple's AirPort and AirPort Extreme cards are compatible. Processor At least a Pentium M class or AMD equivalent (PC), G4 or Intel Core Duo (Mac) Memory 1GB or more Hard Drive 80GB or larger Display Supports1024 x 768 resolution or better Network Card 10/100 Base-T Network Adapter, Wireless adapter* Other Features CD-R, Sound Card, Speakers
  • 9.  
  • 10. Other Hardware Recommendations
    • Personal printer
    • Security cable
    • External hard drive
    • Other considerations:
      • Extended warranty
      • Media shredder
  • 11. Software Recommendations
    • OS: Windows XP/Vista, Mac OSX, Linux
    • Productivity/Office Suite
    • Security software
    • Other software as needed…
  • 12.  
  • 13. Software Recommendations
    • Don’t pay full price!
      • Microsoft Office Standard 2007
        • MSRP: $399.95
        • Educational Distributors like e-academy, Inc.: $56.15
    • See what is available for free
    • Only purchase software if and when it is needed
  • 14. Security
    • Physical Protection
    • Information Security
    • Secure Communication
    • Other Best Practices
  • 15. Security – Physical Protection
    • Increased Mobility = Increased Theft!
    • Keep an inventory list
    • Software tracking
  • 16. Security – Passwords
    • Choose good passwords
  • 17. Security – Passwords
    • Ch0o5e Go0d p@s5w0rDs
      • Minimum of 7 characters
      • Doesn’t contain dictionary words
      • Uses different character classes, i.e.
        • alphabetic (the letters of the alphabet): a-z, A-Z
        • numeric (digits): 0-9
        • special (punctuation, etc.): !@#$%^&, and others
    • Use different passwords for different resources
  • 18. Security – Passwords
    • Use a locking screen saver
    • Manually lock the screen
    • Set clients and browsers to not remember
    • Set a BIOS password (and document it)
  • 19.  
  • 20. Security – Passwords
    • Ch0o5e Go0d p@s5w0rDs
    • Use different passwords for different resources
    • Password Safe / Keychain
  • 21. Security – Software
    • Anti-Virus Software
      • Keep it updated!
      • Keep it active (on-access scan)
      • Perform full system scans regularly
      • Be cautious about opening links and attachments
  • 22. Security – Software
    • Anti-Spyware
      • Can use several different products
      • Campus distribution: WebRoot / McAfee
      • Others: Windows Defender, SpyBot, Ad-aware
      • Use a locked-down “hosts” file
      • Be cautious about opening links and attachments
  • 23. Security – Software
    • Host-based firewalls
      • Many different ones available
      • Built-in Windows/Macintosh Firewall is easiest to use and maintain
      • Choose only one
      • Keep it enabled on all adapters
  • 24. Security – Software
    • Encryption Software
      • Might want to consider using encryption software
      • TrueCrypt, GPG, Macintosh FileVault
  • 25. Security – Software
    • Operating System
      • Keep it patched and updated!
      • (easy to do using automatic updates)
      • Don’t forget your applications, too!
      • (Acrobat, Firefox, MS Office, etc.)
  • 26. Security – Secure Communication
    • Email
      • Encrypt sensitive information
      • Don’t open attachments
      • Don’t click on links
  • 27. Security – Secure Communication
    • Instant Messaging
      • Don’t open attachments
      • Don’t click on links
      • Beware stored chat logs
  • 28. Security – Secure Communication
    • Wireless
      • Use secure protocols (https://)
      • Turn off when not in use
      • If you have a wireless router at home*, secure it
    • *if you live off campus; unauthorized wireless access points are not allowed on the campus network
  • 29. Security – Other Best Practices
    • Regular Backups
      • Inexpensive media available
      • Make this a habit / automate it
      • Encrypt sensitive data
  • 30. Security – Other Best Practices
    • Upgrading or replacing a hard drive
      • Securely destroy your drive
        • Darik's Boot and Nuke (DBAN)
        • Macintosh Disk Utility
    • Don’t run as an administrator
      • OS-supported authentication
  • 31. Online Integrity
    • Piracy
    • Hacking
    • Cheating
    • Everything lives forever…
  • 32. Online Integrity - Piracy
    • “ Anyone who sells, acquires, copies or distributes copyrighted materials without permission is called a pirate.”
    • “ Downloading music/movies without paying for them is no different than walking into a store and stealing a CD/DVD off the shelf.”
  • 33. Online Integrity – Piracy
    • According to the RIAA, more than half of college students download music and movies illegally
    • Very easy and tempting to do
    • P2P clients can open the door to malware and other bad things
    • RIAA/MPAA regularly send pre-litigation letters to colleges and students
  • 34. Online Integrity - Hacking
    • Attempting to gain unauthorized access to any system that does not belong to you, regardless of intent
    • Violates CNUSP
    • May result in termination of service and civil and criminal charges
  • 35. Online Integrity - Cheating
    • Plagiarism / Collaboration
    • Student Code of Conduct
    • 2002 Scandal: College of Computing Cheatfinder
  • 36. Online Integrity - Services
    • Be careful before you click the send button
    • Think twice before posting
    • Everything lives on the Internet forever
  • 37.  
  • 38.  
  • 39.  
  • 40.  
  • 41. Online Integrity - Services
    • Use third party applications at your own risk
    • Protect your privacy
    • Don’t add friends that you don’t actually know
    • Look out for the addictive nature of these services
  • 42. As Facebook Grows, Longtime Users Draw Privacy Veil Mary Jane Irwin 07.17.07 Facebook used to be all about the location of the next kegger, who hooked up with whom and maybe keeping in touch with the foreign student you studied with for a semester. Now this formerly exclusive community is increasingly being used for business networking -- and that's causing some of the service's longtime users to be a lot less forthcoming about the information they share on the site. For longtime users, the influx of grownups means that information once intended for a circle of fellow students is now available for anyone to see. That has introduced a new social conundrum: Deciding whose invites should be accepted -- and how much of your profile they should be able to see. "You can't really unfriend your mom," says Hillary Woolley, a junior at the University of California at Davis. "So I've been upping my privacy settings."
  • 43.
    • http://www.prism.gatech.edu/~mb320/