Desktop Computer Drivers Ed - PowerPoint PPT Presentation

1 / 51
About This Presentation
Title:

Desktop Computer Drivers Ed

Description:

McAfee Anti-Virus is installed on your computer to protect against unseen invaders. McAfee checks for updates every five minutes, every day. ... – PowerPoint PPT presentation

Number of Views:115
Avg rating:3.0/5.0
Slides: 52
Provided by: jennie3
Category:

less

Transcript and Presenter's Notes

Title: Desktop Computer Drivers Ed


1
Desktop ComputerDrivers Ed
  • Learn how to be a
  • responsible computer user
  • at the
  • University of Maryland Libraries

Sponsored by the Desktop Services Committee Fall
2007
2
Overview
  • Part 1 - Dangers and Security in the Cyberworld
  • Part 2 - Libraries Local Area Network (LAN)
  • Part 3 - The Universitys Information Technology
    Environment

3
Where is my computer?
Internet (or WAN)
Campus Network (or MAN)
Libraries Network (or LAN)
Your computer
4
Dangers and Security in the Cyberworld
  • Today, we worry much less about someone
  • physically stealing our computer
  • and worry much more about unseen invaders
  • attacking our computer from around the world.

5
Hidden DangersHackers
  • Hidden invaders
  • Popularly known as Hackers.
  • They want to access your computer
  • for the thrill of the hunt, because your
    computer is connected to the Internet
  • they need storage space or bandwidth
  • because they are ethically irresponsible.

6
Hidden DangersHackers (continued)
  • Hackers
  • Often use various means to break into a computer
    such as
  • hacking computers using existing user names
    passwords
  • finding weaknesses in software/operating
    systems
  • sending viruses through e-mail attachments and
    web site pop-ups.

7
Hidden DangersViruses
  • Viruses
  • Computer programs designed to spread from file to
    file on a computer. It is activated by user
    intervention (i.e. opening infected attachment or
    running infected program)
  • Behavior
  • infect every application file or document on an
    individual computer
  • Spread by
  • opening infected email document attachments,
    programs on diskettes/flash drives, etc., or file
    servers.

8
Hidden DangersWorms
  • Worms
  • Computer programs designed to copy themselves
    from one computer to another over a network,
    without user intervention.
  • Behavior
  • affect network performance and consume bandwidth
  • Spread by
  • replicating itself to many computers over a
    network, and doesnt require action on users
    part. Thus computer worms spread much more
    rapidly than computer viruses.

9
Hidden DangersTrojan Horses
  • Trojan Horses
  • Computer programs that claim to be something
    desirable (e.g. screen saver, game) but actually
    contain malicious code that can delete or steal
    data.
  • Behavior
  • Allows others to remotely gain access to your
    computer, letting them steal passwords, credit
    card numbers, online banking data, or other
    personal information.
  • Spread by
  • to install a trojan horse you must invite them
    to your computer by opening an e-mail attachment
    or by downloading a file from the Internet.

10
Hidden DangersPhishing
  • Phishing
  • A form of criminal activity that uses fake web
    pages, emails, or even faxes to acquire sensitive
    information such as passwords and credit card
    details.
  • Phishing does not affect your personal computer
    or network.

11
SecuritySoftware Upgrades
  • Upgrades are performed on a regular basis to
    protect Library computers against viruses and
    hackers.
  • Whenever Microsoft releases a patch to its
    Windows Operating Systems, ITD is prepared to
    upgrade Library staff remotely.

12
SecurityAnti-Virus Software
  • McAfee Anti-Virus is installed on your computer
    to protect against unseen invaders.
  • McAfee checks for updates every five minutes,
    every day.
  • We get new virus definition files every day.
  • Dont touch it!
  • If you see this symbol
  • it means McAfee is running.

13
Be a better driverPop-ups
  • ALWAYS click on the ? at the very top right of
    the pop-up window or use the key combination
    ALT-F4. Never click close buttons.
  • When you click on text buttons (e.g. Close),
    unwanted software may download onto your computer.

Click here!
Never here!
Dont click this!
14
Be a better driverAttachments
  • Many computer viruses are transmitted through
    e-mail attachments.
  • If you are unsure of the e-mail senders identity
    do not open the attachment.
  • Be aware of documents that have these file
    extensions
  • strategicplan.exe
  • merit.pif
  • mtgminutes.com
  • my_document.zip
  • teamworkplan.doc (especially from people you
    dont know).

15
Be a better driver Downloading
  • Avoid downloading software. Do you really need
    that Heroes screen saver, or the latest version
    of Solitaire Deluxe?
  • Seemingly free programs often come with hidden
    agendas (i.e. trojans) that can ruin your
    computer.
  • Do not download unknown items onto your work
    computer.
  • You are obliged to request all software using the
    Software Site License Request Form
  • www.lib.umd.edu/itd/help/SOFTWARE/Request.htm

16
Dangers and Security in the Cyberworld Summary
  • Your computer doesnt stand alone it is
    connected to the Libraries network, the
    universitys network, and the global Internet
  • Close pop-up windows properly
  • Never open questionable attachments
  • Dont download anything from the Web without
    first getting authorization
  • Report all computer problems to the ITD Help
    Desk, so that problems are tracked and issues
    can be resolved.

17
Libraries LAN (or Local Area Network)
  • The Libraries LAN supports public access
    computing, instructional computing, and
    administrative (staff) computing.

18
The LAN
  • A LAN (Local Area Network)
  • is a group of computers that share a common
    communications line or wireless link
  • are the resources of a single processor or server
    within a small geographic area (for example,
    within an office building).
  • A LAN may serve
  • as few as two or three users (for example, in a
    home network)
  • as many as thousands of users (for example, in
    the Libraries).

19
The LAN (Servers)
  • A SERVER
  • is a central computer that allows users to share
    applications and store data.
  • The servers in ITD provide
  • Secure and flexible file management
  • Protection from hackers and viruses
  • Quick and seamless software upgrades.

20
The LANThe Libraries LAN Domains
A DOMAIN is a group of computers and devices on a
network that are administered as a unit with
common rules and procedures.
PUBLIC (Libpub)
STAFF (LIBLAN)
LABS (Libpub)
21
The LANLibraries Staff Domain
Different servers affect different aspects of our
work in the Libraries
MANAGEMENT SERVER
PROFILE SERVER
WORKSTATION
DATA SERVER
PRINTER SERVER
INVENTORY SERVER
22
The LANManagement Server
  • The Management Server provides ITD with the
    capability to upgrade and install software,
    including security updates, without having to
    visit each individual workstation.
  • System Management Server (SMS)
  • installs and upgrades software and images
  • Windows Update Server (WSUS)
  • applies security patches to the Microsoft
    operating system and application software
  • E-Policy Orchestrator
  • installs and updates McAfee virus detection
    software
  • Group-Policy
  • applies LAN-wide security policies

23
The LANManagement Server (contd)
  • Most installs and upgrades are regularly applied
    after hours.
  • In order to receive installs and upgrades,
    workstations must
  • be logged off the LAN
  • powered on
  • and linked to the campus network.
  • E-Policy Orchestrator may apply upgrades to the
    McAfee virus detection software even while
    workstations are logged onto the LAN.

24
The LANProfile Server
  • Houses the unique user-customized configurations
    for each LAN account including
  • Browsers (Netscape, IE, Firefox)
  • E-mail clients
  • MS-Office
  • Desktops
  • Printers.
  • When logging onto the LAN, the server downloads
    the profile to the workstation.
  • When logging off the LAN, local changes to the
    profile are saved on the server.

25
The LANData Server
  • Houses
  • individual staff Z drives
  • shared divisional, departmental, and special
    projects M drives.
  • All work files should be saved to either a Z
    drive or M drive on the server.
  • All Z and M drives on the Data server are
    backed up (copied) onto OIT servers nightly.
  • Stay tuned for more on this later

26
The LANPrinter Server
  • Houses
  • All staff networked printer configurations.

27
The LANInventory Server
  • Enables ITD to keep accurate records about
    Library computers so it can create efficient
    replacement schedules. This also helps solve
    problems!
  • Contains workstation specific data concerning the
    hardware and software
  • Runs the ITD Help Desk Track-IT problem
    management system
  • Audits workstations when logging onto the LAN.
  • If your workstation is not logged by the
    Inventory Server, then ITD doesnt know about it!

28
THE LAN (File Management)
If a virus attacked the University of Maryland
Libraries server this morning and deleted all
the files, the loss would be minimal, because of
the existence of the backup copy!
If your files are stored on a workstation hard
drive and the hard drive breaks, you may be out
of luck, unless you back up your hard drive
daily. And who wants to worry about that?
ITD worries about it, so you dont have to!
29
The LAN (File Management)M Drive
  • The M Drive
  • Is not actually on staff computers, its on the
    ITD Data Server
  • Allows staff to share files and folders with
    other members of their division
  • Is meant to be used for documents that are used
    by many individuals within a department.

30
The LAN (File Management)Z Drive
  • The Z Drive
  • Is also not actually on staff computers, it is on
    the ITD Data Server
  • Cannot be viewed by anyone unless they use a
    staff login and password (or happen to walk by
    the computer while an individual staff is logged
    in)
  • Is meant to be used for the storage of documents
    of a personal/individual nature
  • Can be accessed by clicking My Documents.

31
The LAN (Logins)
  • Staff must LOG IN to use the LAN
  • A login name represents an account on the server
  • Every staff member has a unique login that is
    usually assigned soon after their hire date.
  • Every login requires a secure password in order
    to work.
  • ITD is in the process of changing Window logins
    to Campus Directory IDs

32
The LANBe a Better Driver
  • Dont save data files or programs on the Desktop.
    A large Desktop means a longer login process.
  • Use shortcuts on your desktop to access essential
    files and programs remember that software is
    tied to specific computers and not tied to a
    profile.
  • Avoid fancy extras, like graphic mouse pointers
    and special sound effects.

33
The LANBe a Better Driver
  • Save all files to either the Z drive or the M
    drive.
  • Both Z and M drives are stored on the LAN
    server.

34
The LANBe a Better Driver
  • Do NOT use the C drive for primary file storage.
    Files may be lost forever if the computer
    crashes.
  • The C drive may be used to retain local backup
    copies. If so, save files to diskette or CD as
    well.

35
The LANBe a Better Driver
  • Restart the computer before leaving for the day.
    The Restart logs the computer off of the LAN.
  • Leave the computer powered ON.

36
The LANBe a Better Driver
  • Create GOOD passwords
  • To protect identity and files
  • That are at least 8 characters long
  • Intersperse upper/lower case letters, numbers,
    and punctuation symbols
  • That can be remembered
  • e.g. 0au2to0mo9bi19le64

37
The LANBe a Better Driver
  • Avoid BAD passwords
  • Dont use personal info SSN, DOB, address
  • Single word or 2 words separated by number or
    symbol
  • Sequence of numbers or letters
  • Hobby, song, celebrity
  • Same password but with slight variation
  • e.g., Dave
  • e.g., tobeornottobe
  • e.g., my password

38
The LANBe a Better Driver
  • Protect your password
  • Dont share it with others
  • Change your password regularly (directory
    passwords automatically expire every six months).
  • When changing your password, old passwords can
    not be reused.
  • Forgot your login/password? Call the ITD
    Helpdesk.

39
Libraries LAN Summary
  • Save all files on the LAN server
  • Keep the Desktop clean
  • Restart the computer before leaving, and leave
    your computer powered on
  • Follow safe password guidelines

40
Remind me - where is my computer?
Internet (or WAN)
Campus Network (or MAN)
Libraries Network (or LAN)
Your computer
41
The University IT Environment
  • OIT and ITD (Roles)
  • OIT, ITD and Network Access
  • OIT, ITD and Security
  • OIT, ITD and E-mail

42
OIT and ITD (Roles)
  • Office of Information Technology (OIT)
  • responsible for a variety of campus-wide services
    including the campus network infrastructure and
    security and e-mail.
  • Libraries Information Technology Division (ITD)
  • responsible for the Libraries information
    technology services and serves as liaison to OIT
    for network, security and e-mail issues.

43
OIT, ITD and Network Access
  • ITD is the central conduit for all of the
    Libraries network needs
  • Cant access your M or Z drive? Call the ITD
    Help Desk!
  • Cant find a file? Call the ITD Help Desk!
  • Cant access the Internet? Call the ITD Help
    Desk!!!

When in doubt, call the ITD Help Desk! (x59188)
44
OIT, ITD and Security
  • OIT is constantly monitoring the network activity
    of all workstations on campus.
  • When OIT detects a virus-infected or hacked
    workstation, OIT staff immediately isolates it
    from the campus network and contacts ITD.
  • ITD diagnoses the cause of the problem, takes
    corrective action, then notifies OIT when the
    workstation is secure.
  • OIT then adds the workstation back onto the
    campus network.

45
OIT, ITD and E-mail
  • OIT provides the e-mail systems and services
    campus-wide.
  • ITD supports the Thunderbird e-mail client within
    the Libraries.
  • Staff may check the ITD Help Desk
    (http//www.lib.umd.edu/help/) website for virus
    alerts and e-mail outages.
  • Problems with e-mail? Contact the ITD Help Desk.
  • ITD staff are familiar with the Thunderbird
    client configuration used in the Libraries.
  • OIT staff are not familiar with the Thunderbird
    client configuration used in the Libraries.

46

The University IT Environment Summary
  • ITD and OIT work together
  • OIT is responsible for the campus IT environment
  • ITD is responsible for the Libraries IT
    environment
  • Contact ITD with any and all problems
  • Only contact OIT if referred by ITD staff

47
HELP!!!!
  • Any time Library staff have a question about
    software, or if they suspect something is not
    working properly, they may contact the Help Desk.
    Theyre faster than Do
  • No question is too trivial.

x59188 OR helpdesk_at_itd.umd.edu
48
Be a Responsible User!
  • Becoming responsible computer users will help
    staff work more efficiently and achieve greater
    results.
  • Each workstation is dependent upon regular, in
    some cases continuous, interactivity with the LAN
    servers for security, data, resources and
    services.
  • Adherence to LAN policies and procedures is
    critical to the health and security of
    workstations, data, the LAN and the campus
    network.

49
Review of Staff Procedures
  • Always leave your workstation powered ON unless
    otherwise specified by ITD.
  • Save all data files to your M or Z drive.
  • RESTART your workstation at the end of the work
    day.
  • Read carefully all messages when you log onto the
    LAN, as well as e-mails from ITD.
  • Report unusual messages to the ITD Help Desk even
    if your workstation logs on successfully and
    functions.
  • When in doubt, call the ITD Help Desk! x59188

50
Selected Resources
  • Desktop Services Committee (www.lib.umd.edu/groups
    /dsc/)
  • ITD Helpdesk (www.lib.umd.edu/HELP/)
  • OIT (www.oit.umd.edu/)
  • Project Nethics (www.nethics.umd.edu/)
  • Staff Learning and Development (www.lib.umd.edu/gr
    oups/learning/stafflearning.html)
  • Viruses, Worms, and Trojans (service1.symantec.com
    /SUPPORT/nav.nsf/docid/1999041209131106)

51
Credits
  • This presentation was brought to you by the
    acronyms ITD, DSC, and SLD.
  • Todays number is 59188
  • Report Suspicious Activity to Helpdesk_at_itd.umd.edu
Write a Comment
User Comments (0)
About PowerShow.com