810 likes | 1.13k Views
COMTECH – November 15 / 2007 . Welcome. Agenda. CIO Update Image Baby Image! Making PC Cloning More Efficient Security Officer Report Electronic Communications Update Call Centre Anywhere Networking Update CANHEIT Closing - Questions and Answers . CIO UPDATE.
E N D
COMTECH – November 15 / 2007 Welcome
Agenda • CIO Update • Image Baby Image! Making PC Cloning More Efficient • Security Officer Report • Electronic Communications Update • Call Centre Anywhere • Networking Update • CANHEIT • Closing - Questions and Answers
Image Baby Image! Making PC Cloning More Efficient Carol Sin / Danny Wong For ACM SIGUCCS 2007 Fall Conference
Before the presentation… INFORMATION TECHNOLOGIES
Does your computer have an image problem? Do you have a need to work around the pre-installed OS? Do you control your PCs? Who’s your Daddy? BartPE is the answer. INFORMATION TECHNOLOGIES
What is BartPE? BartPE is a pre-installation environment which runs Windows regardless of the OS which is installed on the PC Based on Microsoft’s WinPE INFORMATION TECHNOLOGIES
What can BartPE do? Boot via CD, USB key, hard drive or network Network connectivity / Diagnostics Inventory collection / Remote management Ghost … and much much more (especially with custom plugins) INFORMATION TECHNOLOGIES
BartPE – IT Labs Scenario New Machine (at least 512MB RAM) Boot from USB key into RAM Drive BartPE starts by loading network driver Pre-flight check (starts Famatech RServer) Inventory collection begins – new machine! Network speed verification Ghostcast session begins INFORMATION TECHNOLOGIES
BartPE Screenshot UCIT Customized version of BartPE INFORMATION TECHNOLOGIES
Post-imaging tasks and timesavers Pre-sysprep • Deletes most AD created profiles • Disables CTRL-ALT-DEL to prepare for autoadmin logon Sysprep • Joins workgroup • Declone.exe runs to rename the computer • Writes machine info to hard drive for later use by scripts INFORMATION TECHNOLOGIES
More post-imaging Autoadminlogon #1 & #2 • Netdom joins the domain • Setup task scheduler for daily reboot and profile cleanup • Setup default logon parameters for the domain user INFORMATION TECHNOLOGIES
Highlights Entire post-imaging setup is automated. The machine operates unattended until ghosting and post-imaging configuration are complete. Compare using Ghost Console to name machines and perform per machine configuration. Everything is standalone, and potential faults with Ghost Console will not affect the process. INFORMATION TECHNOLOGIES
PXE BOOTING!! The New Revolution … INFORMATION TECHNOLOGIES
PXE Booting Shutdown computers with a script PXE boot using Wake-On-LAN Load BartPE from tftp server INFORMATION TECHNOLOGIES
PXE Booting (Where Are We?) Can be done across subnets with centralized PXE and tftp servers Still in pilot stage Working on automating the Ghost process so that it is unattended INFORMATION TECHNOLOGIES
PXE Booting - Screenshot PXE Server / TFTP Server on a Windows 2003 Server INFORMATION TECHNOLOGIES
PXE Booting Video Clip of Elbow Room Lab University of Calgary INFORMATION TECHNOLOGIES
Conclusion Our imaging solution has stood the test of time. Bart’s boot disk was first used in 2003. In 2007, BartPE offers an open and flexible development platform that could potentially be used for other pre-boot applications. Provided that the network is at least 100Mbps and reliable, this solution is ideal in a Windows-based lab environment. INFORMATION TECHNOLOGIES
After the presentation… INFORMATION TECHNOLOGIES
Image, Baby, Image! Making PC Cloning More Efficient Full Presentation and Video http://www.ucalgary.ca/itlabs/image.html Abstract http://www.ucalgary.ca/it/computing/labs/SIGUCCS/2007/docs/p314.pdf Carol Sin - csin@ucalgary.ca Danny Wong - danny.wong@ucalgary.ca INFORMATION TECHNOLOGIES
Information Security Officer's Update Dennis Tracz CISSP-ISSMP, CISM Information Security Officer
Contents • Background • Vision & Mandate • Policy • Questions • Quiz
Information Security is • The process of protecting information from a wide range of threats in order to ensure business continuity, minimize business damage, and maximize return on investments and business opportunities. • The process of protecting the information assets of an organization.
Why do we need Security? Good Business Practice Ongoing effective management of information systems and information assets. Customer confidence has a direct impact on revenue. Members Inherent expectation that confidential data is appropriately protected. Regulatory & Legal Compliance • HIPAA (Health Insurance Portability and Accountability Act) • PIPEDA (Personal Information Protection and Electronic Documents Act) • FOIP (Freedom of Information & Protection Act) • HIA (Health Information Act of Alberta) • Many More
Managing Security Risk • Absolute Security is impossible! Given enough time and effort any security safeguard can be overcome. • The challenge is therefore to mitigate the risk to an acceptable level. To accomplish this: • Information Security must work jointly with the Faculties, Schools, Units and other business partner. • Information Security risks need to be identified and managed like any other business risk.
Current Security Threats Natural Disasters • Floods • Fires • Earthquakes • Hurricanes Deliberate • Disgruntled Employees • Hackers/Malicious Code • Cyber-Terrorists/warfare • Industrial Espionage Accidental • Employee Accidents • Power Failures • Hardware & Software Failures
Information Security Vision • Enable the attainment of the University's goals by ensuring the appropriateness of the Information Security controls surrounding the Confidentiality, Integrity,Availability of the University’s information assets.
Information Security Mandate • Policies and Standards Develop, implement, review and revise Information Security Policies, Standards and procedures. • Information Security Governance, Establish and maintain a framework to provide assurance that information security strategies are aligned with University objectives and consistent with applicable laws and regulations. • Security Awareness,Develop, implement and maintain an effective security awareness program.
Information Security Mandate (Cont..) • Security Architecture, Ensure the appropriateness of the technical infrastructure and application-related security controls within the U of C computing environment. • Security Incident Management, Ensure that all security related incidents and violations are properly documented, investigated and correctly resolved in a timely fashion. • Business Continuity, Provide input to existing Business Continuity Plans (BCP), make necessary adjustments to the Master Disaster Recovery Plan (MDRP) and Service Availability and Recovery plans (SARPs) as the BCP changes, and provide effective security direction in the event of a disaster.
Laws & Regulations Customer Expectations University Objectives Policy Standards Procedures Guidelines
Information Management & Compliance Program • Acceptable Use of Information Asset • Common Sense (legal and courteous) • Information Identification & Classification • Mostly UCLASS includes a security classification • Information Asset Security Monitoring • UofC will conduct appropriate monitoring • Information Asset Protection • protection is commensurate with classification • Information Asset Management • Risk Identification, Assessment & Management The Official Policies
My Questions • Approximately how many computers on the Internet are infected with spyware? a. 25% b. 45% c. 60% d. 80% • What is the best protection against spyware? a. Disable Active-X in Internet Explorer b. A firewall c. Install anti-spyware and keep it updated d. Only browse websites that you know and trust Source: SANS
What do these institutions have in common? 508 279 1, 200 Bates College 5, 098 23,000 18, 000 16, 000 Nevada University 64,098 Records Compromised
How are Passwords are like bubblegum? • Strongest when fresh • Should be used by and individual not a group • If left laying around will create a sticky mess
Electronic Communications Update Wolfgang Neumann/Adil Kurji
Enterprise-Centric FMC Wi-Fi side of the phone is homed to the PBX PBX forwards calls to cellular number when phone is out of Wi-Fi coverage Sometimes used with cellular data channel for presence & signaling when in cellular coverage User experience is like a PBX extension whether inside or outside Wi-Fi coverage
Status Today WiFi Voice using U of C ePBX Forward call to cell number when out of reach on WiFi. Send all Voice-Mail to ePBX. Send Voice-Mail notification via E-Mail.
What is the Supernet? “Alberta SuperNet is a high-speed, high-capacity broadband network linking government offices, schools, health-care facilities and libraries, including approximately 4,200 connections in 429 communities.” http://www.albertasupernet.ca/supercommap/index.cfm
Videoconferencing Supernet locations can enable video communication through installation of a Video Edge Device (VED) The VED acts as a gateway which translates video and routes it over the supernet Video packets are given higher priority through QoS
Implementation Course: English 504.01 offered remotely to Red Deer College. Hosted at the TLC and linked over the commercial internet Audio/Video quality & connection issues EC & TLC registered an endpoint to the VED Conference quality greatly increased http://www.ucalgary.ca/connectivity/vol2/issue11/reddeer
Electronic Communications For more information Contact: MS733 ec@ucalgary.ca 210-7717
Call Centre Anywhere Ian Whitehead
TELUS CallCentreAnywhere™&University of CalgaryInformation TechnologiesIan M. WhiteheadIT Support CentreIncident Coordinator
CallCentreAnywhere™on Campus In 2006, Enrollment services launched the use of CallCentreAnywhere™ as their call centre solution for handling the high volume of calls coming into the University of Calgary, Registrars office. In June 2007, the IT Support Centre, the PeopleSoft Support Centre and IT Client Relations & Communications celebrated the successful collaborative effort with Enrolment Services through jointly handling a high volume of calls for Fall 2007 open registration.
CallCentreAnywhere™Implemented at both IT Support Centres In August 2007, the IT Support Centre and the PeopleSoft Support Centre migrated from their old call centre technology to TELUS CallCentreAnywhere™
What is CallCentreAnywhere™? Customer contact centre and management solution Web-based Hosted entirely on the TELUS network References from TELUS CallCentreAnywhere™ Enterprise & Industry Contact Centre Solutions web site: http://promo.telus.com/tm/05/q3/cca/faq.html#q1