24
Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Embed Size (px)

Citation preview

Page 1: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia

Open ICT Boundaries

Page 2: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Malware

• 15 years to end 2007 – 358,000• 135,000 in 2007• End of 2008 – 1.5M (3,500 per day)(Figures from McAfee)

Page 3: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

What are the dangers ?

• Keyloggers– Get your passwords– And your credit card and bank details

• Your PC becomes a robot• Your PC becomes base for new attack

Page 4: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

How does it happen ?

• Opening an e-mail attachment• ‘OK to install new video codec ?’• Downloading and installing free software• Accepting a file using an Instant Messenger• Installation through coercion• Simply visiting a website

Page 5: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Why do they do it ?

• Financial gain

What damage can they do?• Slow PC/system

• Crash system

Page 6: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

Page 7: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

Scenario:

You want groups of students studying at various universities across the world to collaborate on a group project with external business partners.

Can this be achieved without compromising IT infrastructure of all partners?

Page 8: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

2007 - 2010 Collaborated with 4 Industry Partners and6 Universities partners

• On the Move II: Mobile Computing Now• On the Move I (Design for Experience, Imagining a Notebook and Futures of Mobile Computing)• Thinking Outside of the Box (Product /Service Design)• Constructing Constructs (Constructing Luxury and Constructing Technology)• Global Heath, Local Solutions (Well-Being and Vitality)• Entertainment on the Go

6 Projects

Page 9: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

4 June 20089

Collaborative Partners Academic Year

2006/2007 2007/2008 2008/2009 2009/2010

Higher Education Partners

TU Delfti Edinburgh Napier

Universityii Northumbria

Universityiii

Hong-ik Universityiv Northumbria

Universityiv Auburn Universityv

Hong-ik Universityv Northumbria

University iv RMITvi Ohio State Universityvi

Northumbria Universityiv

Ohio State Universityvi Hong-ik Universityvii

Industry Partners Intelvi Motorolav + iv Greater Southern

Woodvi

Inverness Medicalviii Motorolav

Intelvi Motorolav

Number of Participants 63 60 147 179

i The Netherlands ii Scotland iii England iv Korea v USA vi Australia vii Korea viii UK

Page 10: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

Page 11: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Wikis

• Initially didn’t integrate with our authentication

• There would be a training overhead for contributors

• We would have to set it up and support it• Little demand

Page 12: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

So…

We tested various collaboration tools• Plone - problematic• Choose Wordpress – more user friendly, easy

to administer

Page 13: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Skype

• Skype got a bad reputation• Seen as a threat by network security• Its traffic is encrypted• Its protocols were kept secret• It commandeered PCs for its own purposes

Page 14: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

So…

• We initially had a dedicated wireless network• We now have it on our normal wireless network• If there are no issues we would consider it on main

network

Page 15: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

FTP

• Huge security risk• Do use a bit of Secure FTP (SFTP)• Not sensible to open up your systems to allow

other people to send you files

Page 16: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Instant Messenger

• We needed a corporate version• Self installers use ‘external authentication’• Contacts needs to be self populated

Page 17: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

So…

• We chose Office Communication Server• Works well internally• Now communicates externally

Page 18: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

JISCinfoNet Project:

Goal is to support collaboration using ICTs between the university and its external collaborative business & community partners

Objectives:

• ICT tools enable secure exchange of information

• ICT tools embedded into university IT infrastructure

• Groups (staff/students) able to collaborate

Page 19: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

The Open ICT Tools

Page 20: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

Wikisemail

Videoconferencing

Teleconferencing

VoIP (Voice over Internet

Protocol such as Skype)

Blogs

Instant messaging

Interactive Whiteboard Technology

FTPPlone

2009

Page 21: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

Wikisemail

Videoconferencing

Teleconferencing

VoIP (Voice over Internet

Protocol such as Skype)

Blogs

Instant messaging

Interactive Whiteboard Technology

FTPWordPress

2010

Page 22: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

JISCinfoNet Project:

What would be a marker of success?

Page 23: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

Open ICT Tools JISC infoNet projectNo

rth

um

bria

Co

nfe

ren

ce 2

00

9

Tu

esd

ay

8th

Se

pte

mb

er

20

09

JISCinfoNet Project:

Markers of success:

• Usability & accessibility of chosen tools

• Use of open source software

• Tools compatible with university IT infrastructure

• Collaboration within project teams

Page 24: Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries

NORTHUMBRIA UNIVERSITYIT SERVICES AND LTECH HELP YOU?

How can