Agriculture Information Technology AgIT - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Agriculture Information Technology AgIT

Description:

Computer auto-lock after 15 minutes of inactivity (November 1) ... Machines with a detected virus will be immediately and automatically removed from the network. ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 19
Provided by: Agricultur74
Category:

less

Transcript and Presenter's Notes

Title: Agriculture Information Technology AgIT


1
Welcome
  • Agriculture Information Technology (AgIT)
  • Purdue University
  • Pat Smoker, Department Head
  • Melinda Bradbury, Asst Team Leader
  • http//www.agriculture.purdue.edu/agit
  • pds_at_purdue.edu
  • mbradbur_at_purdue.edu

2
Agenda
  • Change and why
  • New Security Officer Group
  • IMPACTS
  • Network Issues
  • Inconveniences
  • Secure Data Handling
  • Future Impacts
  • Advantages to Keeping Machine on Network
  • Campus Initiatives

3
Change and Why
  • Knee jerk reaction due to recent computer
    security breaches
  • Important to get to minimum level
  • Provost Request

4
New Security Officer Group
  • Developing deliberate, methodical approach to
    providing a secure computer environment.
  • Don Kindred represents College of Agriculture.
  • AgIT is bound by all security requirements
    imposed by
  • Purdue IT as well as College of Ag security
    requirements

5
IMPACTS
  • Security Audit - completed
  • End User Agreement (upcoming)
  • Network Configuration
  • No Domain Controllers in county extension offices
  • More Secure however when network is down login
    problems
  • Machines not regularly on the network will
    require re-imaging before connecting to the
    network (includes laptops and tablet pcs)

6
Network Issues
  • Outages
  • Can be local (telephone company in area),
  • Regional (a cut fiber affecting only a certain
    area of the state),
  • Statewide (a major fiber break)
  • At Purdue.
  • Each step to a secure computing environment
  • steals some convenience from the end-user.

7
Inconveniences
  • Thirty day required password change ( November 1)
  • Cannot use recent passwords
  • Minimum password age
  • Computer auto-lock after 15 minutes of inactivity
    (November 1)
  • Campus wireless access limited
  • Limited access to county office network
  • No promiscuous connects
  • When specialists and/or other educators are
    expected, arrangements must be made for them to
    connect to the network
  • Continued on next slide

8
Inconveniences
  • Continued from previous slide
  • All machines must be managed by Purdue IT Entity
  • Any platforms are affected Macs, Unix, etc
  • No locally purchased machines or personal
    machines allowed on network
  • Future of VPN May not be available
  • Loss of VPN will keep staff from accessing office
    server from home
  • Smart VPN may be kept available

9
Secure Data Handling
  • Data-flows required for all sensitive or
    restricted data
  • Sensitive or restricted data required to be
    stored on a secure server
  • County servers are secure servers
  • It is the responsibility of the end-user to be
    aware
  • and informed when accessing or using sensitive
    data.
  • Continued on next slide

10
Secure Data Handling
  • Continued from previous slide
  • Security Overview
  • Phase one required county assistance
  • Phase two and three will be conducted in the
    background by AgIT with little or no effort on
    the part of the county.
  • AgIT always attempts to limit the
  • effort and impact on the end-user.

11
Future Impacts
  • Loss of VPN
  • May require electronic security to access
    computer
  • May not be able to allow any local administrative
    access to the computers (including TC)
  • Software will be required to certain security
    standards
  • Continued on next slide

12
Future Impacts
  • Continued from previous slide
  • Regular port scans to identify and remove
    software which creates risk
  • Deleted cookies
  • Deletion of .tmp files
  • Machines may be less responsive due to scans
  • Critical patches MUST be applied

13
Advantages to Keeping Machine on Network
  • Ensured machines are secure and patched
  • Machines running current software versions
  • Machines wont update unexpectedly

14
Campus Initiatives
  • Likely all computers will have base security
    policy from ITaP
  • Add value at the department level
  • Tightening up of the Acceptable use Policy
  • Support for old applications could be shortened
  • IT staff required to meet more stringent set of
    competencies
  • Continued on next slide

15
Campus Initiatives
  • Continued from previous slide
  • Inventories of high value data may be moved to
    mega-source servers
  • Multifactor authentication put into place
  • Openness of network will be tightened
  • Increased intrusions detection monitoring
  • Lock out after multiple login attempts
  • Continued on next slide

16
Campus Initiatives
  • Continued from previous slide
  • Machines with a detected virus will be
    immediately and automatically removed from the
    network.
  • Tightening of access control will make it
    difficult to get access to do things.
  • Tool and procedures will be created for users to
    access their own machines
  • Puts more accountability on the end-user to
    practice safe computing

17
The Conclusion
  • Questions and Answers

18
The End
  • Thank You
Write a Comment
User Comments (0)
About PowerShow.com