60 likes | 133 Views
BSD Computing Activities. BIS PeopleSoft activities Information Management (in DOE sense) Computer Security (in DOE sense) Desktop Support BSD Firewall Project. BIS PeopleSoft System. Development by SCS Business Applications Support (BAS) Tightly “matrixed” to BSD
E N D
BSD Computing Activities • BIS PeopleSoft activities • Information Management (in DOE sense) • Computer Security (in DOE sense) • Desktop Support • BSD Firewall Project Bill Johnson, BSD
BIS PeopleSoft System • Development by SCS Business Applications Support (BAS) • Tightly “matrixed” to BSD • Desktop support supplied directly by BSD • Year 2000 Testing • Mandated by DOE before 3/31/99 • Currently developing Testbed environment • Target completion date 1/4/99 Bill Johnson, BSD
Information Management Activities • Year 2000 Point-of-Contact with DOE • UNICALL Budget Cross-cut • Used to be IM budget for the whole Lab • May be different this year • Review of Purchase Requisitions for IT acquisitions • $20K threshold • Reviewed for technical coherence with respect to other Lab programs • Major Information Acquisitions (MIAs)--$1M threshold Bill Johnson, BSD
DOE Computer Security • “Computer Protection Program Manager” or CPPM • Preparation of the Laboratory Computer Protection Plan (CPP) • Liaison with DOE for incident reporting • Lab representative for Unclassified Computer Security at DOE meetings • Tensions between Unclassified and Classified Programs • Just lived through an attempt to combine • Bad guys seem to be winning again Bill Johnson, BSD
Desktop Support Activities • BSD was the first Departmental “Trusting” Windows NT Domain • Support 154 Windows NT Systems and 2 Macs • Only 3 self administered NT systems • Very different user community than rest of Lab • Very close alliance with SCS Desktop Support Group • Championed SMS development • Deep security concerns since NT is a “sieve” when it comes out of the box Bill Johnson, BSD
BSD Firewall Project • Protect the PeopleSoft Database and a few key BSD workstations through any attacks that are mounted against SLAC • “Hydra” Server with RS5 encrypted clients for all PeopleSoft access • Network VLAN isolation in the event of an attack • Need for timely and systematic technology upgrades • Mature Domain • Essential for Desktop support • Needs to be funded globally, not from group budgets Bill Johnson, BSD