2008 Collaborated with 	3 Companies and<br />	2 Universities partners on <br />	3 projects<br /><ul><li> Intel (USA)
 Motorola (Korea & UK)
 Great Southern Wood (USA)
 Hong-ik University (Korea)
 Auburn University (USA)</li></li></ul><li>2009 Collaborated with 	2 Companies and<br />	3 Universities partners<br />	1 C...
 Motorola (Korea)
 Hong-ik University (Korea)
 Ohio State University (USA)
 RMIT, University (Australia)</li></li></ul><li>The Open ICT Tools<br />Constructing Constructs<br />
The Open ICT Tools<br />
ICT tools to support<br />inter-organisational communication and data exchange<br />ICT tools to support<br />inter-organi...
Malware<br />15 years to end 2007 – 358,000<br />135,000 in 2007<br />March 2008 &gt; 135,000<br />End of 2008 – 1.5M (3,5...
What are the dangers ?<br />Keyloggers<br />Get your passwords<br />And your credit card and bank details<br />Your PC bec...
How does it happen ?<br />Opening an e-mail attachment<br />‘OK to install new video codec ?’<br />Downloading and install...
Why do they do it ?<br />Money<br />
Wikis<br />Initially didn’t integrate with our authentication<br />There would be a training overhead for contributors<br ...
So…<br />We got it hosted externally<br />As demand stabilised we brought it inside<br />
Upcoming SlideShare
Loading in...5
×

07 Open ICT Tools

403

Published on

Published in: Education, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
403
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Example of communication complexities
  • Technological common platform enablingdata exchange and communication between Northumbria students its staff and external partners
  • Jed to provide the context
  • Jed to provide the context
  • There is huge growth in the number of viruses etc. being created
  • 07 Open ICT Tools

    1. 1.
    2. 2. 2008 Collaborated with 3 Companies and<br /> 2 Universities partners on <br /> 3 projects<br /><ul><li> Intel (USA)
    3. 3. Motorola (Korea & UK)
    4. 4. Great Southern Wood (USA)
    5. 5. Hong-ik University (Korea)
    6. 6. Auburn University (USA)</li></li></ul><li>2009 Collaborated with 2 Companies and<br /> 3 Universities partners<br /> 1 Common project theme<br /><ul><li> Inverness Medical (USA)
    7. 7. Motorola (Korea)
    8. 8. Hong-ik University (Korea)
    9. 9. Ohio State University (USA)
    10. 10. RMIT, University (Australia)</li></li></ul><li>The Open ICT Tools<br />Constructing Constructs<br />
    11. 11.
    12. 12. The Open ICT Tools<br />
    13. 13. ICT tools to support<br />inter-organisational communication and data exchange<br />ICT tools to support<br />inter-organisational communication and data exchange<br />VoIP <br />(Voice over Internet Protocol such as Skype)<br />Teleconferencing<br />Instant messaging<br />Wikis<br />email<br />Blogs<br />Videoconferencing<br />Interactive Whiteboard Technology<br />Plone<br />FTP<br />
    14. 14.
    15. 15.
    16. 16. Malware<br />15 years to end 2007 – 358,000<br />135,000 in 2007<br />March 2008 &gt; 135,000<br />End of 2008 – 1.5M (3,500 per day)<br />(Figures from McAfee)<br />
    17. 17. What are the dangers ?<br />Keyloggers<br />Get your passwords<br />And your credit card and bank details<br />Your PC becomes a robot<br />Your PC becomes base for new attack<br />
    18. 18. How does it happen ?<br />Opening an e-mail attachment<br />‘OK to install new video codec ?’<br />Downloading and installing free software<br />Accepting a file using an Instant Messenger<br />Installation through coercion<br />Simply visiting a website<br />
    19. 19. Why do they do it ?<br />Money<br />
    20. 20. Wikis<br />Initially didn’t integrate with our authentication<br />There would be a training overhead for contributors<br />We would have to set it up and support it<br />Little demand<br />
    21. 21. So…<br />We got it hosted externally<br />As demand stabilised we brought it inside<br />
    22. 22. Skype<br />Skype got a bad reputation<br />Seen as a threat by network security<br />Its traffic is encrypted<br />Its protocols were kept secret<br />It commandeered PCs for its own purposes<br />
    23. 23. So…<br />We initially had a dedicated wireless network<br />We now have it on our normal wireless network<br />If there are no issues we would consider it on main network<br />
    24. 24. FTP<br />Huge security risk<br />Do use a bit of Secure FTP (SFTP)<br />Not sensible to open up your systems to allow other people to send you files<br />
    25. 25. Instant Messenger<br />We needed a corporate version<br />Self installers use ‘external authentication’<br />Contacts needs to be self populated<br />
    26. 26. So…<br />We chose Office Communication Server<br />Works well internally<br />In the process of installing bridge servers to externals<br />
    27. 27.
    28. 28. Questions? <br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×