1 / 81

COMTECH – November 15 / 2007

COMTECH – November 15 / 2007 . Welcome. Agenda. CIO Update Image Baby Image! Making PC Cloning More Efficient Security Officer Report Electronic Communications Update Call Centre Anywhere Networking Update CANHEIT Closing - Questions and Answers . CIO UPDATE.

desma
Download Presentation

COMTECH – November 15 / 2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMTECH – November 15 / 2007 Welcome

  2. Agenda • CIO Update • Image Baby Image! Making PC Cloning More Efficient • Security Officer Report • Electronic Communications Update • Call Centre Anywhere • Networking Update • CANHEIT • Closing - Questions and Answers

  3. CIO UPDATE

  4. Image Baby Image! Making PC Cloning More Efficient Carol Sin / Danny Wong For ACM SIGUCCS 2007 Fall Conference

  5. Before the presentation… INFORMATION TECHNOLOGIES

  6. Does your computer have an image problem? Do you have a need to work around the pre-installed OS? Do you control your PCs? Who’s your Daddy? BartPE is the answer. INFORMATION TECHNOLOGIES

  7. What is BartPE? BartPE is a pre-installation environment which runs Windows regardless of the OS which is installed on the PC Based on Microsoft’s WinPE INFORMATION TECHNOLOGIES

  8. What can BartPE do? Boot via CD, USB key, hard drive or network Network connectivity / Diagnostics Inventory collection / Remote management Ghost … and much much more (especially with custom plugins) INFORMATION TECHNOLOGIES

  9. BartPE – IT Labs Scenario New Machine (at least 512MB RAM) Boot from USB key into RAM Drive BartPE starts by loading network driver Pre-flight check (starts Famatech RServer) Inventory collection begins – new machine! Network speed verification Ghostcast session begins INFORMATION TECHNOLOGIES

  10. BartPE Screenshot UCIT Customized version of BartPE INFORMATION TECHNOLOGIES

  11. Post-imaging tasks and timesavers Pre-sysprep • Deletes most AD created profiles • Disables CTRL-ALT-DEL to prepare for autoadmin logon Sysprep • Joins workgroup • Declone.exe runs to rename the computer • Writes machine info to hard drive for later use by scripts INFORMATION TECHNOLOGIES

  12. More post-imaging Autoadminlogon #1 & #2 • Netdom joins the domain • Setup task scheduler for daily reboot and profile cleanup • Setup default logon parameters for the domain user INFORMATION TECHNOLOGIES

  13. Highlights Entire post-imaging setup is automated. The machine operates unattended until ghosting and post-imaging configuration are complete. Compare using Ghost Console to name machines and perform per machine configuration. Everything is standalone, and potential faults with Ghost Console will not affect the process. INFORMATION TECHNOLOGIES

  14. PXE BOOTING!! The New Revolution … INFORMATION TECHNOLOGIES

  15. PXE Booting Shutdown computers with a script PXE boot using Wake-On-LAN Load BartPE from tftp server INFORMATION TECHNOLOGIES

  16. PXE Booting (Where Are We?) Can be done across subnets with centralized PXE and tftp servers Still in pilot stage Working on automating the Ghost process so that it is unattended INFORMATION TECHNOLOGIES

  17. PXE Booting - Screenshot PXE Server / TFTP Server on a Windows 2003 Server INFORMATION TECHNOLOGIES

  18. PXE Booting Video Clip of Elbow Room Lab University of Calgary INFORMATION TECHNOLOGIES

  19. Conclusion Our imaging solution has stood the test of time. Bart’s boot disk was first used in 2003. In 2007, BartPE offers an open and flexible development platform that could potentially be used for other pre-boot applications. Provided that the network is at least 100Mbps and reliable, this solution is ideal in a Windows-based lab environment. INFORMATION TECHNOLOGIES

  20. After the presentation… INFORMATION TECHNOLOGIES

  21. Image, Baby, Image! Making PC Cloning More Efficient Full Presentation and Video http://www.ucalgary.ca/itlabs/image.html Abstract http://www.ucalgary.ca/it/computing/labs/SIGUCCS/2007/docs/p314.pdf Carol Sin - csin@ucalgary.ca Danny Wong - danny.wong@ucalgary.ca INFORMATION TECHNOLOGIES

  22. Information Security Officer's Update Dennis Tracz CISSP-ISSMP, CISM Information Security Officer

  23. Contents • Background • Vision & Mandate • Policy • Questions • Quiz

  24. Information Security is • The process of protecting information from a wide range of threats in order to ensure business continuity, minimize business damage, and maximize return on investments and business opportunities. • The process of protecting the information assets of an organization.

  25. Why do we need Security? Good Business Practice Ongoing effective management of information systems and information assets. Customer confidence has a direct impact on revenue. Members Inherent expectation that confidential data is appropriately protected. Regulatory & Legal Compliance • HIPAA (Health Insurance Portability and Accountability Act) • PIPEDA (Personal Information Protection and Electronic Documents Act) • FOIP (Freedom of Information & Protection Act) • HIA (Health Information Act of Alberta) • Many More

  26. Managing Security Risk • Absolute Security is impossible! Given enough time and effort any security safeguard can be overcome. • The challenge is therefore to mitigate the risk to an acceptable level. To accomplish this: • Information Security must work jointly with the Faculties, Schools, Units and other business partner. • Information Security risks need to be identified and managed like any other business risk.

  27. Current Security Threats Natural Disasters • Floods • Fires • Earthquakes • Hurricanes Deliberate • Disgruntled Employees • Hackers/Malicious Code • Cyber-Terrorists/warfare • Industrial Espionage Accidental • Employee Accidents • Power Failures • Hardware & Software Failures

  28. Evolving Security Threats

  29. Information Security Vision • Enable the attainment of the University's goals by ensuring the appropriateness of the Information Security controls surrounding the Confidentiality, Integrity,Availability of the University’s information assets.

  30. Information Security Mandate • Policies and Standards Develop, implement, review and revise Information Security Policies, Standards and procedures. • Information Security Governance, Establish and maintain a framework to provide assurance that information security strategies are aligned with University objectives and consistent with applicable laws and regulations. • Security Awareness,Develop, implement and maintain an effective security awareness program.

  31. Information Security Mandate (Cont..) • Security Architecture, Ensure the appropriateness of the technical infrastructure and application-related security controls within the U of C computing environment. • Security Incident Management, Ensure that all security related incidents and violations are properly documented, investigated and correctly resolved in a timely fashion. • Business Continuity, Provide input to existing Business Continuity Plans (BCP), make necessary adjustments to the Master Disaster Recovery Plan (MDRP) and Service Availability and Recovery plans (SARPs) as the BCP changes, and provide effective security direction in the event of a disaster.

  32. Laws & Regulations Customer Expectations University Objectives Policy Standards Procedures Guidelines

  33. Information Management & Compliance Program • Acceptable Use of Information Asset • Common Sense (legal and courteous) • Information Identification & Classification • Mostly UCLASS includes a security classification • Information Asset Security Monitoring • UofC will conduct appropriate monitoring • Information Asset Protection • protection is commensurate with classification • Information Asset Management • Risk Identification, Assessment & Management The Official Policies

  34. Questions?

  35. My Questions • Approximately how many computers on the Internet are infected with spyware? a. 25% b. 45% c. 60% d. 80% • What is the best protection against spyware? a. Disable Active-X in Internet Explorer b. A firewall c. Install anti-spyware and keep it updated d. Only browse websites that you know and trust Source: SANS

  36. What do these institutions have in common? 508 279 1, 200 Bates College 5, 098 23,000 18, 000 16, 000 Nevada University 64,098 Records Compromised

  37. How are Passwords are like bubblegum? • Strongest when fresh • Should be used by and individual not a group • If left laying around will create a sticky mess

  38. Electronic Communications Update Wolfgang Neumann/Adil Kurji

  39. New WEB Interface

  40. Enterprise-Centric FMC Wi-Fi side of the phone is homed to the PBX PBX forwards calls to cellular number when phone is out of Wi-Fi coverage Sometimes used with cellular data channel for presence & signaling when in cellular coverage User experience is like a PBX extension whether inside or outside Wi-Fi coverage

  41. Status Today WiFi Voice using U of C ePBX Forward call to cell number when out of reach on WiFi. Send all Voice-Mail to ePBX. Send Voice-Mail notification via E-Mail.

  42. What is the Supernet? “Alberta SuperNet is a high-speed, high-capacity broadband network linking government offices, schools, health-care facilities and libraries, including approximately 4,200 connections in 429 communities.” http://www.albertasupernet.ca/supercommap/index.cfm

  43. Videoconferencing Supernet locations can enable video communication through installation of a Video Edge Device (VED) The VED acts as a gateway which translates video and routes it over the supernet Video packets are given higher priority through QoS

  44. Implementation Course: English 504.01 offered remotely to Red Deer College. Hosted at the TLC and linked over the commercial internet Audio/Video quality & connection issues EC & TLC registered an endpoint to the VED Conference quality greatly increased http://www.ucalgary.ca/connectivity/vol2/issue11/reddeer

  45. Electronic Communications For more information Contact: MS733 ec@ucalgary.ca 210-7717

  46. Call Centre Anywhere Ian Whitehead

  47. TELUS CallCentreAnywhere™&University of CalgaryInformation TechnologiesIan M. WhiteheadIT Support CentreIncident Coordinator

  48. CallCentreAnywhere™on Campus In 2006, Enrollment services launched the use of CallCentreAnywhere™ as their call centre solution for handling the high volume of calls coming into the University of Calgary, Registrars office. In June 2007, the IT Support Centre, the PeopleSoft Support Centre and IT Client Relations & Communications celebrated the successful collaborative effort with Enrolment Services through jointly handling a high volume of calls for Fall 2007 open registration.

  49. CallCentreAnywhere™Implemented at both IT Support Centres In August 2007, the IT Support Centre and the PeopleSoft Support Centre migrated from their old call centre technology to TELUS CallCentreAnywhere™

  50. What is CallCentreAnywhere™? Customer contact centre and management solution Web-based Hosted entirely on the TELUS network References from TELUS CallCentreAnywhere™ Enterprise & Industry Contact Centre Solutions web site: http://promo.telus.com/tm/05/q3/cca/faq.html#q1

More Related