Secure Services. A user support perspective. Frank J. Reda. Director, Distributed Computing Support Rutgers University Computing Services New

Size: px
Start display at page:

Download "Secure Services. A user support perspective. Frank J. Reda. Director, Distributed Computing Support Rutgers University Computing Services New"

Transcription

1 Secure Services A user support perspective Frank J. Reda Director, Distributed Computing Support Rutgers University Computing Services New Brunswick

2 Agenda Description of secure services RUCS-NB implementation Recommended clients Impact on our end users

3 What are secure services? We ll start by looking at insecure services, concentrating on two specific aspects: Passwords Encryption of data

4 What are secure services? The network as we know it today was built around services that offered little or no default security: Telnet FTP (file transfer protocol) Web browsers

5 What are secure services? In many cases, passwords were required to access services over the network. With no default encryption of passwords, compromise was always a risk. Once an intruder had your password, they had access to all of the services that accepted that password.

6 Why are secure services important? Most online systems incorporate some kind of password based access. If passwords are easily compromised, systems may be easily compromised. Most people assume their password is secure when it is transmitted across the network, not realizing that it is possible for others to gain access to it.

7 Why are secure services important? Rutgers is moving in the direction of using NetID (username/password) as the main source for authentication to university applications. If you use your NetID to access insecure services, and thus risk compromising your password, you may also be compromising the integrity of other University systems.

8 Why are secure services important? Certain government regulations require Certain government the security of sensitive data. Unencrypted data traveling over a network can be snooped. As snooping gets easier, this becomes a bigger issue. In some cases, inadequate protection and custodial care of data may lead to legal action.

9 Why are secure services important? The level of technical savvy is increasing. There are sources on the web that teach you how to snoop. Access to snooping tools is increasing. Previously, snooping involved getting physical access to a network connection. With wireless networking, you can snoop a network without getting anywhere near the physical network components.

10 Exploits Associated with Weak Security Password exploits expose systems to intrusion that appears to be from valid users. Intrusion involves unauthorized access to the network or the data traveling on the network. Programs exist to capture data streams, and reconstruct communications. The services we re implementing seek to minimize these risks.

11 What will the secure services implementation accomplish? Encryption of passwords Encrypted data channels The potential for stronger password security Minimize risks associated with intrusion / snooping Post-It Username: reda Password: hockeypuck

12 RUCS NB Implementation Secure services, in the RUCS-NB context, refers to a set of services that will be available solely via encrypted channels. The implementation calls for decommissioning of insecure communications channels. The implementation of secure services concentrates on: The implementation of secure services Telnet clients FTP clients (and ( web authoring tools using FTP) FTP clients X clients

13 RUCS NB Implementation As of July 1, 2003, the Rutgers New Brunswick campus will begin turning off access to selected insecure versions of these services. By August 15, 2003, all access to telnet, FTP and on RUCS systems in New Brunswick will require secure communications capabilities. The discontinuation of insecure services is being done over 6 weeks to minimize the support impact.

14 RUCS NB Implementation As of March 1, 2003, RUCS-NB began a campaign to communicate with and educate the end user population regarding the upcoming changes. Response to the announcements has been minimal Response to the announcements has been Maybe no one is listening? Maybe they don t understand the impact? Maybe they re waiting for things to break?

15 RUCS NB Implementation In February, RUCS-NB announced the changes to Apple, PC and Unix administrator groups Unit Computing Specialists were also notified of the likely implications of the upcoming changes Reaction from the technical staff was mostly positive

16 Implications for End Users Effective August 15, 2003 insecure versions of the following tools will no longer work: Effective August 15, 2003 insecure versions of Telnet FTP Current clients will probably not work Reconfiguration of existing clients may be necessary Acquisition and installation of new software may be necessary

17 Implications for End Users Old comfortable tools may not work any more Things will look different Procedures may be slightly different

18 Implications for UCS s UCS s received advance notification of the changes Proactive UCS s should see minimal impact when insecure services are turned off Peripheral systems (those not directly supported by UCS s) ) may not be kept up to date Support call volume should rise/fall at an inverse rate to the effort expended in anticipation of the transition process

19 So, what changes?

20 Recommended Clients Windows SSH Clients SSH Corp. $L Putty FTP Clients SSH Corp. (text / graphical) Putty WinSCP WinSCP (graphical) Microsoft Outlook 2000 XP $$ Microsoft Outlook Express Netscape Communicator 4.7 & up (Very) Limited support for Eudora / Pegasus Mail

21 Recommended Clients Macintosh SSH FTP Mac SSH (OS 8, 9) Terminal (OS X) Fugu Fugu (OS X) SFTP (OS X) SCP (OS X) Terminal (OS X) Mac SFTP (OS 8, 9, X) $$ Entourage (OS 8, 9, X) $$ Netscape Communicator 4.7 (OS 8, 9) Netscape Communicator 7 (OS X) Mail App (OS X)

22 Recommended Clients Linux Open SSH SFTP and SCP Netscape Communicator

23 Recommended Procedures X11 Procedures on SSH X11 forwarding are available on our Secure Services website.

24 Web Editors Some web editors use FTP to publish web pages: Netscape Composer Macromedia Dreamweaver Microsoft FrontPage Adobe GoLive! These applications do not currently support secure FTP mechanisms

25 Web Editors There are products that allow users to mount (what look like) local drives/folders using secure FTP mechanisms. We recommend: WebDrive ($L ( $L) ) for Windows users Interarchy ($$ $$) ) for Macintosh users Using these products, developers can publish to local designations of FTP directories.

26 Documentation RUCS-NB has authored web pages to announce the service changes and to make available necessary clients. RUCS-NB has authored how-to documentation to guide users through the process of transitioning client software to secure services.

27 Documentation All updated documentation related to this effort is available at: All updated documentation related to this effort is services.php3 Sample documentation and recent versions of the client software is available on the CD we ll be handing out. Additional supporting documentation is available at: Additional supporting documentation is available mssg.rutgers.edu/software/

28 Secure Services CD Please note that the CD contains software licensed to Rutgers University. If you are attending from outside the University, you are welcome to view the CD, but we kindly ask that you do not install the licensed software.

29 Training The main thrust of our training effort was in the documentation area UCS s The main thrust of our training effort was in the UCS s were notified of the coming changes and directed to the documentation for guidance Documentation was written for end users The tools themselves don t change, just the settings. Help Desk staff have been apprised of necessary information related to the transition and will guide users through the documentation, escalating unresolved issues to senior staff

30 Communication Plans Targeted communications March 1 April 1 May 1 June 2 Announcement on top level University web pages in June Paper mailings

31 Summary RUCS-NB is moving to secure services to reduce the risk of password compromise and increase data security. Such a move represents a significant event for users. Documenting necessary changes to user applications is no small task

32 Summary Communication regarding the change is critical to success Enlist the assistance of allies Communicate to the masses Train your support staff In your organization In affected areas

33 Questions?

SONOTON storage server

SONOTON storage server The SONOTON storage server offers different protocols which all use SSL secured communications. All protocols will work with the login details given to you by SONOTON. Overview: Protocols supported: HTTPS

More information

Minimum Security Standards for Networked Devices

Minimum Security Standards for Networked Devices University of California, Merced Minimum Security Standards for Networked Devices Responsible Official: Chief Information Officer Responsible Office: Information Technology Issuance Date: Effective Date:

More information

Firewall Identification: Banner Grabbing

Firewall Identification: Banner Grabbing Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner

More information

BIF713. Operating Systems & Project Management. Instructor: Murray Saul Webpage: murraysaul.wordpress.

BIF713. Operating Systems & Project Management. Instructor: Murray Saul   Webpage: murraysaul.wordpress. BIF713 Operating Systems & Project Management Instructor: Murray Saul E-mail: murray.saul@senecacollege.ca Webpage: murraysaul.wordpress.com Today's Topics Types of computer servers at Seneca College Introduction

More information

Ftp Command Line Manual Windows Passive Mode Linux

Ftp Command Line Manual Windows Passive Mode Linux Ftp Command Line Manual Windows Passive Mode Linux To Connect to Box with Command Line (Advanced users on Mac or Linux) Windows built-in ftp command line utility cannot support passive mode (even. open

More information

Telnet/SSH. Connecting to Hosts. Internet Technology 1

Telnet/SSH. Connecting to Hosts. Internet Technology 1 Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use

More information

LAB #5 Intro to Linux and Python on ENGR

LAB #5 Intro to Linux and Python on ENGR LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.

More information

Ftp Command Line Commands Linux Example Windows Putty

Ftp Command Line Commands Linux Example Windows Putty Ftp Command Line Commands Linux Example Windows Putty Installing a FTP server, 11. Switch to Console mode from Graphical User Interface For example, the following creates an entry to start Eclipse with

More information

oit

oit This handout is for passwordprotecting content on people. umass.edu or courses.umass.edu Web sites. To protect content on www.umass.edu-level sites, see our HTPASSWD to Password- Protect Pages on Campus

More information

Project #6: Using ssh, scp and sftp with Key-Based Authentication

Project #6: Using ssh, scp and sftp with Key-Based Authentication Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our

More information

This section discusses the protocols available for volumes on Nasuni Filers.

This section discusses the protocols available for volumes on Nasuni Filers. Nasuni Corporation Boston, MA Introduction The Nasuni Filer provides efficient and convenient global access to your data. Nasuni s patented file system, UniFS, combines the performance and consistency

More information

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions What is MFA? (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account. MFA authentication is typically

More information

NHSmail 2 User Transition Guide

NHSmail 2 User Transition Guide NHSmail 2 User Transition Guide Version 3.0 Published 30 June 2016 Update Log Key Updated Sections Users will receive their 4GB mailbox quota once their mailbox transitions to NHSmail 2 Refer to the Service

More information

STA 303 / 1002 Using SAS on CQUEST

STA 303 / 1002 Using SAS on CQUEST STA 303 / 1002 Using SAS on CQUEST A review of the nuts and bolts A.L. Gibbs January 2012 Some Basics of CQUEST If you don t already have a CQUEST account, go to www.cquest.utoronto.ca and request one.

More information

comforte s solutions for secure file transfer

comforte s solutions for secure file transfer comforte s solutions for secure file transfer Thomas Burg comforte GmbH ITUG San Jose, October 2005 This presentation presents comforte s solution for secure file transfer on the NonStop platform. It was

More information

Diocese of Wollongong MS Exchange

Diocese of Wollongong MS Exchange Diocese of Wollongong MS Exchange email Important: To use your new email at school (School Location), you will need to add the Network Proxy Exclusion: mail.woll.catholic.edu.au to your Proxy exclusions

More information

FIT 100: Fluency with Information Technology

FIT 100: Fluency with Information Technology FIT 100: Fluency with Information Technology Lab 1: UW NetID, Email, Activating Student Web Pages Table of Contents: Obtain a UW Net ID (your email / web page identity):... 1 1. Setting Up An Account...

More information

NHSmail Migration Communications Plan Template

NHSmail Migration Communications Plan Template NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

INTRANET GUIDANCE. Acorn Care & Education is improving the way that everyone working in our schools can access and share information.

INTRANET GUIDANCE. Acorn Care & Education is improving the way that everyone working in our schools can access and share information. INTRANET GUIDANCE Acorn Care & Education is improving the way that everyone working in our schools can access and share information. There are now two websites: Public information can be found on our website;

More information

CS321: Computer Networks FTP, TELNET, SSH

CS321: Computer Networks FTP, TELNET, SSH CS321: Computer Networks FTP, TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in FTP File Transfer Protocol (FTP) is the standard protocol provided

More information

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY DAVIS IRVINE LOS ANGELES RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ ECONOMETRICS LABORATORY Institute of Business and Economic Research ECONOMETRICS

More information

TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the

TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the Telnet/SSH TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the terminal at the remote location. Usually establishes

More information

Using the FDR for Mac Users

Using the FDR for Mac Users Using the FDR for Mac Users Author(s): Jack Mello version: 1.2 Written: June 7, 2010 Modified: June 21, 2011 ----------------------- Software: - Mac OS X 10.6.7 - Cyberduck Version 3.8 (7920) Using the

More information

Quick Start Guide. Version 4.0

Quick Start Guide. Version 4.0 Quick Start Guide Quick-Start Guide TM Version 4.0 3am Laboratories PL 2002 3am Laboratories PL www.re.com Remo ywher About Remo ywhere ywhere Quick-Start Guide Re is a remote administration tool that

More information

CS 1301 Fall 2008 Lab 2 Introduction to UNIX

CS 1301 Fall 2008 Lab 2 Introduction to UNIX CS 1301 Fall 2008 Lab 2 Introduction to UNIX Due: Friday, September 19 th, at 6 PM (Monday, September 22 nd for 10% off) Notes: Do not wait until the last minute to do this assignment in case you run into

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

Bank of Hawaii Protecting Confidential . What's in this User Guide

Bank of Hawaii Protecting Confidential  . What's in this User Guide 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent

More information

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we

More information

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

Ftp Command Line Manual Windows Username Password Linux

Ftp Command Line Manual Windows Username Password Linux Ftp Command Line Manual Windows Username Password Linux Midnight Commander is a console based full-screen text mode File Manager that allows you to copy, MC has many features which are useful for a user

More information

CS Operating Systems, Fall 2018 Project #0 Description

CS Operating Systems, Fall 2018 Project #0 Description CS314-002 Operating Systems, Fall 2018 Project #0 Description Due: 11:00 A.M., September 5, 2018 I. Project Narrative: The primary objectives in this project are: (1) confirm your account (user name and

More information

CS 1301 Lab 2 Introduction to Webservers at GaTech

CS 1301 Lab 2 Introduction to Webservers at GaTech CS 1301 Lab 2 Introduction to Webservers at GaTech Due Friday February 19th, 2016, Before 11:55pm Notes: Do not wait until the last minute to do this assignment in case you run into problems. If you find

More information

Connect to Wireless, certificate install and setup Citrix Receiver

Connect to Wireless, certificate install and setup Citrix Receiver Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network, certificate and access applications using Citrix Receiver on a Bring Your

More information

READ ME. UITS UAEU

READ ME. UITS UAEU READ ME UITS Services @ UAEU Welcome new employee! On behalf of myself and UITS, I would like to welcome you to United Arab Emirates University and wish you every success here. The University Information

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

Aguascalientes Local Chapter. Kickoff

Aguascalientes Local Chapter. Kickoff Aguascalientes Local Chapter Kickoff juan.gama@owasp.org About Us Chapter Leader Juan Gama Application Security Engineer @ Aspect Security 9+ years in Appsec, Testing, Development Maintainer of OWASP Benchmark

More information

Subnet Managers March 10, Preliminary Agenda

Subnet Managers March 10, Preliminary Agenda Subnet Managers March 10, 2010 Preliminary Agenda Central Mail Services Agenda Items Information Systems Middleware RamCT Licensing Windows Update Agenda Items (con t) NOC Technology Demonstration Trouble

More information

Skybot Scheduler Release Notes

Skybot Scheduler Release Notes Skybot Scheduler Release Notes Following is a list of the new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.5 Skybot Scheduler 3.5 (May 19, 2014 update) Informatica

More information

utrgv.edu/it IT Services GETTING UTRGV

utrgv.edu/it IT Services GETTING UTRGV IT Services GETTING CONNECTED @ UTRGV IT Service Desk www.youtube.com- @utrgvit Welcome to UTRGV video IT Service Desk Need Help? Request help or report an incident IT Service Desk Edinburg / McAllen /

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1 Quick Note 24 Extracting the debug.txt file from a TransPort Digi Technical Support February 2016 Page 1 Contents 1 Introduction... 3 2 Version... 4 3 FTP method... 5 3.1 FTP Using FileZilla FTP Client...

More information

Overcoming Remote Desktop Challenges with

Overcoming Remote Desktop Challenges with Overcoming Remote Desktop Challenges with SPONSORED BY A BWW Media Group Brand By Michael Otey Michael Otey is president of TECA, Inc., which focuses on Windows and SQL Server product development and consulting.

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

Common Report Engine Leipzig. Ref. 0003

Common Report Engine Leipzig. Ref. 0003 Common Report Engine 08.05.2018 Leipzig Ref. 0003 Table of Contents 1. Introduction 3 1.1 SSH File Transfer Protocol 3 1.2 SSH/SFTP tools 3 2. Setup Process 4 2.1 Generation process for public / private

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

oit Using HTPASSWD to Password Protect Pages on Campus Web Server Web sites UMass Offi ce of Information Technologies

oit Using HTPASSWD to Password Protect Pages on Campus Web Server Web sites UMass Offi ce of Information Technologies oit UMass Offi ce of Information Technologies This handout is for passwordprotecting content on www.umass. edu-level sites. To protect content on people.umass.edu or courses. umass.edu Web sites, see our

More information

Using BlueStep Data Vault with WebDAV

Using BlueStep Data Vault with WebDAV Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard

More information

CS321: Computer Networks TELNET, SSH

CS321: Computer Networks TELNET, SSH CS321: Computer Networks TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in TELNET Many cases we need to have some generic client/server programs that

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

CSE 391 Editing and Moving Files

CSE 391 Editing and Moving Files CSE 391 Editing and Moving Files Tips for moving files around to/from attu slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391 1 Remote Connections:

More information

Contents. CMSP File Sharing User s Guide

Contents. CMSP File Sharing User s Guide 2 Contents Overview... 3 x.500 id access... 4 Internal Accounts... 4 Virtual Private Network (VPN)... 5 Accessing Your Data on UMN network... 5 Windows Platforms... 5 OS X Platforms...14 3 Overview As

More information

Simple Linux Terminal Emulator For Windows Xp Putty

Simple Linux Terminal Emulator For Windows Xp Putty Simple Linux Terminal Emulator For Windows Xp Putty Read this 2015 review about the best free Telnet-SSH terminal emulators. Find out what Most free products only offer a narrow range of screen emulations,

More information

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Technology Department New Teacher Orientation August 8, 2017

Technology Department New Teacher Orientation August 8, 2017 Technology Department New Teacher Orientation August 8, 2017 1) Introduction of Technology Staff Cathy Ringo, Technology Director Aaron Johnston, Technology Specialist Mark Tlapek, Technology Specialist

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Ftp Command Line Manual Windows User Password

Ftp Command Line Manual Windows User Password Ftp Command Line Manual Windows User Password SSH Guide SFTP on Mac OS X SFTP on Windows The most straight forward way to use SFTP is through the command line. a command line, you can alternately use an

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Version June 2016

Version June 2016 HOSTING GUIDE Version 3.2.3 June 2016 This guide is sold in conjunction with the VETtrak Hosting Serv ice and is current at the time of purchase. Later v ersions are av ailable for download from www.v

More information

Bozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room. Members

Bozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room. Members Bozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room Regular Regular Regular Others in Members Jerry Sheehan Members Chris Deshazo Members Rich Shattuck Attendance Lindsey

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Feasibility study of scenario based self training material for incident response

Feasibility study of scenario based self training material for incident response 24th Annual FIRST Conference Feasibility study of scenario based self training material for incident response June 21, 2012 Hitachi Incident Response Team Chief Technology and Coordination Designer Masato

More information

IT Operation Support Services Multi-factor Authentication (MFA) Enrollment User Guide

IT Operation Support Services Multi-factor Authentication (MFA) Enrollment User Guide Help Desk Password Reset Instructions Dallas County Community College District IT Operation Support Services Multi-factor Authentication (MFA) Enrollment User Guide Version: 1.0 Release Date: 8/8/2018

More information

sftp - secure file transfer program - how to transfer files to and from nrs-labs

sftp - secure file transfer program - how to transfer files to and from nrs-labs last modified: 2017-01-20 p. 1 CS 111 - useful details: ssh, sftp, and ~st10/111submit You write Racket BSL code in the Definitions window in DrRacket, and save that Definitions window's contents to a

More information

CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts

CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts Setting Up (PC) Go to the link for the encrypted telnet program PuTTY (Simon Tatham s site in the UK at http://www.chiark.greenend.org.uk/~sgtatham/putty/).

More information

Faculty Quick Guide to Blackboard. Blackboard Version 9.1. Christine Paige Educational Technology Specialist.

Faculty Quick Guide to Blackboard. Blackboard Version 9.1. Christine Paige Educational Technology Specialist. Faculty Quick Guide to Blackboard Blackboard Version 9.1 Christine Paige Educational Technology Specialist paigec@strose.edu (518) 337-4912 July 2010 Table of Contents Description of Blackboard... 3 Uses

More information

Meeting 39. Guest Speaker Dr. Williams CEH Networking

Meeting 39. Guest Speaker Dr. Williams CEH Networking Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,

More information

Version 2.28 Release Note

Version 2.28 Release Note Version 2.28 Release Note v2.28 Release Note Welcome to v2.28 of RM Unify RM Unify v2.28 is here. There are currently a number of features in field trial status before general release in September, including

More information

CompClass User Guide for Students The Bedford Handbook, Seventh Edition. Hacker

CompClass User Guide for Students The Bedford Handbook, Seventh Edition. Hacker CompClass User Guide for Students The Bedford Handbook, Seventh Edition Hacker Getting Started with CompClass for The Bedford Handbook, Seventh Edition Table of Contents Overview... 1 Getting Help... 1

More information

CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts

CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts The Goal The ultimate goal of this assignment is to create a Web page on the server, make sure it is visible to the outside world, and to design and

More information

How to send absent s to parents automatically

How to send absent  s to parents automatically How to send absent e-mails to parents automatically Send e-mails out to parents of absent children where no reason for the absence has been recorded. This is a time saving tool for administrative staff

More information

IT Service Upgrades Announcement

IT Service Upgrades Announcement IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study

More information

Accessing your webspace at UC

Accessing your webspace at UC Accessing your webspace at UC Workshop by CS GSA csgsa@ececs.uc.edu Workshop Objectives Why have a website? UC Resources Simple Demo to setup your website Resources & Tips Why have a website? Why not?

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Aspera Connect User Guide 3.7.0

Aspera Connect User Guide 3.7.0 Aspera Connect User Guide 3.7.0 Mac OS X Revision: 3.7.0.138343 Generated: 01/19/2017 13:37 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting Up Connect...5 Part 1: Installation...5

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

How To Establish A Compliance Program. Richard E. Mackey, Jr. SystemExperts Corporation

How To Establish A Compliance Program. Richard E. Mackey, Jr. SystemExperts Corporation How To Establish A Compliance Program Richard E. Mackey, Jr. Vice president SystemExperts Corporation Agenda High level requirements A written program A sample structure Elements of the program Create

More information

IT in St John s College

IT in St John s College IT in St John s College Welcome to St John s. Below is some information on the main IT systems you ll find in both St John s College and the University as well as some help to get you online. It will also

More information

Allen University Microsoft Office 365

Allen University Microsoft Office 365 Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: St. Thomas University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY

More information

This will be a paragraph about me. It might include my hobbies, where I grew up, etc.

This will be a paragraph about me. It might include my hobbies, where I grew up, etc. Module 3 In-Class Exercise: Creating a Simple HTML Page Name: Overview We are going to develop our web-pages the old-fashioned way. We will build them by hand. Even if you eventually decide to use WYSIWYG

More information

Web Publishing Overview

Web Publishing Overview Web Publishing Overview Adam Cavotta and Christine L. Vucinich ITS Training Services http://its.psu.edu/training/ Objectives Examine the difference between using an HTML editor and hand coding Web pages

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Linux Connection Guide

Linux Connection Guide Linux Connection Guide .CIM Accessibility Linux.CIM is our Linux Terminal Server used by the students of Computer Science, Information Security and Mathematics. It is accessible 24-hours a day from both

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

AGENDA. Importance of filing Form 700 edisclosure Process for Filing your Electronic Form 700 Resources Next Steps and Q & A

AGENDA. Importance of filing Form 700 edisclosure Process for Filing your Electronic Form 700 Resources Next Steps and Q & A AGENDA Importance of filing Form 700 edisclosure Process for Filing your Electronic Form 700 Resources Next Steps and Q & A Importance of Filing Legal requirement from the Political Reform Act of 1974

More information

Smart Work Solution for DataStage ETL Job Management. Copyrightc Inwoo Tech, INC. All right reserved

Smart Work Solution for DataStage ETL Job Management. Copyrightc Inwoo Tech, INC. All right reserved Smart Work Solution for DataStage ETL Job Management DataStage operators manage DataStage jobs using the DataStage Director. How if you leave the office or are on the business trip? No more worries about

More information

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support LUMINARE Using Intranets for Training and Performance Support Caitlin Curtin President and CEO Jeffrey Schneider Vice President, Technology What is an Intranet? An enterprise s private network of computers

More information

Introduction to Discovery.

Introduction to Discovery. Introduction to Discovery http://discovery.dartmouth.edu The Discovery Cluster 2 Agenda What is a cluster and why use it Overview of computer hardware in cluster Help Available to Discovery Users Logging

More information

WebDAV. Overview. File Permissions and Management. Authentication Methods

WebDAV. Overview. File Permissions and Management. Authentication Methods WebDAV Overview WebDAV integration provides access to the file system on the staging server similar to FTP/SFTP and can be used in lieu of FTP/SFTP. WebDAV (Web Distributed Authoring and Versioning) is

More information