Title: Desktop Computer Drivers Ed
1Desktop ComputerDrivers Ed
- Learn how to be a
- responsible computer user
- at the
- University of Maryland Libraries
Sponsored by the Desktop Services Committee Fall
2007
2Overview
- Part 1 - Dangers and Security in the Cyberworld
- Part 2 - Libraries Local Area Network (LAN)
- Part 3 - The Universitys Information Technology
Environment
3Where is my computer?
Internet (or WAN)
Campus Network (or MAN)
Libraries Network (or LAN)
Your computer
4 Dangers and Security in the Cyberworld
- Today, we worry much less about someone
- physically stealing our computer
- and worry much more about unseen invaders
- attacking our computer from around the world.
-
5Hidden DangersHackers
- Hidden invaders
- Popularly known as Hackers.
- They want to access your computer
- for the thrill of the hunt, because your
computer is connected to the Internet - they need storage space or bandwidth
- because they are ethically irresponsible.
6Hidden DangersHackers (continued)
- Hackers
- Often use various means to break into a computer
such as - hacking computers using existing user names
passwords - finding weaknesses in software/operating
systems - sending viruses through e-mail attachments and
web site pop-ups.
7Hidden DangersViruses
- Viruses
- Computer programs designed to spread from file to
file on a computer. It is activated by user
intervention (i.e. opening infected attachment or
running infected program) - Behavior
- infect every application file or document on an
individual computer - Spread by
- opening infected email document attachments,
programs on diskettes/flash drives, etc., or file
servers.
8Hidden DangersWorms
- Worms
- Computer programs designed to copy themselves
from one computer to another over a network,
without user intervention. - Behavior
- affect network performance and consume bandwidth
- Spread by
- replicating itself to many computers over a
network, and doesnt require action on users
part. Thus computer worms spread much more
rapidly than computer viruses.
9Hidden DangersTrojan Horses
- Trojan Horses
- Computer programs that claim to be something
desirable (e.g. screen saver, game) but actually
contain malicious code that can delete or steal
data. - Behavior
- Allows others to remotely gain access to your
computer, letting them steal passwords, credit
card numbers, online banking data, or other
personal information. - Spread by
- to install a trojan horse you must invite them
to your computer by opening an e-mail attachment
or by downloading a file from the Internet.
10Hidden DangersPhishing
- Phishing
- A form of criminal activity that uses fake web
pages, emails, or even faxes to acquire sensitive
information such as passwords and credit card
details. - Phishing does not affect your personal computer
or network.
11SecuritySoftware Upgrades
- Upgrades are performed on a regular basis to
protect Library computers against viruses and
hackers. - Whenever Microsoft releases a patch to its
Windows Operating Systems, ITD is prepared to
upgrade Library staff remotely.
12SecurityAnti-Virus Software
- McAfee Anti-Virus is installed on your computer
to protect against unseen invaders. - McAfee checks for updates every five minutes,
every day. - We get new virus definition files every day.
- Dont touch it!
- If you see this symbol
- it means McAfee is running.
-
13Be a better driverPop-ups
- ALWAYS click on the ? at the very top right of
the pop-up window or use the key combination
ALT-F4. Never click close buttons. - When you click on text buttons (e.g. Close),
unwanted software may download onto your computer.
Click here!
Never here!
Dont click this!
14Be a better driverAttachments
- Many computer viruses are transmitted through
e-mail attachments. - If you are unsure of the e-mail senders identity
do not open the attachment. - Be aware of documents that have these file
extensions - strategicplan.exe
- merit.pif
- mtgminutes.com
- my_document.zip
- teamworkplan.doc (especially from people you
dont know). -
15Be a better driver Downloading
- Avoid downloading software. Do you really need
that Heroes screen saver, or the latest version
of Solitaire Deluxe? - Seemingly free programs often come with hidden
agendas (i.e. trojans) that can ruin your
computer. - Do not download unknown items onto your work
computer. - You are obliged to request all software using the
Software Site License Request Form - www.lib.umd.edu/itd/help/SOFTWARE/Request.htm
-
16Dangers and Security in the Cyberworld Summary
- Your computer doesnt stand alone it is
connected to the Libraries network, the
universitys network, and the global Internet - Close pop-up windows properly
- Never open questionable attachments
- Dont download anything from the Web without
first getting authorization - Report all computer problems to the ITD Help
Desk, so that problems are tracked and issues
can be resolved. -
17Libraries LAN (or Local Area Network)
- The Libraries LAN supports public access
computing, instructional computing, and
administrative (staff) computing.
18The LAN
- A LAN (Local Area Network)
- is a group of computers that share a common
communications line or wireless link - are the resources of a single processor or server
within a small geographic area (for example,
within an office building). - A LAN may serve
- as few as two or three users (for example, in a
home network) - as many as thousands of users (for example, in
the Libraries).
19The LAN (Servers)
- A SERVER
- is a central computer that allows users to share
applications and store data. - The servers in ITD provide
- Secure and flexible file management
- Protection from hackers and viruses
- Quick and seamless software upgrades.
20The LANThe Libraries LAN Domains
A DOMAIN is a group of computers and devices on a
network that are administered as a unit with
common rules and procedures.
PUBLIC (Libpub)
STAFF (LIBLAN)
LABS (Libpub)
21The LANLibraries Staff Domain
Different servers affect different aspects of our
work in the Libraries
MANAGEMENT SERVER
PROFILE SERVER
WORKSTATION
DATA SERVER
PRINTER SERVER
INVENTORY SERVER
22The LANManagement Server
- The Management Server provides ITD with the
capability to upgrade and install software,
including security updates, without having to
visit each individual workstation. - System Management Server (SMS)
- installs and upgrades software and images
- Windows Update Server (WSUS)
- applies security patches to the Microsoft
operating system and application software - E-Policy Orchestrator
- installs and updates McAfee virus detection
software - Group-Policy
- applies LAN-wide security policies
23The LANManagement Server (contd)
- Most installs and upgrades are regularly applied
after hours. -
- In order to receive installs and upgrades,
workstations must - be logged off the LAN
- powered on
- and linked to the campus network.
- E-Policy Orchestrator may apply upgrades to the
McAfee virus detection software even while
workstations are logged onto the LAN.
24The LANProfile Server
- Houses the unique user-customized configurations
for each LAN account including - Browsers (Netscape, IE, Firefox)
- E-mail clients
- MS-Office
- Desktops
- Printers.
- When logging onto the LAN, the server downloads
the profile to the workstation. - When logging off the LAN, local changes to the
profile are saved on the server.
25The LANData Server
- Houses
- individual staff Z drives
- shared divisional, departmental, and special
projects M drives. - All work files should be saved to either a Z
drive or M drive on the server. - All Z and M drives on the Data server are
backed up (copied) onto OIT servers nightly. - Stay tuned for more on this later
26The LANPrinter Server
- Houses
- All staff networked printer configurations.
27The LANInventory Server
- Enables ITD to keep accurate records about
Library computers so it can create efficient
replacement schedules. This also helps solve
problems! - Contains workstation specific data concerning the
hardware and software - Runs the ITD Help Desk Track-IT problem
management system - Audits workstations when logging onto the LAN.
- If your workstation is not logged by the
Inventory Server, then ITD doesnt know about it!
28THE LAN (File Management)
If a virus attacked the University of Maryland
Libraries server this morning and deleted all
the files, the loss would be minimal, because of
the existence of the backup copy!
If your files are stored on a workstation hard
drive and the hard drive breaks, you may be out
of luck, unless you back up your hard drive
daily. And who wants to worry about that?
ITD worries about it, so you dont have to!
29The LAN (File Management)M Drive
- The M Drive
- Is not actually on staff computers, its on the
ITD Data Server - Allows staff to share files and folders with
other members of their division - Is meant to be used for documents that are used
by many individuals within a department.
30The LAN (File Management)Z Drive
- The Z Drive
- Is also not actually on staff computers, it is on
the ITD Data Server - Cannot be viewed by anyone unless they use a
staff login and password (or happen to walk by
the computer while an individual staff is logged
in) - Is meant to be used for the storage of documents
of a personal/individual nature - Can be accessed by clicking My Documents.
31The LAN (Logins)
- Staff must LOG IN to use the LAN
- A login name represents an account on the server
- Every staff member has a unique login that is
usually assigned soon after their hire date. - Every login requires a secure password in order
to work. - ITD is in the process of changing Window logins
to Campus Directory IDs
32The LANBe a Better Driver
- Dont save data files or programs on the Desktop.
A large Desktop means a longer login process. - Use shortcuts on your desktop to access essential
files and programs remember that software is
tied to specific computers and not tied to a
profile. - Avoid fancy extras, like graphic mouse pointers
and special sound effects.
33The LANBe a Better Driver
- Save all files to either the Z drive or the M
drive. - Both Z and M drives are stored on the LAN
server.
34The LANBe a Better Driver
- Do NOT use the C drive for primary file storage.
Files may be lost forever if the computer
crashes. - The C drive may be used to retain local backup
copies. If so, save files to diskette or CD as
well.
35The LANBe a Better Driver
- Restart the computer before leaving for the day.
The Restart logs the computer off of the LAN. - Leave the computer powered ON.
36The LANBe a Better Driver
- Create GOOD passwords
- To protect identity and files
- That are at least 8 characters long
- Intersperse upper/lower case letters, numbers,
and punctuation symbols - That can be remembered
- e.g. 0au2to0mo9bi19le64
37The LANBe a Better Driver
- Avoid BAD passwords
- Dont use personal info SSN, DOB, address
- Single word or 2 words separated by number or
symbol - Sequence of numbers or letters
- Hobby, song, celebrity
- Same password but with slight variation
- e.g., Dave
- e.g., tobeornottobe
- e.g., my password
38The LANBe a Better Driver
- Protect your password
- Dont share it with others
- Change your password regularly (directory
passwords automatically expire every six months). - When changing your password, old passwords can
not be reused. - Forgot your login/password? Call the ITD
Helpdesk.
39Libraries LAN Summary
- Save all files on the LAN server
- Keep the Desktop clean
- Restart the computer before leaving, and leave
your computer powered on - Follow safe password guidelines
40Remind me - where is my computer?
Internet (or WAN)
Campus Network (or MAN)
Libraries Network (or LAN)
Your computer
41The University IT Environment
- OIT and ITD (Roles)
- OIT, ITD and Network Access
- OIT, ITD and Security
- OIT, ITD and E-mail
42OIT and ITD (Roles)
- Office of Information Technology (OIT)
- responsible for a variety of campus-wide services
including the campus network infrastructure and
security and e-mail. - Libraries Information Technology Division (ITD)
- responsible for the Libraries information
technology services and serves as liaison to OIT
for network, security and e-mail issues.
43OIT, ITD and Network Access
- ITD is the central conduit for all of the
Libraries network needs - Cant access your M or Z drive? Call the ITD
Help Desk! - Cant find a file? Call the ITD Help Desk!
- Cant access the Internet? Call the ITD Help
Desk!!!
When in doubt, call the ITD Help Desk! (x59188)
44OIT, ITD and Security
- OIT is constantly monitoring the network activity
of all workstations on campus. - When OIT detects a virus-infected or hacked
workstation, OIT staff immediately isolates it
from the campus network and contacts ITD. - ITD diagnoses the cause of the problem, takes
corrective action, then notifies OIT when the
workstation is secure. - OIT then adds the workstation back onto the
campus network.
45OIT, ITD and E-mail
- OIT provides the e-mail systems and services
campus-wide. - ITD supports the Thunderbird e-mail client within
the Libraries. - Staff may check the ITD Help Desk
(http//www.lib.umd.edu/help/) website for virus
alerts and e-mail outages. - Problems with e-mail? Contact the ITD Help Desk.
- ITD staff are familiar with the Thunderbird
client configuration used in the Libraries. - OIT staff are not familiar with the Thunderbird
client configuration used in the Libraries.
46The University IT Environment Summary
- ITD and OIT work together
- OIT is responsible for the campus IT environment
- ITD is responsible for the Libraries IT
environment - Contact ITD with any and all problems
- Only contact OIT if referred by ITD staff
47HELP!!!!
- Any time Library staff have a question about
software, or if they suspect something is not
working properly, they may contact the Help Desk.
Theyre faster than Do - No question is too trivial.
x59188 OR helpdesk_at_itd.umd.edu
48Be a Responsible User!
- Becoming responsible computer users will help
staff work more efficiently and achieve greater
results. - Each workstation is dependent upon regular, in
some cases continuous, interactivity with the LAN
servers for security, data, resources and
services. - Adherence to LAN policies and procedures is
critical to the health and security of
workstations, data, the LAN and the campus
network.
49Review of Staff Procedures
- Always leave your workstation powered ON unless
otherwise specified by ITD. - Save all data files to your M or Z drive.
- RESTART your workstation at the end of the work
day. - Read carefully all messages when you log onto the
LAN, as well as e-mails from ITD. - Report unusual messages to the ITD Help Desk even
if your workstation logs on successfully and
functions. - When in doubt, call the ITD Help Desk! x59188
50Selected Resources
- Desktop Services Committee (www.lib.umd.edu/groups
/dsc/) - ITD Helpdesk (www.lib.umd.edu/HELP/)
- OIT (www.oit.umd.edu/)
- Project Nethics (www.nethics.umd.edu/)
- Staff Learning and Development (www.lib.umd.edu/gr
oups/learning/stafflearning.html) - Viruses, Worms, and Trojans (service1.symantec.com
/SUPPORT/nav.nsf/docid/1999041209131106)
51Credits
- This presentation was brought to you by the
acronyms ITD, DSC, and SLD. - Todays number is 59188
- Report Suspicious Activity to Helpdesk_at_itd.umd.edu