SUPPLY CHAIN MANAGEMENT UNIVERSITY OF NORTHERN PHILIPPINES, AN ACADEMIC INSTI...Arpee Callejo
A supply Chain of the University of Northern Philippines and E-commerce business strategies. For more click.. https://www.powtoon.com/online-presentation/fincXSLD2iD/?mode=presentation
Application of FOSS in University Libraries in Sri LankaUniversity
It was based on a survey done amongst the university libraries in Sri Lanka, to explore the extent to which FOSS tools are being utilized to enhance the library service quality and management, in general.
SUPPLY CHAIN MANAGEMENT UNIVERSITY OF NORTHERN PHILIPPINES, AN ACADEMIC INSTI...Arpee Callejo
A supply Chain of the University of Northern Philippines and E-commerce business strategies. For more click.. https://www.powtoon.com/online-presentation/fincXSLD2iD/?mode=presentation
Application of FOSS in University Libraries in Sri LankaUniversity
It was based on a survey done amongst the university libraries in Sri Lanka, to explore the extent to which FOSS tools are being utilized to enhance the library service quality and management, in general.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
4. § Formulated to establish Lanka Education And Research Network (LEARN), the
NREN (National Research and Education Network) of Sri Lanka, as a Limited
Guarantee Company 2009.
§ Membership
16 Full Members 15 Associate Members 15 Affiliate Members
§ The Operation of LEARN is Governed by the Articles of Association of LEARN
(2009).
§ Managed by the LEARN Board of Directors, one member each from the full
member institutions.
4
LEARN
11. 12
LEARN – Member VPLS
(Virtual Private LAN Service)
Universities
University of Colombo
Eastern University
University of Jaffna
University of Kelaniya
University of Moratuwa
Open University of Sri Lanka
University of Peradeniya
Rajarata University
University of Ruhuna
Sabaragamuwa University
South Eastern University
University of Sri Jayawardenapura
Uva-Wellassa University
University of the Visual and Performing Arts
Wayamba University
Bhiksu University of Sri Lanka
Buddhist & Pali University of Sri Lanka
General Sir John Kotelawala Defense University
Ocean University of Sri Lanka
Sri Palee Campus
Vocational Training Institutes
Sri Lanka – German Training Institute (SLGTI)
Sri Lanka Institute of Advanced Technological
Education (SLIATE)
Informatics Institute of Technology
Research Institutes
Arthur C Clarke Center for Modern Technologies (ACCMT)
Industrial Technology Institute (ITI)
National Institute of Fundamental Studies (NIFS)
National Aquatic Resources Agency (NARA)
National Science Foundation (NSF)
National Engineering Research and Development Center
(NERDC)
Postgraduate Institutes
Postgraduate Institute of Agriculture (PGIA)
Postgraduate Institute of Medicine (PGIM)
Postgraduate Institute of Humanities and Social Sciences (PGIHS)
12. 13
LEARN – Member Backup VPLS
(Virtual Private LAN Service)
Universities
University of Colombo
Eastern University
University of Jaffna
University of Kelaniya
University of Moratuwa
Open University of Sri Lanka
University of Peradeniya
Rajarata University
University of Ruhuna
Sabaragamuwa University
South Eastern University
University of Sri Jayawardenapura
Uva-Wellassa University
University of the Visual and Performing Arts
Wayamba University
General Sir John Kotelawala Defense University
13. 14
2Gbps
Highest local link bandwidth
§ University of Peradeniya
§ University of Moratuwa
10Mbps
Lowest local link bandwidth
§ Members with the higher bandwidths
also have separate backup links from
a second service provider
§ 300 Mbps - 1 Gbps→ 100 Mbps
§ > 1Gbps → 200 Mbps
77Connections Optical Fiber
Member Connection - Summary
15. 17
A long term (15 years) 100G Asia-Europe Backbone
§ Asiapacific-Europe Ring (AER) MoU (Putrajaya, 22 July 2019)
• CAE-1 (AARNet, GÉANT, NORDUnet, SingAREN, SURFnet, TEIN*CC) and NICT, NII (Japan)
• Extensive backup links ensure network resilience and boost connectivity between Asia and Europe
for R&E
16. 18
LEARN – QoS
International Connectivity
(average to Chennai and Singapore
from Colombo/LEARN core)
• Availability - 99.8%
• Delay - 20ms
• Jitter - 4ms
• Packet loss – 0
(for non-congested fiber circuits)
Local Connectivity
(End Users to Colombo/LEARN core)
• Availability - 99.5%
• Delay – 4ms
(end users to the LEARN core)
• Jitter - 2ms
• Packet loss – 0
(for non-congested fiber circuits)
Delay Jitter Packet LossAvailability
21. 23
How eduroam works
eduroam is built with
• IEEE 802.1X (A standard for port based Network Access Control) and
• RADIUS (Remote Authentication Dial-In User Service).
22. IRS - Institutional Radius Server
Main Connectivity Topology for IRS’s
ac.lk
xxx.ac.lk
APAN TLS
23. IRS - Institutional Radius Server
Main Connectivity Topology for IRS’s
ac.lk
xxx.ac.lk
APAN TLS
xxx.ac.lk
24. IRS - Institutional Radius Server
Main Connectivity Topology for IRS’s
ac.lk
aa.xxx.ac.lk
APAN TLS
xxx.ac.lk
28. 30
eduroam - Current Members
1
13 1
1
1
1
Institute Joined Date
Open University of Sri Lanka 2015/09
University of Kelaniya 2015/09
University of Peradeniya 2015/10
University of Colombo, School of Computing 2015/11
University of Moratuwa 2016/03
Faculty of Engineering, University of Ruhuna 2016/06
Informatics Institute of Technology 2016/12
University of the Visual and Performing Arts 2017/10
Sabaragamuwa University 2017/10
Uva-Wellassa University 2018/10
Industrial Technology Institute 2018/10
Faculty of Medicine, University of Kelaniya, Ragama 2018/10
Arthur C Clarke Institute for Modern Technologies 2018/10
Faculty of Technology, University of Ruhuna 2019/05
University Grants Commission (UGC) 2019/06
University of Colombo 2019/07
South Eastern University 2019/08
1
29. § Increase the number of eduroam IRS’s
§ Awareness programs for Academics, Students, Researchers, etc.
§ Awareness poster campaign
§ Extend eduroam coverage to selected public places
§ REQUEST to ISPs
eduroam - Future Plans
31. The Model
Centered on the User Identifier (NetID) - A single unique University wide
identifier bound to the individual user and used at log-in to provision:
Authentication
Quickly verify user identities
(Who you are?)
Authorization
Control users access
(What you can access?)
Administration
Manage user privileges by role, group, status, etc.
Allows for fine-grained policy application
32. Federated Identity
Current mechanisms
• Assume applications are within the
same administrative domain.
• Adding an external user means creating
an account in your ID system.
• This could result in the new user having
access to more than just the intended
application.
Federated Identity Management (FIM)
• Securely shares information managed
at a users home organization with
remote services.
• It doesn’t matter if the service is in your
administrative domain or another. It’s all
handled the same way.
Identity
Provider
Service
Provider
Access Authenticate
Service
Provider
33. Federated Identity
§ A Service Provider (SP) relies on the AuthN at the IdP, consumes the
information the IdP provided and makes it available to the application.
Access
Authentication (AuthN)
takes place where the user
is known
Identity Provider (IdP)
publishes authentication
and identity information
about its users
Authorization (AuthZ)
happens on the service's
side
34. Federated Identity
§ The first principle within federated identity management is the active
protection of user information
§ Protect the user’s credentials
§ Only the IdP ever handles the credentials
§ Protect the user's personal data, including the identifier
§ A customized set of information gets released to each SP
35. Identity Providers
Organisations with users run Identity Providers
§ Provide a login page
§ Provides a mechanism for consent of attribute
release
§ Login page is branded to the organisation
§ Login against the organisation LDAP or AD
§ Manages password reset
§ Provisions and de-provisions accounts
§ Agrees to the federation policies
Can be used for campus Single Sign-on as well as
federated SSO!
36. Service Providers
Run by organizations that have something to offer the federation community
§ Hands off authentication to IdPs
§ Obtains attributes from IdPs
§ Agrees to the federation policies
44. Killer App?
Introduced Zoom Video Conferencing with Federated Access using SATOSA SAML Proxy
https://learn.zoom.us
Did an informational seminar to Technical / Non Tech 200 users on 12th July 2019
45. Institute Joined Date
Industrial Technology Institute - Sri Lanka 2018-11-06
Faculty of Medicine, University of Kelaniya 2018-11-28
Faculty of Technology, University of Ruhuna 2018-12-20
University of Colombo School of Computing 2019-06-07
University of the Visual and Performing Arts 2019-06-12
University Grants Commission - Sri Lanka 2019-06-12
University of Kelaniya - Sri Lanka 2019-06-13
University of Moratuwa 2019-06-14
IDP for LEARN Staff 2018-10-16
Faculty of Engineering, University of Ruhuna 2019-06-21
Uwa Wellassa University 2019-07-04
Faculty of Medicine, University of Ruhuna 2019-07-10
University of Colombo 2019-08-08
University of Peradeniya 2019-08-17
South Eastern University 2019-08-23
University of Ruhuna 2019-08-28
University of Sri Jayawardenapura 2019-09-05
Current Members
1
10 1
1
1
3
46. LEARN as a Service Provider
§ LEARN maintains a local indico instance as an event manager, opened to all through
eduGAIN with Research and Scholarship Entity Category, Uses eduTEAMS as discovery
service.
§ eduTEAMS is a IDP discovery service provided by eduGAIN to identify participating IDP’s
https://indico.learn.ac.lk
48. § Increase the number of IDPs
§ More awareness programs for Academics, Students, Researchers, etc.
§ extend eduroam coverage to selected public places so that people will be
interested more on Identity enabled Services
§ Implement Monitoring and Analysis tools
§ Introduce SAML based authentication to all other LEARN provided services +
increase SPs
§ Hire some additional staff to be dedicated on LIAF activities – partially done
§ Request from ISP's to enable LIAF to their services, opening doors to 1000's
of academics and students
§ Include gov.lk portals through LGN (Lanka Government Network)
Future Plans
49. § LEARN and the ISPs
§ Connectivity
§ eduroam
§ Identity Access Management
(IAM)
Summary
§ TEIN*CC
§ Thilina Pathirana, LEARN
§ Internet Sources
Acknowledgement