Secure Services. A user support perspective. Frank J. Reda. Director, Distributed Computing Support Rutgers University Computing Services New
|
|
- Brian Lindsey
- 5 years ago
- Views:
Transcription
1 Secure Services A user support perspective Frank J. Reda Director, Distributed Computing Support Rutgers University Computing Services New Brunswick
2 Agenda Description of secure services RUCS-NB implementation Recommended clients Impact on our end users
3 What are secure services? We ll start by looking at insecure services, concentrating on two specific aspects: Passwords Encryption of data
4 What are secure services? The network as we know it today was built around services that offered little or no default security: Telnet FTP (file transfer protocol) Web browsers
5 What are secure services? In many cases, passwords were required to access services over the network. With no default encryption of passwords, compromise was always a risk. Once an intruder had your password, they had access to all of the services that accepted that password.
6 Why are secure services important? Most online systems incorporate some kind of password based access. If passwords are easily compromised, systems may be easily compromised. Most people assume their password is secure when it is transmitted across the network, not realizing that it is possible for others to gain access to it.
7 Why are secure services important? Rutgers is moving in the direction of using NetID (username/password) as the main source for authentication to university applications. If you use your NetID to access insecure services, and thus risk compromising your password, you may also be compromising the integrity of other University systems.
8 Why are secure services important? Certain government regulations require Certain government the security of sensitive data. Unencrypted data traveling over a network can be snooped. As snooping gets easier, this becomes a bigger issue. In some cases, inadequate protection and custodial care of data may lead to legal action.
9 Why are secure services important? The level of technical savvy is increasing. There are sources on the web that teach you how to snoop. Access to snooping tools is increasing. Previously, snooping involved getting physical access to a network connection. With wireless networking, you can snoop a network without getting anywhere near the physical network components.
10 Exploits Associated with Weak Security Password exploits expose systems to intrusion that appears to be from valid users. Intrusion involves unauthorized access to the network or the data traveling on the network. Programs exist to capture data streams, and reconstruct communications. The services we re implementing seek to minimize these risks.
11 What will the secure services implementation accomplish? Encryption of passwords Encrypted data channels The potential for stronger password security Minimize risks associated with intrusion / snooping Post-It Username: reda Password: hockeypuck
12 RUCS NB Implementation Secure services, in the RUCS-NB context, refers to a set of services that will be available solely via encrypted channels. The implementation calls for decommissioning of insecure communications channels. The implementation of secure services concentrates on: The implementation of secure services Telnet clients FTP clients (and ( web authoring tools using FTP) FTP clients X clients
13 RUCS NB Implementation As of July 1, 2003, the Rutgers New Brunswick campus will begin turning off access to selected insecure versions of these services. By August 15, 2003, all access to telnet, FTP and on RUCS systems in New Brunswick will require secure communications capabilities. The discontinuation of insecure services is being done over 6 weeks to minimize the support impact.
14 RUCS NB Implementation As of March 1, 2003, RUCS-NB began a campaign to communicate with and educate the end user population regarding the upcoming changes. Response to the announcements has been minimal Response to the announcements has been Maybe no one is listening? Maybe they don t understand the impact? Maybe they re waiting for things to break?
15 RUCS NB Implementation In February, RUCS-NB announced the changes to Apple, PC and Unix administrator groups Unit Computing Specialists were also notified of the likely implications of the upcoming changes Reaction from the technical staff was mostly positive
16 Implications for End Users Effective August 15, 2003 insecure versions of the following tools will no longer work: Effective August 15, 2003 insecure versions of Telnet FTP Current clients will probably not work Reconfiguration of existing clients may be necessary Acquisition and installation of new software may be necessary
17 Implications for End Users Old comfortable tools may not work any more Things will look different Procedures may be slightly different
18 Implications for UCS s UCS s received advance notification of the changes Proactive UCS s should see minimal impact when insecure services are turned off Peripheral systems (those not directly supported by UCS s) ) may not be kept up to date Support call volume should rise/fall at an inverse rate to the effort expended in anticipation of the transition process
19 So, what changes?
20 Recommended Clients Windows SSH Clients SSH Corp. $L Putty FTP Clients SSH Corp. (text / graphical) Putty WinSCP WinSCP (graphical) Microsoft Outlook 2000 XP $$ Microsoft Outlook Express Netscape Communicator 4.7 & up (Very) Limited support for Eudora / Pegasus Mail
21 Recommended Clients Macintosh SSH FTP Mac SSH (OS 8, 9) Terminal (OS X) Fugu Fugu (OS X) SFTP (OS X) SCP (OS X) Terminal (OS X) Mac SFTP (OS 8, 9, X) $$ Entourage (OS 8, 9, X) $$ Netscape Communicator 4.7 (OS 8, 9) Netscape Communicator 7 (OS X) Mail App (OS X)
22 Recommended Clients Linux Open SSH SFTP and SCP Netscape Communicator
23 Recommended Procedures X11 Procedures on SSH X11 forwarding are available on our Secure Services website.
24 Web Editors Some web editors use FTP to publish web pages: Netscape Composer Macromedia Dreamweaver Microsoft FrontPage Adobe GoLive! These applications do not currently support secure FTP mechanisms
25 Web Editors There are products that allow users to mount (what look like) local drives/folders using secure FTP mechanisms. We recommend: WebDrive ($L ( $L) ) for Windows users Interarchy ($$ $$) ) for Macintosh users Using these products, developers can publish to local designations of FTP directories.
26 Documentation RUCS-NB has authored web pages to announce the service changes and to make available necessary clients. RUCS-NB has authored how-to documentation to guide users through the process of transitioning client software to secure services.
27 Documentation All updated documentation related to this effort is available at: All updated documentation related to this effort is services.php3 Sample documentation and recent versions of the client software is available on the CD we ll be handing out. Additional supporting documentation is available at: Additional supporting documentation is available mssg.rutgers.edu/software/
28 Secure Services CD Please note that the CD contains software licensed to Rutgers University. If you are attending from outside the University, you are welcome to view the CD, but we kindly ask that you do not install the licensed software.
29 Training The main thrust of our training effort was in the documentation area UCS s The main thrust of our training effort was in the UCS s were notified of the coming changes and directed to the documentation for guidance Documentation was written for end users The tools themselves don t change, just the settings. Help Desk staff have been apprised of necessary information related to the transition and will guide users through the documentation, escalating unresolved issues to senior staff
30 Communication Plans Targeted communications March 1 April 1 May 1 June 2 Announcement on top level University web pages in June Paper mailings
31 Summary RUCS-NB is moving to secure services to reduce the risk of password compromise and increase data security. Such a move represents a significant event for users. Documenting necessary changes to user applications is no small task
32 Summary Communication regarding the change is critical to success Enlist the assistance of allies Communicate to the masses Train your support staff In your organization In affected areas
33 Questions?
SONOTON storage server
The SONOTON storage server offers different protocols which all use SSL secured communications. All protocols will work with the login details given to you by SONOTON. Overview: Protocols supported: HTTPS
More informationMinimum Security Standards for Networked Devices
University of California, Merced Minimum Security Standards for Networked Devices Responsible Official: Chief Information Officer Responsible Office: Information Technology Issuance Date: Effective Date:
More informationFirewall Identification: Banner Grabbing
Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner
More informationBIF713. Operating Systems & Project Management. Instructor: Murray Saul Webpage: murraysaul.wordpress.
BIF713 Operating Systems & Project Management Instructor: Murray Saul E-mail: murray.saul@senecacollege.ca Webpage: murraysaul.wordpress.com Today's Topics Types of computer servers at Seneca College Introduction
More informationFtp Command Line Manual Windows Passive Mode Linux
Ftp Command Line Manual Windows Passive Mode Linux To Connect to Box with Command Line (Advanced users on Mac or Linux) Windows built-in ftp command line utility cannot support passive mode (even. open
More informationTelnet/SSH. Connecting to Hosts. Internet Technology 1
Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use
More informationLAB #5 Intro to Linux and Python on ENGR
LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationMulti-factor Authentication Instructions
What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.
More informationFtp Command Line Commands Linux Example Windows Putty
Ftp Command Line Commands Linux Example Windows Putty Installing a FTP server, 11. Switch to Console mode from Graphical User Interface For example, the following creates an entry to start Eclipse with
More informationoit
This handout is for passwordprotecting content on people. umass.edu or courses.umass.edu Web sites. To protect content on www.umass.edu-level sites, see our HTPASSWD to Password- Protect Pages on Campus
More informationProject #6: Using ssh, scp and sftp with Key-Based Authentication
Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our
More informationThis section discusses the protocols available for volumes on Nasuni Filers.
Nasuni Corporation Boston, MA Introduction The Nasuni Filer provides efficient and convenient global access to your data. Nasuni s patented file system, UniFS, combines the performance and consistency
More informationMulti-factor Authentication Instructions
What is MFA? (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account. MFA authentication is typically
More informationNHSmail 2 User Transition Guide
NHSmail 2 User Transition Guide Version 3.0 Published 30 June 2016 Update Log Key Updated Sections Users will receive their 4GB mailbox quota once their mailbox transitions to NHSmail 2 Refer to the Service
More informationSTA 303 / 1002 Using SAS on CQUEST
STA 303 / 1002 Using SAS on CQUEST A review of the nuts and bolts A.L. Gibbs January 2012 Some Basics of CQUEST If you don t already have a CQUEST account, go to www.cquest.utoronto.ca and request one.
More informationcomforte s solutions for secure file transfer
comforte s solutions for secure file transfer Thomas Burg comforte GmbH ITUG San Jose, October 2005 This presentation presents comforte s solution for secure file transfer on the NonStop platform. It was
More informationDiocese of Wollongong MS Exchange
Diocese of Wollongong MS Exchange email Important: To use your new email at school (School Location), you will need to add the Network Proxy Exclusion: mail.woll.catholic.edu.au to your Proxy exclusions
More informationFIT 100: Fluency with Information Technology
FIT 100: Fluency with Information Technology Lab 1: UW NetID, Email, Activating Student Web Pages Table of Contents: Obtain a UW Net ID (your email / web page identity):... 1 1. Setting Up An Account...
More informationNHSmail Migration Communications Plan Template
NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationINTRANET GUIDANCE. Acorn Care & Education is improving the way that everyone working in our schools can access and share information.
INTRANET GUIDANCE Acorn Care & Education is improving the way that everyone working in our schools can access and share information. There are now two websites: Public information can be found on our website;
More informationCS321: Computer Networks FTP, TELNET, SSH
CS321: Computer Networks FTP, TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in FTP File Transfer Protocol (FTP) is the standard protocol provided
More informationIMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES
UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY DAVIS IRVINE LOS ANGELES RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ ECONOMETRICS LABORATORY Institute of Business and Economic Research ECONOMETRICS
More informationTELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the
Telnet/SSH TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the terminal at the remote location. Usually establishes
More informationUsing the FDR for Mac Users
Using the FDR for Mac Users Author(s): Jack Mello version: 1.2 Written: June 7, 2010 Modified: June 21, 2011 ----------------------- Software: - Mac OS X 10.6.7 - Cyberduck Version 3.8 (7920) Using the
More informationQuick Start Guide. Version 4.0
Quick Start Guide Quick-Start Guide TM Version 4.0 3am Laboratories PL 2002 3am Laboratories PL www.re.com Remo ywher About Remo ywhere ywhere Quick-Start Guide Re is a remote administration tool that
More informationCS 1301 Fall 2008 Lab 2 Introduction to UNIX
CS 1301 Fall 2008 Lab 2 Introduction to UNIX Due: Friday, September 19 th, at 6 PM (Monday, September 22 nd for 10% off) Notes: Do not wait until the last minute to do this assignment in case you run into
More informationLinux Network Administration
Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH
More informationBank of Hawaii Protecting Confidential . What's in this User Guide
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent
More informationFlash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes
Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we
More informationSECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them
BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note
More informationFtp Command Line Manual Windows Username Password Linux
Ftp Command Line Manual Windows Username Password Linux Midnight Commander is a console based full-screen text mode File Manager that allows you to copy, MC has many features which are useful for a user
More informationCS Operating Systems, Fall 2018 Project #0 Description
CS314-002 Operating Systems, Fall 2018 Project #0 Description Due: 11:00 A.M., September 5, 2018 I. Project Narrative: The primary objectives in this project are: (1) confirm your account (user name and
More informationCS 1301 Lab 2 Introduction to Webservers at GaTech
CS 1301 Lab 2 Introduction to Webservers at GaTech Due Friday February 19th, 2016, Before 11:55pm Notes: Do not wait until the last minute to do this assignment in case you run into problems. If you find
More informationConnect to Wireless, certificate install and setup Citrix Receiver
Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network, certificate and access applications using Citrix Receiver on a Bring Your
More informationREAD ME. UITS UAEU
READ ME UITS Services @ UAEU Welcome new employee! On behalf of myself and UITS, I would like to welcome you to United Arab Emirates University and wish you every success here. The University Information
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More informationAguascalientes Local Chapter. Kickoff
Aguascalientes Local Chapter Kickoff juan.gama@owasp.org About Us Chapter Leader Juan Gama Application Security Engineer @ Aspect Security 9+ years in Appsec, Testing, Development Maintainer of OWASP Benchmark
More informationSubnet Managers March 10, Preliminary Agenda
Subnet Managers March 10, 2010 Preliminary Agenda Central Mail Services Agenda Items Information Systems Middleware RamCT Licensing Windows Update Agenda Items (con t) NOC Technology Demonstration Trouble
More informationSkybot Scheduler Release Notes
Skybot Scheduler Release Notes Following is a list of the new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.5 Skybot Scheduler 3.5 (May 19, 2014 update) Informatica
More informationutrgv.edu/it IT Services GETTING UTRGV
IT Services GETTING CONNECTED @ UTRGV IT Service Desk www.youtube.com- @utrgvit Welcome to UTRGV video IT Service Desk Need Help? Request help or report an incident IT Service Desk Edinburg / McAllen /
More informationFEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs
FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA
More informationQuick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1
Quick Note 24 Extracting the debug.txt file from a TransPort Digi Technical Support February 2016 Page 1 Contents 1 Introduction... 3 2 Version... 4 3 FTP method... 5 3.1 FTP Using FileZilla FTP Client...
More informationOvercoming Remote Desktop Challenges with
Overcoming Remote Desktop Challenges with SPONSORED BY A BWW Media Group Brand By Michael Otey Michael Otey is president of TECA, Inc., which focuses on Windows and SQL Server product development and consulting.
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationCommon Report Engine Leipzig. Ref. 0003
Common Report Engine 08.05.2018 Leipzig Ref. 0003 Table of Contents 1. Introduction 3 1.1 SSH File Transfer Protocol 3 1.2 SSH/SFTP tools 3 2. Setup Process 4 2.1 Generation process for public / private
More informationComputing at MIT: Basics
Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing
More informationoit Using HTPASSWD to Password Protect Pages on Campus Web Server Web sites UMass Offi ce of Information Technologies
oit UMass Offi ce of Information Technologies This handout is for passwordprotecting content on www.umass. edu-level sites. To protect content on people.umass.edu or courses. umass.edu Web sites, see our
More informationUsing BlueStep Data Vault with WebDAV
Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard
More informationCS321: Computer Networks TELNET, SSH
CS321: Computer Networks TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in TELNET Many cases we need to have some generic client/server programs that
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationCSE 391 Editing and Moving Files
CSE 391 Editing and Moving Files Tips for moving files around to/from attu slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391 1 Remote Connections:
More informationContents. CMSP File Sharing User s Guide
2 Contents Overview... 3 x.500 id access... 4 Internal Accounts... 4 Virtual Private Network (VPN)... 5 Accessing Your Data on UMN network... 5 Windows Platforms... 5 OS X Platforms...14 3 Overview As
More informationSimple Linux Terminal Emulator For Windows Xp Putty
Simple Linux Terminal Emulator For Windows Xp Putty Read this 2015 review about the best free Telnet-SSH terminal emulators. Find out what Most free products only offer a narrow range of screen emulations,
More informationIntroduction to Linux Workshop 2. The George Washington University SEAS Computing Facility
Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationTechnology Department New Teacher Orientation August 8, 2017
Technology Department New Teacher Orientation August 8, 2017 1) Introduction of Technology Staff Cathy Ringo, Technology Director Aaron Johnston, Technology Specialist Mark Tlapek, Technology Specialist
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationFtp Command Line Manual Windows User Password
Ftp Command Line Manual Windows User Password SSH Guide SFTP on Mac OS X SFTP on Windows The most straight forward way to use SFTP is through the command line. a command line, you can alternately use an
More informationFiles.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team
Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationWelcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:
Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationVersion June 2016
HOSTING GUIDE Version 3.2.3 June 2016 This guide is sold in conjunction with the VETtrak Hosting Serv ice and is current at the time of purchase. Later v ersions are av ailable for download from www.v
More informationBozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room. Members
Bozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room Regular Regular Regular Others in Members Jerry Sheehan Members Chris Deshazo Members Rich Shattuck Attendance Lindsey
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationFeasibility study of scenario based self training material for incident response
24th Annual FIRST Conference Feasibility study of scenario based self training material for incident response June 21, 2012 Hitachi Incident Response Team Chief Technology and Coordination Designer Masato
More informationIT Operation Support Services Multi-factor Authentication (MFA) Enrollment User Guide
Help Desk Password Reset Instructions Dallas County Community College District IT Operation Support Services Multi-factor Authentication (MFA) Enrollment User Guide Version: 1.0 Release Date: 8/8/2018
More informationsftp - secure file transfer program - how to transfer files to and from nrs-labs
last modified: 2017-01-20 p. 1 CS 111 - useful details: ssh, sftp, and ~st10/111submit You write Racket BSL code in the Definitions window in DrRacket, and save that Definitions window's contents to a
More informationCMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts
CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts Setting Up (PC) Go to the link for the encrypted telnet program PuTTY (Simon Tatham s site in the UK at http://www.chiark.greenend.org.uk/~sgtatham/putty/).
More informationFaculty Quick Guide to Blackboard. Blackboard Version 9.1. Christine Paige Educational Technology Specialist.
Faculty Quick Guide to Blackboard Blackboard Version 9.1 Christine Paige Educational Technology Specialist paigec@strose.edu (518) 337-4912 July 2010 Table of Contents Description of Blackboard... 3 Uses
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationVersion 2.28 Release Note
Version 2.28 Release Note v2.28 Release Note Welcome to v2.28 of RM Unify RM Unify v2.28 is here. There are currently a number of features in field trial status before general release in September, including
More informationCompClass User Guide for Students The Bedford Handbook, Seventh Edition. Hacker
CompClass User Guide for Students The Bedford Handbook, Seventh Edition Hacker Getting Started with CompClass for The Bedford Handbook, Seventh Edition Table of Contents Overview... 1 Getting Help... 1
More informationCMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts
CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts The Goal The ultimate goal of this assignment is to create a Web page on the server, make sure it is visible to the outside world, and to design and
More informationHow to send absent s to parents automatically
How to send absent e-mails to parents automatically Send e-mails out to parents of absent children where no reason for the absence has been recorded. This is a time saving tool for administrative staff
More informationIT Service Upgrades Announcement
IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study
More informationAccessing your webspace at UC
Accessing your webspace at UC Workshop by CS GSA csgsa@ececs.uc.edu Workshop Objectives Why have a website? UC Resources Simple Demo to setup your website Resources & Tips Why have a website? Why not?
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationAspera Connect User Guide 3.7.0
Aspera Connect User Guide 3.7.0 Mac OS X Revision: 3.7.0.138343 Generated: 01/19/2017 13:37 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting Up Connect...5 Part 1: Installation...5
More informationInternal Audit Report DATA CENTER LOGICAL SECURITY
Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory
More informationHow To Establish A Compliance Program. Richard E. Mackey, Jr. SystemExperts Corporation
How To Establish A Compliance Program Richard E. Mackey, Jr. Vice president SystemExperts Corporation Agenda High level requirements A written program A sample structure Elements of the program Create
More informationIT in St John s College
IT in St John s College Welcome to St John s. Below is some information on the main IT systems you ll find in both St John s College and the University as well as some help to get you online. It will also
More informationAllen University Microsoft Office 365
Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted
More informationData Compromise Notice Procedure Summary and Guide
Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: St. Thomas University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationCalifornia State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines
California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY
More informationThis will be a paragraph about me. It might include my hobbies, where I grew up, etc.
Module 3 In-Class Exercise: Creating a Simple HTML Page Name: Overview We are going to develop our web-pages the old-fashioned way. We will build them by hand. Even if you eventually decide to use WYSIWYG
More informationWeb Publishing Overview
Web Publishing Overview Adam Cavotta and Christine L. Vucinich ITS Training Services http://its.psu.edu/training/ Objectives Examine the difference between using an HTML editor and hand coding Web pages
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationLinux Connection Guide
Linux Connection Guide .CIM Accessibility Linux.CIM is our Linux Terminal Server used by the students of Computer Science, Information Security and Mathematics. It is accessible 24-hours a day from both
More informationPersonal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018
Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About
More informationAGENDA. Importance of filing Form 700 edisclosure Process for Filing your Electronic Form 700 Resources Next Steps and Q & A
AGENDA Importance of filing Form 700 edisclosure Process for Filing your Electronic Form 700 Resources Next Steps and Q & A Importance of Filing Legal requirement from the Political Reform Act of 1974
More informationSmart Work Solution for DataStage ETL Job Management. Copyrightc Inwoo Tech, INC. All right reserved
Smart Work Solution for DataStage ETL Job Management DataStage operators manage DataStage jobs using the DataStage Director. How if you leave the office or are on the business trip? No more worries about
More informationLUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support
LUMINARE Using Intranets for Training and Performance Support Caitlin Curtin President and CEO Jeffrey Schneider Vice President, Technology What is an Intranet? An enterprise s private network of computers
More informationIntroduction to Discovery.
Introduction to Discovery http://discovery.dartmouth.edu The Discovery Cluster 2 Agenda What is a cluster and why use it Overview of computer hardware in cluster Help Available to Discovery Users Logging
More informationWebDAV. Overview. File Permissions and Management. Authentication Methods
WebDAV Overview WebDAV integration provides access to the file system on the staging server similar to FTP/SFTP and can be used in lieu of FTP/SFTP. WebDAV (Web Distributed Authoring and Versioning) is
More information