How do the risks of a web-based CAA system differ from those of a closed network system? Chris Ricketts University of Plymouth & Stan Zakrzewski London.

Slides:



Advertisements
Similar presentations
Pat McKay Information Manager Glasgow Caledonian University
Advertisements

Operations 102 Communications. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor 3.Web 4.Hardware.
CALIFORNIA DEPARTMENT OF EDUCATION Tom Torlakson, State Superintendent of Public Instruction 2013 Assessment and Accountability Information Meeting Technology.
Welcome to The OCR Advanced Subsidiary GCE in Applied ICT.
Password?. Project CLASP: Common Login and Access rights across Services Plan
E-assessment: a risk-based approach to success Dr Chris Ricketts, Sub-Dean (Teaching Enhancement), Faculty of Technology, University of Plymouth and Director.
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Mgt 240 Lecture Exam Review February 1, Homework Three Due Friday 2/4 at 5pm Due Friday 2/4 at 5pm Any questions? Any questions? Posted on course.
Unit 28- Website Development Assignment 1- THEORY P3
Remote Access SSL VPN Stewart Duncan Technical Manager.
WEB OPERATING SYSTEM BY XIAO HAN BY XIAO HAN
© InLoox ® InLoox PM Web App product presentation The Online Project Software.
PaperCut NG Chris Dance. Copyright © PaperCut Software Pty. Ltd. 2 Overview Overview of PaperCut NG Why we offer a Mac Version The story of our.
ORNL is managed by UT-Battelle for the US Department of Energy Globus: Proxy Lifetime Endpoint Lifetime Oak Ridge Leadership Computing Facility.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
E-Business Lecture 3 Website Development and Management Process.
Online Game JAVA for PDA WAP for Mobile Phone. Java for PDA  Hardware limit - Java API Power Memory  JDK 2M byte. Connectivity Display size.
Testing Web Based Applications Differences in Traditional Legacy Testing vs. Web Systems Testing.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Warren County Middle School Business And Information Technology Program “ A Different Approach”
Examsoft(Softest) Web based test authoring and test administration.
4.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 4 Chapter IT Infrastructure: Hardware and Software.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Windows 2000 Advanced Server and Clustering Prepared by: Tetsu Nagayama Russ Smith Dale Pena.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
The Ferl Practitioners’ Programme Transforming Teaching and Learning with ILT S4.3 Supporting Teaching and Learning On Line.
Personalizing Your Social Network. Ever found that Facebook didn’t fit your personal needs? Want to create your own personal social networking site?
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Cloud Computing Changing the way business computing is (will be) done.
Wyoming Online Career and Technical Assessment System Student Registration Training.
Chapter 7 IS630. Project Design  Technical Design & Specification Network and System Architecture & Design Software System Architecture & Design  Database.
Haslingden High School AS / A2 Information & Communication Technology Key Skills ICT – as part of General Studies programme.
MEDIU Learning for HE Ahmad Nimer | Project Manager.
IT Staff Survey Overview Over 1,300 responses were received. Staff across all faculties and support services were represented. 50 % of respondents.
1 The World Bank Internet Services Program Rajan Bhardvaj
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Piloting CAA: All Aboard Gavin Sim & Phil Holifield.
Internet Security and Authentication Issues (for a Machine with a Fruit on the Front) Rodney Thayer.
1 NETE4631 Working with Cloud-based Storage Lecture Notes #11.
Data Transfer The Kingsway School. Transfer Speed Data Transfer is measured in bits per second (bps) 1 Kilobit per second is 1000 bps 1 Megabit\per second.
How should we measure the costs (and benefits?) of computer aided assessment? Chris Ricketts, Paul Filmore, Roy Lowry & Sally Wilks University of Plymouth.
Distributed Systems and Security: An Introduction Brad Karp and Steve Hailes UCL Computer Science CS Z03 / nd October, 2006.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
ECpE Student Database Team 21 Adviser: Tien Nguyen ECpE and Tony Moore.
Norman Security Suite User friendly premium security.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Connecting to Online Resources from Off-Campus
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Web Programming Language
Transfer A Call Meeting Notes (2/21/17 09:23) ok
What is IC3 IC3 /ˌaɪˌsiːˈθriː/ is the abbreviation and registered trademark of the "Internet and Computing Core Certification." The IC3 is a global certification.
OCR Cambridge Technical Introductory Diploma in IT Bridging Work
ASSESSMENT & FEEDBACK AT RGU: 
MESSAGES, DIRECTIONS AND QUESTIONS
Quicken Installation Problem Number More info :
HOW CAN I MAKE MOZILLA FIREFOX WORK FASTER? Mozilla Firefox is one the free and open source web browsers available in the world of technology. It is available.
Backpage aberdeen
Internet And Online Community Week 6
InLoox PM Web App product presentation
Pat McKay Information Manager Glasgow Caledonian University
Part 8 Q36 to Q40 of National 5 Prelim
Preparing for and ADMINISTERING the ABMGG IN-TRAINING EXAMINATION
Hardware Sizing, Placement, & Capacity Planning
Internet Vocabulary Terms
ASSESSMENT & FEEDBACK AT RGU: 
MESSAGES, DIRECTIONS AND QUESTIONS
A Look Ahead to The Project
Presentation transcript:

How do the risks of a web-based CAA system differ from those of a closed network system? Chris Ricketts University of Plymouth & Stan Zakrzewski London Metropolitan University

Overview l Two different universities l Transferring an approach to a different university l Differences in ‘hardware’ systems l Differences in ‘software’ systems l Did it work? l Discussion (plenty,I hope!)

Two different universities Luton l closed network l on-line exams l large open-access IT suite Plymouth l multi-site so web-based l on-line exams, coursework, formative assessment l large number of smaller IT rooms

Transferring an approach to a different university l Different IT systems l Different approaches to assessment l University-level demand But… ….risk assessment still the key to success l Identify risks l Quantify impact l Plan for the worst case

Differences in ‘hardware’ systems Partly IT systems l Network resilience l Operating systems Also ‘hard-wired’ things l Two semesters l Types of assessment l IT facilities for on-line testing

Differences in ‘software’ systems Partly IT systems l Software l Interfaces Also ‘soft’ things – culture, practices l Invigilators l Exam / coursework balance

Did it work? Identify risks l Some not considered important l Some new risks identified Estimate impact l Some much lower impact l Some greater impact Plan for worst case l Dependent on ‘hard’ and ‘soft’ systems

Did it work? Identify risks l Some not considered important l Some new risks identified Estimate impact l Some much lower impact l Some greater impact Plan for worst case l Dependent on ‘hard’ and ‘soft’ systems

What sort of risks? l Authentication of login across internet not secure l Different authentication between on-campus and off-campus (web-based) use not recognized l External Examiner unable to access exam across web l Students accessing inappropriate materials (eg, web-based) during assessment l Students using different technical platforms (between sites, at home, Mac’s?) l Students using different browsers l Network load too high -L-M-L-L-M-M-M-L-M-L-L-M-M-M

What contingency plan? l Authentication of login across internet not secure l Different authentication between on-campus and off-campus (web-based) use not recognized l External Examiner unable to access exam across web l Students accessing inappropriate materials (eg, web-based) during assessment l Students using different technical platforms (between sites, at home, Mac’s?) l Students using different browsers l Network load too high

Discussion l (plenty,I hope!)