SlideShare ist ein Scribd-Unternehmen logo
1 von 21
2008 Collaborated with 	3 Companies and 	2 Universities partners on  	3 projects ,[object Object]
 Motorola (Korea & UK)
 Great Southern Wood (USA)
 Hong-ik University (Korea)
 Auburn University (USA),[object Object]
 Motorola (Korea)
 Hong-ik University (Korea)
 Ohio State University (USA)
 RMIT, University (Australia),[object Object]
The Open ICT Tools
ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP  (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
Why do they do it ? Money
Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
So… We got it hosted externally As demand stabilised we brought it inside

Weitere ähnliche Inhalte

Andere mochten auch (7)

Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
01 Def Dist Ed
01 Def Dist Ed01 Def Dist Ed
01 Def Dist Ed
 
Week1 lecture rev3
Week1 lecture rev3Week1 lecture rev3
Week1 lecture rev3
 
Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress
 
Output devices hafiq
Output devices hafiqOutput devices hafiq
Output devices hafiq
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples Presentation
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 

Ähnlich wie 07 Open ICT Tools

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 

Ähnlich wie 07 Open ICT Tools (20)

Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
The Internet
The InternetThe Internet
The Internet
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
P2p
P2pP2p
P2p
 
Wi-Fi File Explorer
Wi-Fi File ExplorerWi-Fi File Explorer
Wi-Fi File Explorer
 
Lec 1
Lec 1Lec 1
Lec 1
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 

Mehr von BCE A&E

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
BCE A&E
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
BCE A&E
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
BCE A&E
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
BCE A&E
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
BCE A&E
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
BCE A&E
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
BCE A&E
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
BCE A&E
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
BCE A&E
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
BCE A&E
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
BCE A&E
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
BCE A&E
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
BCE A&E
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
BCE A&E
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
BCE A&E
 

Mehr von BCE A&E (20)

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
 
BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E: How did we get here?
BCE A&E: How did we get here?
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesJisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
 
JISC:
JISC: JISC:
JISC:
 
09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

07 Open ICT Tools

  • 1.
  • 2.
  • 4. Great Southern Wood (USA)
  • 6.
  • 9. Ohio State University (USA)
  • 10.
  • 11.
  • 12. The Open ICT Tools
  • 13. ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
  • 14.
  • 15.
  • 16. Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
  • 17. What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
  • 18. How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
  • 19. Why do they do it ? Money
  • 20. Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
  • 21. So… We got it hosted externally As demand stabilised we brought it inside
  • 22. Skype Skype got a bad reputation Seen as a threat by network security Its traffic is encrypted Its protocols were kept secret It commandeered PCs for its own purposes
  • 23. So… We initially had a dedicated wireless network We now have it on our normal wireless network If there are no issues we would consider it on main network
  • 24. FTP Huge security risk Do use a bit of Secure FTP (SFTP) Not sensible to open up your systems to allow other people to send you files
  • 25. Instant Messenger We needed a corporate version Self installers use ‘external authentication’ Contacts needs to be self populated
  • 26. So… We chose Office Communication Server Works well internally In the process of installing bridge servers to externals
  • 27.

Hinweis der Redaktion

  1. Example of communication complexities
  2. Technological common platform enablingdata exchange and communication between Northumbria students its staff and external partners
  3. Jed to provide the context
  4. Jed to provide the context
  5. There is huge growth in the number of viruses etc. being created