SlideShare a Scribd company logo
1 of 27
Download to read offline
1
ICT Facilities in Khon Kaen University
2
KKU Campus Network
KKU Main Campus
CAT
KKU Nong Khai
Campus10 Gbps
Core
2 Gbps 1 Gbps
1 Gbps
UniNet
UniNet UNE PoP
10 Gbps
1 Gbps
Edge
100 Mbps
40 Gbps to IIG
30 Gbps to NIX
3
GADAlumni
SAC
Computer
Center
Registrar
ILTI
Personnel
TQF
HR
Reg
- e-Learning
- e-Testing
- e-Portfolio
- Class Record
Accounts
ILP
- Mail
- MIS
- Meeting
- Cluster
- Strategy
- Payroll
- FMIS
- SIP phone
Alumni
e-Office
4
Wireless Network
kku-wifi
kku-wifi-s
eduroam
5
KKU IT Services
Mail
https://mail.kku.ac.th/
e-Learning
https://e-learning.kku.ac.th
Software
https://software.kku.ac.th
Virtual Private Network
OpenVPN: https://vpn.kku.ac.th/
PPTP/PPTPS: pptps.kku.ac.th
Soft Phone
https://sip.kku.ac.th
http://phone.kku.net
6
(cont'd.)
Google Apps for Education
https://webmail.kku.ac.th
http://gapps.kku.ac.th
Microsoft Office 365 Education
https://portal.microsoftonline.com/
On-line Storage
https://storage.kku.ac.th/
KKU Apps Portal
https://apps.kku.ac.th/
e-Office
https://e-office.kku.ac.th/
7
Safety Guidelines
● Law and Regulations
● Copyright Act B.E. 2537
● Computer-Related Crime Act B.E. 2550
● Malicious Software
● Privacy
8
Software Pricing ?
Software Price (THB) *
ACDSee 10 3,000
Adobe Acrobat Professional 10 22,000
Adobe Photoshop CSุ 36,000
AutoDesk AutoCAD 2014 155,000
Kaspersky Internet Security 2014 890
Microsoft Windows 8.1 4,590
Microsoft Windows Server Standard 2012 (5 clients) 37,000
Microsoft Office Professional 2013 15,000
Oracle Database 10g Enterprise (per processor) 1,500,000
SPSS Statistic Base 18 (Perpetual) 38,000
WinZip 12 Pro 3,500
* approximate / 2014
9
I got it all in one CD, only 100 THB ?
Source: openclipart.org
Public Domain
10
Piracy Rates
Worldwide
42% $63.4 B.
Asia Pacific
60% $21 B.
Thailand
72% $852 M.
Source: 9th Annual BSA/IDC Global Software Piracy Study 2012
11
12
Licensed Software
13
Free Open Source Software / Freeware
14
OpenOffice (Office suite) http://www.openoffice.org/
LibreOffice (Office suite) http://www.libreoffice.org/
Firefox (Web browser) http://www.mozilla.org/firefox/
Chromium (Web browser) http://www.chromium.org/
R Project (Statistical) http://www.r-project.org/
Zotero (Reference manager) http://www.zotero.org/
SciLab (Mathematical) http://www.scilab.org/
GIMP (Photo retouching) http://www.gimp.prg/
Blender (3D modeling) http://www.blender.org/
Darktable (Photo workflow) http://www.darktable.org/
Inkscape (Vector graphic) http://www.inkscape.org/
15
Clip Art / Photo / Sound / Music / Fonts
16
Licenses
Source: Creative Commons: Six licenses for sharing your work
Public Domain
17
Public Domain
18
Safety Guidelines
● Law and Regulations
● Copyright Act B.E. 2537
● Computer-Related Crime Act B.E. 2550
● Malicious Software
● Privacy
19
Computer-Related Crime Act
Sec. Offenses Imprison Fine
5 Illegal access to system 6 month 10,000 THB
6 Disclosure of security procedure 1 year 20,000 THB
7 Illegal access to data 2 year 40,000 THB
8 Interception 3 year 60,000 THB
9 System interference 5 year 100,000 THB
10 Data interference 5 year 100,000 THB
11 Spam - 100,000 THB
12 National security * *
13 Dissemination of software 1 year 20,000 THB
20
(cont'd.)
Sec. Offenses Imprison Fine
14 Improper contents / Lèse majesté 5 year 100,000 THB
15 Support offender 5 year 100,000 THB
16 Defamation 3 year 60,000 THB
21
Safety Guidelines
● Law and Regulations
● Copyright Act B.E. 2537
● Computer-Related Crime Act B.E. 2550
● Malicious Software
● Privacy
22
Malicious Software
84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 13
0
20,000,000
40,000,000
60,000,000
80,000,000
100,000,000
120,000,000
140,000,000
160,000,000
180,000,000
200,000,000
Source: av-test.org
23
(cont'd.)
Source: Microsoft Security Intelligence Report vol.15
24
(cont'd.)
● Updates, patches, fixes
● Operating system
● Anti-virus software
● Backup, verify, and recovery
● Be skeptical of pop-up windows, error messages, attachments,
spam, ...
● Think twice before installing any new software
● “Use your common sense”
25
Safety Guidelines
● Law and Regulations
● Copyright Act B.E. 2537
● Computer-Related Crime Act B.E. 2550
● Malicious Software
● Privacy
26
Protecting Your Privacy
● Protecting ...
● Your identity
● Citizen ID, Account, e-mail address, ...
● Your personal information
● Photo, Birth date, Address, Contact, ...
● Habits, Tastes, Comments, Likes, ...
● From ...
● On-line activities: search, mail, chat, blog, forum, comment, social network
● Off-line activities: repair, claim, service
● Use HTTP secure (https) protocols
● Use strong password(s)
● Multi-Factor Authentication – if available
27
Kitt Tientanopajai, D.Eng.
(kitt@kku.ac.th)
Assistant to the President for IT Affairs
Khon Kaen University
Director, Institute of Learning and Teaching Innovation
Khon Kaen Univesity

More Related Content

Similar to KKU ICT

Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Rafael Maranon
 
ICT Strategic Planning - Kenya Agricultural Training Institutions
ICT Strategic Planning - Kenya Agricultural Training InstitutionsICT Strategic Planning - Kenya Agricultural Training Institutions
ICT Strategic Planning - Kenya Agricultural Training InstitutionsNicholas Kimolo
 
Method and apparatus for network immunization
Method and apparatus for network immunizationMethod and apparatus for network immunization
Method and apparatus for network immunizationTal Lavian Ph.D.
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats FasterForce 3
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Industrial Revolution 4.0 & 5.0
Industrial Revolution 4.0 & 5.0Industrial Revolution 4.0 & 5.0
Industrial Revolution 4.0 & 5.0Ahmad Manzoor
 
Case study on Pamplona National High School Local Area Network
Case study on Pamplona National High School Local Area NetworkCase study on Pamplona National High School Local Area Network
Case study on Pamplona National High School Local Area NetworkJude Rainer
 
Internet, TV and Voice over Satellite The Future is Now
Internet, TV and Voice over Satellite The Future is NowInternet, TV and Voice over Satellite The Future is Now
Internet, TV and Voice over Satellite The Future is NowAntonio Bove
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesAlcatel-Lucent Enterprise
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
MECC Central roadshow
MECC Central roadshowMECC Central roadshow
MECC Central roadshowscottdavey
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Jisc
 
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
 

Similar to KKU ICT (20)

Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014
 
ICT Strategic Planning - Kenya Agricultural Training Institutions
ICT Strategic Planning - Kenya Agricultural Training InstitutionsICT Strategic Planning - Kenya Agricultural Training Institutions
ICT Strategic Planning - Kenya Agricultural Training Institutions
 
Method and apparatus for network immunization
Method and apparatus for network immunizationMethod and apparatus for network immunization
Method and apparatus for network immunization
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Industrial Revolution 4.0 & 5.0
Industrial Revolution 4.0 & 5.0Industrial Revolution 4.0 & 5.0
Industrial Revolution 4.0 & 5.0
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Case study on Pamplona National High School Local Area Network
Case study on Pamplona National High School Local Area NetworkCase study on Pamplona National High School Local Area Network
Case study on Pamplona National High School Local Area Network
 
Internet, TV and Voice over Satellite The Future is Now
Internet, TV and Voice over Satellite The Future is NowInternet, TV and Voice over Satellite The Future is Now
Internet, TV and Voice over Satellite The Future is Now
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
MECC Central roadshow
MECC Central roadshowMECC Central roadshow
MECC Central roadshow
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
 
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
 

More from Kitt Tientanopajai

Social Media, Digital Intelligence
Social Media, Digital IntelligenceSocial Media, Digital Intelligence
Social Media, Digital IntelligenceKitt Tientanopajai
 
นวัตกรรมและเทคนิคการบริหารสมัยใหม่
นวัตกรรมและเทคนิคการบริหารสมัยใหม่นวัตกรรมและเทคนิคการบริหารสมัยใหม่
นวัตกรรมและเทคนิคการบริหารสมัยใหม่Kitt Tientanopajai
 
Learning Tools and Media for 21st Century Students
Learning Tools and Media for 21st Century StudentsLearning Tools and Media for 21st Century Students
Learning Tools and Media for 21st Century StudentsKitt Tientanopajai
 

More from Kitt Tientanopajai (8)

Social Media, Digital Intelligence
Social Media, Digital IntelligenceSocial Media, Digital Intelligence
Social Media, Digital Intelligence
 
Education in Digital Age
Education in Digital AgeEducation in Digital Age
Education in Digital Age
 
Security, privacy, ethics
Security, privacy, ethicsSecurity, privacy, ethics
Security, privacy, ethics
 
Social Media in Learning
Social Media in LearningSocial Media in Learning
Social Media in Learning
 
ICT Ethics
ICT EthicsICT Ethics
ICT Ethics
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
นวัตกรรมและเทคนิคการบริหารสมัยใหม่
นวัตกรรมและเทคนิคการบริหารสมัยใหม่นวัตกรรมและเทคนิคการบริหารสมัยใหม่
นวัตกรรมและเทคนิคการบริหารสมัยใหม่
 
Learning Tools and Media for 21st Century Students
Learning Tools and Media for 21st Century StudentsLearning Tools and Media for 21st Century Students
Learning Tools and Media for 21st Century Students
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

KKU ICT

  • 1. 1 ICT Facilities in Khon Kaen University
  • 2. 2 KKU Campus Network KKU Main Campus CAT KKU Nong Khai Campus10 Gbps Core 2 Gbps 1 Gbps 1 Gbps UniNet UniNet UNE PoP 10 Gbps 1 Gbps Edge 100 Mbps 40 Gbps to IIG 30 Gbps to NIX
  • 3. 3 GADAlumni SAC Computer Center Registrar ILTI Personnel TQF HR Reg - e-Learning - e-Testing - e-Portfolio - Class Record Accounts ILP - Mail - MIS - Meeting - Cluster - Strategy - Payroll - FMIS - SIP phone Alumni e-Office
  • 5. 5 KKU IT Services Mail https://mail.kku.ac.th/ e-Learning https://e-learning.kku.ac.th Software https://software.kku.ac.th Virtual Private Network OpenVPN: https://vpn.kku.ac.th/ PPTP/PPTPS: pptps.kku.ac.th Soft Phone https://sip.kku.ac.th http://phone.kku.net
  • 6. 6 (cont'd.) Google Apps for Education https://webmail.kku.ac.th http://gapps.kku.ac.th Microsoft Office 365 Education https://portal.microsoftonline.com/ On-line Storage https://storage.kku.ac.th/ KKU Apps Portal https://apps.kku.ac.th/ e-Office https://e-office.kku.ac.th/
  • 7. 7 Safety Guidelines ● Law and Regulations ● Copyright Act B.E. 2537 ● Computer-Related Crime Act B.E. 2550 ● Malicious Software ● Privacy
  • 8. 8 Software Pricing ? Software Price (THB) * ACDSee 10 3,000 Adobe Acrobat Professional 10 22,000 Adobe Photoshop CSุ 36,000 AutoDesk AutoCAD 2014 155,000 Kaspersky Internet Security 2014 890 Microsoft Windows 8.1 4,590 Microsoft Windows Server Standard 2012 (5 clients) 37,000 Microsoft Office Professional 2013 15,000 Oracle Database 10g Enterprise (per processor) 1,500,000 SPSS Statistic Base 18 (Perpetual) 38,000 WinZip 12 Pro 3,500 * approximate / 2014
  • 9. 9 I got it all in one CD, only 100 THB ? Source: openclipart.org Public Domain
  • 10. 10 Piracy Rates Worldwide 42% $63.4 B. Asia Pacific 60% $21 B. Thailand 72% $852 M. Source: 9th Annual BSA/IDC Global Software Piracy Study 2012
  • 11. 11
  • 13. 13 Free Open Source Software / Freeware
  • 14. 14 OpenOffice (Office suite) http://www.openoffice.org/ LibreOffice (Office suite) http://www.libreoffice.org/ Firefox (Web browser) http://www.mozilla.org/firefox/ Chromium (Web browser) http://www.chromium.org/ R Project (Statistical) http://www.r-project.org/ Zotero (Reference manager) http://www.zotero.org/ SciLab (Mathematical) http://www.scilab.org/ GIMP (Photo retouching) http://www.gimp.prg/ Blender (3D modeling) http://www.blender.org/ Darktable (Photo workflow) http://www.darktable.org/ Inkscape (Vector graphic) http://www.inkscape.org/
  • 15. 15 Clip Art / Photo / Sound / Music / Fonts
  • 16. 16 Licenses Source: Creative Commons: Six licenses for sharing your work Public Domain
  • 18. 18 Safety Guidelines ● Law and Regulations ● Copyright Act B.E. 2537 ● Computer-Related Crime Act B.E. 2550 ● Malicious Software ● Privacy
  • 19. 19 Computer-Related Crime Act Sec. Offenses Imprison Fine 5 Illegal access to system 6 month 10,000 THB 6 Disclosure of security procedure 1 year 20,000 THB 7 Illegal access to data 2 year 40,000 THB 8 Interception 3 year 60,000 THB 9 System interference 5 year 100,000 THB 10 Data interference 5 year 100,000 THB 11 Spam - 100,000 THB 12 National security * * 13 Dissemination of software 1 year 20,000 THB
  • 20. 20 (cont'd.) Sec. Offenses Imprison Fine 14 Improper contents / Lèse majesté 5 year 100,000 THB 15 Support offender 5 year 100,000 THB 16 Defamation 3 year 60,000 THB
  • 21. 21 Safety Guidelines ● Law and Regulations ● Copyright Act B.E. 2537 ● Computer-Related Crime Act B.E. 2550 ● Malicious Software ● Privacy
  • 22. 22 Malicious Software 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 13 0 20,000,000 40,000,000 60,000,000 80,000,000 100,000,000 120,000,000 140,000,000 160,000,000 180,000,000 200,000,000 Source: av-test.org
  • 23. 23 (cont'd.) Source: Microsoft Security Intelligence Report vol.15
  • 24. 24 (cont'd.) ● Updates, patches, fixes ● Operating system ● Anti-virus software ● Backup, verify, and recovery ● Be skeptical of pop-up windows, error messages, attachments, spam, ... ● Think twice before installing any new software ● “Use your common sense”
  • 25. 25 Safety Guidelines ● Law and Regulations ● Copyright Act B.E. 2537 ● Computer-Related Crime Act B.E. 2550 ● Malicious Software ● Privacy
  • 26. 26 Protecting Your Privacy ● Protecting ... ● Your identity ● Citizen ID, Account, e-mail address, ... ● Your personal information ● Photo, Birth date, Address, Contact, ... ● Habits, Tastes, Comments, Likes, ... ● From ... ● On-line activities: search, mail, chat, blog, forum, comment, social network ● Off-line activities: repair, claim, service ● Use HTTP secure (https) protocols ● Use strong password(s) ● Multi-Factor Authentication – if available
  • 27. 27 Kitt Tientanopajai, D.Eng. (kitt@kku.ac.th) Assistant to the President for IT Affairs Khon Kaen University Director, Institute of Learning and Teaching Innovation Khon Kaen Univesity