Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mgt 240 Lecture Computing at ND: Network and Security January 25, 2005.

Similar presentations


Presentation on theme: "Mgt 240 Lecture Computing at ND: Network and Security January 25, 2005."— Presentation transcript:

1 Mgt 240 Lecture Computing at ND: Network and Security January 25, 2005

2 Homework One Partially graded Partially graded On the whole – very nice job! On the whole – very nice job! Common mistakes Common mistakes Carelessness! Carelessness! A lot of people missed CD/DVD and PC Card question A lot of people missed CD/DVD and PC Card question Not saving with the Word extension.doc Not saving with the Word extension.doc Grades will be posted Friday afternoon Grades will be posted Friday afternoon Course web site – Grades, Lecture Grades Course web site – Grades, Lecture Grades Posted by last 5 digits in student id Posted by last 5 digits in student id Have to scroll horizontally for comments and points off for each question Have to scroll horizontally for comments and points off for each question

3 Homework Two Operating system homework Operating system homework Any questions? Any questions? Due Friday at 5pm Due Friday at 5pm Help session Thursday 7-9pm in L050 – Andy Grau Help session Thursday 7-9pm in L050 – Andy Grau

4 Homework Three Posted on course web site and other usual places Posted on course web site and other usual places Involves using Excel security features Involves using Excel security features More complicated than first two More complicated than first two Don’t start on it too late! Don’t start on it too late!

5 Operating System and Software Reading Outline Questions? Questions?

6 Today’s Lecture Document or Work Product Security: Excel Document or Work Product Security: Excel Computing Environment: Security Computing Environment: Security ND Computing: Network ND Computing: Network

7 Security and Excel

8 Security Threats to Excel Unauthorized person/s are able to Unauthorized person/s are able to See content of workbook See content of workbook Change content of workbook Change content of workbook Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses

9 Security Best Practices for Excel Protect workbook contents Protect workbook contents Lock cells, ranges Lock cells, ranges Password protect workbook Password protect workbook Set workbook as read only Set workbook as read only Privacy Privacy Encrypt workbook Encrypt workbook Authenticate workbook Authenticate workbook Digitally sign workbook Digitally sign workbook

10 Security Options in Excel Protection – Under Tools menu Protection – Under Tools menu All cells are locked by default but often worksheets aren’t protected All cells are locked by default but often worksheets aren’t protected Protecting your workbook activates cell locking Protecting your workbook activates cell locking Prevents modifications to locked cells Prevents modifications to locked cells If you want some cells to be unlocked, you need to specify that before you protect the worksheet If you want some cells to be unlocked, you need to specify that before you protect the worksheet

11 Security Options in Excel Workbook security settings - Under Options in Tools menu Workbook security settings - Under Options in Tools menu Encrypt entire work book Encrypt entire work book Need to specify Need to specify Encryption algorithm Encryption algorithm Password to decrypt and open Password to decrypt and open Password required to modify shared workbook Password required to modify shared workbook Set shared workbook as read only Set shared workbook as read only Digitally sign workbook and/or macros in it to authenticate author Digitally sign workbook and/or macros in it to authenticate author Digitally sign Digitally sign Remove personal information from file on save (won’t show up when someone clicks on file properties) Remove personal information from file on save (won’t show up when someone clicks on file properties)

12 Security Best Practices for Excel Protection against viruses and other malicious access to workbook Protection against viruses and other malicious access to workbook Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Make sure you have anti-virus software and it is up-to- date Make sure you have anti-virus software and it is up-to- date Set macro security settings to high or medium Set macro security settings to high or medium Clear the Trust all installed add-ins and templates check box Clear the Trust all installed add-ins and templates check box Use digital signatures Use digital signatures Maintain a list of trusted macro publishers Maintain a list of trusted macro publishers

13 Security Options in Excel Security settings for macro execution Security settings for macro execution Very High – only macros installed in trusted locations are allowed to run Very High – only macros installed in trusted locations are allowed to run High – only signed macros from trusted sources allowed to run High – only signed macros from trusted sources allowed to run Medium – You choose whether to run potentially unsafe macros Medium – You choose whether to run potentially unsafe macros Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe

14 Security Issues Have become more important as Have become more important as More work is performed and stored on computers More work is performed and stored on computers More computers are networked More computers are networked Must protect Must protect Machines Machines Data Data Network Network Threats Threats Internal Internal External External

15 ND Computing Security OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page Who’s in charge of your computer video Who’s in charge of your computer video

16 12-Step Guide to Safer Computing Step 1 When not using your computer, disconnect it from the Internet. Connected, your computer is open to intrusions by hackers who can access your files, bank account information and personal details, or may use your machine as a “zombie” to launch Denial of Service (DOS) attacks against Internet Service Providers or Web sites, shutting them down.

17 12-Step Guide to Safer Computing Step 1 (cont.) Step 1 (cont.) Lock out your Windows 2000/XP workstation any time you walk away from your machine. Press CTRL, ALT, DELETE Click Lock Computer

18 12-Step Guide to Safer Computing Step 2 Use updated anti-virus and personal firewall software Use updated anti-virus and personal firewall software Firewalls ensure no outside users can access confidential or private data. They also filter inbound and outbound traffic and alert you to attempted intrusions. Activate Windows XP firewall by following the instructions at: http://www.microsoft.com/security/protect/ http://www.microsoft.com/security/protect/

19 12-Step Guide to Safer Computing Step 2 (cont.) Step 2 (cont.) Check for the latest viruses and security information weekly by visiting the OIT web site.OIT web site Update your anti-virus software daily or set it so it will update automatically.

20 12-Step Guide to Safer Computing Step 3 Make sure your operating system and application software are current. Download software patches for your Windows or Macintosh systems at http://v5.windowsupdate.microsoft.com and http://www.apple.com/support/downloads/, respectively. http://v5.windowsupdate.microsoft.com http://www.apple.com/support/downloads/

21 12-Step Guide to Safer Computing Step 3 (cont.) Step 3 (cont.) Install critical MS Office software patches twice a month by visiting: http://office.microsoft.com/productupdates http://office.microsoft.com/productupdates Remove/do not install unnecessary programs and/or services.

22 12-Step Guide to Safer Computing Step 4 Use strong passwords more than eight characters long that include both alpha and numeric elements. Passwords should be completely random. Do not use words from the dictionary or numbers similar to your address, phone number or birth date. If you must use a familiar word or number to remember your password, rearrange it, invert it or combine it with another word or number. If your cat’s name is Fluffy and you live on Pine Street, spell the words backward and combine them: Fluffy becomes “yffulf” and Pine, “enip,” making your new password, “yffulfenip.” For added security, throw your favorite number in: “1yffulfenip3,” “yffulf13enip” or “yffulfenip13.” Use as many characters as the program for which the password is needed permits.

23 12-Step Guide to Safer Computing Step 5 Never write your password down or post it on your monitor – someone may find it! If you must write it down, never leave it unattended. Do not share passwords. Step 6 Change your password regularly (monthly).

24 12-Step Guide to Safer Computing Step 7 Files for sharing need password protection. You must always understand what you are downloading Many files found on peer-to-peer sharing programs contain Trojans (malicious programs contained inside seemingly harmless data) or Spyware (a program that can go undetected on your system and gather personal information to transmit over the Internet).

25 12-Step Guide to Safer Computing Step 8 If you discard or trade in your computer, make sure you reformat your hard drive first, ridding it of all sensitive information. Step 9 When ordering products online and using your credit card, use only secure Web sites of reputable online merchants. A padlock on your status bar means the site is secure.

26 12-Step Guide to Safer Computing Step 10 Do not e-mail your social security or social insurance number to anybody. Step 11 E-mails announcing you have won a prize or credit card e-applications are suspicious. If you are truly intrigued, ask to be mailed a hard copy of the e-mail or form. Be wary of all email attachments, even from those you know. Unless you have had prior notification, do not open email attachments you are not expecting. Step 12 Back up critical files and programs. That way, extra copies will be available to you in case of a disaster. Back up your files often.

27 Networks

28 Network Issues Local area networks Local area networks Connecting to the internet Connecting to the internet

29 Local Area Networks Connect a relatively small number of devices in one geographic area Connect a relatively small number of devices in one geographic area Usually consist of Usually consist of Clients Clients Servers Servers Hubs Hubs Can be wired or wireless Can be wired or wireless

30 Local Area Networks Computers must be equipped to communicate on the LAN Computers must be equipped to communicate on the LAN Network interface card (NIC) Network interface card (NIC) Cable connecting to network Cable connecting to network Communications protocol installed (like TCP/IP) Communications protocol installed (like TCP/IP) Must be standards for the way computers communicate on the LAN Must be standards for the way computers communicate on the LAN Ethernet is the most common Ethernet is the most common

31 Local Area Networks

32 Wireless LAN’s Mobile users can connect to a local area network through a wireless (radio) connection Mobile users can connect to a local area network through a wireless (radio) connection A standard, IEEE 802.11 (WIFI), specifies the technologies for wireless LANs A standard, IEEE 802.11 (WIFI), specifies the technologies for wireless LANs The standard includes an encryption method, the Wired Equivalent Privacy (WEP) algorithm. The standard includes an encryption method, the Wired Equivalent Privacy (WEP) algorithm.

33 Wireless Networks

34 Wireless Home Networking

35 Connecting to the Internet Through your local area network Through your local area network Connected to internet by internet service provider Connected to internet by internet service provider Router between lan and outside network Router between lan and outside network Through direct access such as Through direct access such as Modem Modem Broadband Modem Broadband Modem Cable Cable DSL DSL

36 Connecting LAN’s to the Internet

37 Broadband Access Much higher speed possible than through modem Much higher speed possible than through modem Always on connections Always on connections Has been adopted by many home users and businesses Has been adopted by many home users and businesses Broadband providers Broadband providers Phone companies Phone companies Digital Subscriber Line Digital Subscriber Line Cable companies Cable companies Cable broadband Cable broadband Satellite companies Satellite companies Satellite broadband Satellite broadband

38 DSL Advantages Advantages Many levels of service depending on requirements Many levels of service depending on requirements Convenient for businesses with telephony contracts already in place Convenient for businesses with telephony contracts already in place Connection not shared Connection not shared Same line can be used for voice and data access Same line can be used for voice and data access Less expensive Less expensive

39 DSL Disadvantages Disadvantages Qualifying and provisioning phone line for service Qualifying and provisioning phone line for service Coordination problems among cooperating service providers Coordination problems among cooperating service providers Access limitations Access limitations Beyond 18,000 feet service not available Beyond 18,000 feet service not available Slower maximum speeds than cable Slower maximum speeds than cable

40 Cable Modems Advantages over DSL Advantages over DSL More widely available More widely available Faster connections Faster connections Easier installation Easier installation More self-installation opportunities More self-installation opportunities Better support for home networking Better support for home networking

41 Cable Modems Potential downsides Potential downsides Cable not laid to many businesses Cable not laid to many businesses Congestion on shared line Congestion on shared line Low bandwidth reserved for upstream link Low bandwidth reserved for upstream link Service provider personnel shortages Service provider personnel shortages

42 Cable Modem in the Home

43 DSL and Cable Equipment DSL or cable modem DSL or cable modem NIC (Ethernet) card NIC (Ethernet) card Cable to connect computer to modem Cable to connect computer to modem

44 Connecting Computing Devices Using a Home Network


Download ppt "Mgt 240 Lecture Computing at ND: Network and Security January 25, 2005."

Similar presentations


Ads by Google