CNIL Report April 4 th, 2005. CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.

Slides:



Advertisements
Similar presentations
Page 1 Organize for Success IST Organization Design January, 2013 MALCOLM BERNSTEIN CONSULTING.
Advertisements

Privileged Account Management Jason Fehrenbach, Product Manager.
Secure Computing Network
CCSE NETWORK STRUCTURE. CCSE NETWORK OUTLINE Mid-sized Building Network spanning over Building 22 and Building 23. Autonomous from ITC’s KFUPM Domain.
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Security in Real Business
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
IACC-ITS.PPT June 1, 2001 Communications and Computing Services Johanna Madjedi IACC-ITS Joint Meeting June 1, 2001.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Data Center and Network Planning and Services Mark Redican IET CCFIT Update Feb 13, 2012.
by Evolve IP Managed Services
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
©2006 Academic Computing Services, NJIT ©2011 Academic Computing Services, NJIT Academic Computing Services Software Availability at NJIT.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
University IT Professionals O RIENTATION. IT Governance Council UITM Subcommittee and the UITM Leadership Team IT Policies & Guidelines IT Governance.
1 Faculty Council IT Committee C-13 February 4, /4/2010.
Natick Public Schools Technology Update September 11, 2006 Dennis Roche, CISA Director of Technology.
Some aspects of Library Technology Infrastructure in the US and Japan Tim Deliyannides & Takeshi Kuboyama
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Corporate Information Systems Delivery of Infrastructure IT Services.
Communications Pool FY ’06 Marla Meehl Friday, 10/21/05 NETS – Network Engineering & Telecommunications Section Enterprise Services Computer Security.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
CD FY09 Tactical Plan Status FY09 Tactical Plan Status Report for Site Networking Anna Jordan April 28, 2009.
Campus Computing Resources for Researchers Rutgers University Office of Information Technology Presented By:Joe Sanders University Director, OIT Rutgers.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
NESDIS/ORA March 2004 IT Security Incident Recovery Plan and Status April 12, 2004 Joe Brust, ORA Technical Support Team Lead.
Natick Public Schools Technology Update April 23, 2007 Dennis Roche, CISA Director of Technology.
Brian Arkills Software Engineer, LDAP geek, AD guy, Chief Troublemaking Officer Windows HiEd Conference 2006 Managed Workstations: UW Nebula.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Information Assurance Policy Tim Shimeall
Identity Management in the Environment of Mendel University in Brno Milan Šorm.
Information Technology Cost Pool Council of Research Associate Deans March 12, 2009.
DLT Update Mairéad Martin June 28, DLT Infrastructure 1.Annual Lifecycle –170 DLT public workstations; 200 Library workstations, laptops, 17 printers.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
September 19, 2002CSG - Seattle1 Toward Sustainable Models for Funding IT in Higher Education Common Solutions Group September 19, 2002 Jack McCredie.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Information Technology Support Services Focusing on our customers 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managed IT Services JND Consulting Group LLC
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Basharat Institute of Higher Education
Mt. San Jacinto College Technology Master Plan In Process -
Technology Fee Presentation
Overview of IT at UAB IT Organization Services Provided
Working at a Small-to-Medium Business or ISP – Chapter 8
FY09 Tactical Plan Status Report for Site Networking
PLANNING A SECURE BASELINE INSTALLATION
UNIVERSITY OF CALIFORNIA Berkeley
WELCOME Start of Semester Meeting Fall 2019
Information Technology Organization Overview RFP #220-05
IT Management, Simplified
IT Management, Simplified
Division of Engineering Computing Services
Presentation transcript:

CNIL Report April 4 th, 2005

CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure Focus on security

Instructional Labs Need to get to sustainable costs –Better resource sharing, less maintenance More predictable sponsors –Ease of external sponsorship and technology refresh (Intel, AMD, Sun, Agilent, etc.) Consolidation of labs: –EE42/43 merged with EE100 – Fall 2005 –CS150 and CS152

Research Infrastructure Security Project (on-going) Proposals for FY05-06 Mac OSX support in EECS.

Meet New Requirements New IT Security Policies/Requirements –Minimum System Security Patches, encryption, authentication, firewalls, passwords, reduce unnecessary services, etc. –Restricted Devices Logging, access control, physical security, etc. –DMUP sb-1386, FERPA, HIPPA, etc. –Technical and Administrative “proprietor”. These apply even if you manage your own equipment

FY04-05 Security Projects Core: –Upgraded EECS Windows AD to Win 2003 with stronger security templates and password policies. –Switched to campus VPN (drop EECS VPN support) –Evaluated various patch management solutions. –Evaluated various network IDS and IDPS solutions. –“Service Port Blocking” put in place 3/26 Internal risk assessment of Central ERL. Training –Incoming FY Grad students –EECS sponsored student organizations

Security Proposals (FY05-06) Network Zones –Secure (production) zone –Restricted zone: core servers –Open zone: less restrictions, setup fee Windows AD and File services will no longer be accessible from outside (of EECS) –Use ssh or campus VPN EECS wireless network (except guest) will be in the “secure” zone.

Project Details Network ID and Port Scanning –Collaboration with campus SNS, with EECS administration and customizations. Wireless a and NAC –802.11a – higher throughput –802.11a encrypted – better protection. –NAC – wireless entry point vetting. VPN –Collaboration with campus CNS (we buy hw, they manage). –First phase – deploy for researchers. –Second phase – deploy for EECS students Enables software license use at home Sponsored student group orientations.

Other Projects Work with Apple to figure out Mac OSX infrastructure support. Spam management –Reset on 3/29 –Deploy personal whitelist? –Look for alternatives Soda Hall Helpdesk

Proposed Fees CIF = $75.5/person/month (drop of $5) Windows Surcharge = $5/os/month System contracts –Desktop = $890/yr (10% increase). –Servers = $2670/yr (10% increase). –T&M rate = $94.5/hr (5% increase). AV T&M = $77/hr (18% increase)

Fee Breakdown

Staff Cost Breakdown (Does not include 2 department FTEs)

Staffing Network (1 PA 4, 2 PAII) –Wired (3600 ports, backbone to campus) –Wireless (802.11b, a, airbears, hmmb, bwrc, euclid) –firewall Accounts (1 PA3) –Active activations and deactivations –Password and home directories (unix, AD, LDAP) Enterprise Services (1 PA4, 1.5 PA3, 1 PA2) – , LDAP, calendar, virus, spam –Dns/dhcp/hostmaster for 50 class C subnets –NIS –File storage and backups –Windows AD. –SWW (solaris, linux, windows). –Software licenses management and distribution. –Computer rooms management –Technology refreshes Security (1 PA3) –Incident handling –Monitoring –Intrusion Dectection DB & WWW (1 PA4, 0.5 PA3, 1 PA2) –Web services –IRIS web site –EECS/ERL roster –Oracle databases (network ports, systems, etc.) Admin (1 AAIII) –Data entry –Monthly billings –Purchases and reimbursements –Budget report generations and reconciliation.