SlideShare une entreprise Scribd logo
1  sur  21
2008 Collaborated with 	3 Companies and 	2 Universities partners on  	3 projects ,[object Object]
 Motorola (Korea & UK)
 Great Southern Wood (USA)
 Hong-ik University (Korea)
 Auburn University (USA),[object Object]
 Motorola (Korea)
 Hong-ik University (Korea)
 Ohio State University (USA)
 RMIT, University (Australia),[object Object]
The Open ICT Tools
ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP  (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
Why do they do it ? Money
Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
So… We got it hosted externally As demand stabilised we brought it inside

Contenu connexe

En vedette (7)

Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
01 Def Dist Ed
01 Def Dist Ed01 Def Dist Ed
01 Def Dist Ed
 
Week1 lecture rev3
Week1 lecture rev3Week1 lecture rev3
Week1 lecture rev3
 
Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress
 
Output devices hafiq
Output devices hafiqOutput devices hafiq
Output devices hafiq
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples Presentation
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 

Similaire à 07 Open ICT Tools

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 

Similaire à 07 Open ICT Tools (20)

Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
The Internet
The InternetThe Internet
The Internet
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
P2p
P2pP2p
P2p
 
Wi-Fi File Explorer
Wi-Fi File ExplorerWi-Fi File Explorer
Wi-Fi File Explorer
 
Lec 1
Lec 1Lec 1
Lec 1
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 

Plus de BCE A&E

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
BCE A&E
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
BCE A&E
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
BCE A&E
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
BCE A&E
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
BCE A&E
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
BCE A&E
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
BCE A&E
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
BCE A&E
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
BCE A&E
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
BCE A&E
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
BCE A&E
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
BCE A&E
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
BCE A&E
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
BCE A&E
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
BCE A&E
 

Plus de BCE A&E (20)

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
 
BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E: How did we get here?
BCE A&E: How did we get here?
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesJisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
 
JISC:
JISC: JISC:
JISC:
 
09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

07 Open ICT Tools

  • 1.
  • 2.
  • 4. Great Southern Wood (USA)
  • 6.
  • 9. Ohio State University (USA)
  • 10.
  • 11.
  • 12. The Open ICT Tools
  • 13. ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
  • 14.
  • 15.
  • 16. Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
  • 17. What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
  • 18. How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
  • 19. Why do they do it ? Money
  • 20. Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
  • 21. So… We got it hosted externally As demand stabilised we brought it inside
  • 22. Skype Skype got a bad reputation Seen as a threat by network security Its traffic is encrypted Its protocols were kept secret It commandeered PCs for its own purposes
  • 23. So… We initially had a dedicated wireless network We now have it on our normal wireless network If there are no issues we would consider it on main network
  • 24. FTP Huge security risk Do use a bit of Secure FTP (SFTP) Not sensible to open up your systems to allow other people to send you files
  • 25. Instant Messenger We needed a corporate version Self installers use ‘external authentication’ Contacts needs to be self populated
  • 26. So… We chose Office Communication Server Works well internally In the process of installing bridge servers to externals
  • 27.

Notes de l'éditeur

  1. Example of communication complexities
  2. Technological common platform enablingdata exchange and communication between Northumbria students its staff and external partners
  3. Jed to provide the context
  4. Jed to provide the context
  5. There is huge growth in the number of viruses etc. being created