SlideShare una empresa de Scribd logo
1 de 21
2008 Collaborated with 	3 Companies and 	2 Universities partners on  	3 projects ,[object Object]
 Motorola (Korea & UK)
 Great Southern Wood (USA)
 Hong-ik University (Korea)
 Auburn University (USA),[object Object]
 Motorola (Korea)
 Hong-ik University (Korea)
 Ohio State University (USA)
 RMIT, University (Australia),[object Object]
The Open ICT Tools
ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP  (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
Why do they do it ? Money
Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
So… We got it hosted externally As demand stabilised we brought it inside

Más contenido relacionado

Destacado (7)

Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
01 Def Dist Ed
01 Def Dist Ed01 Def Dist Ed
01 Def Dist Ed
 
Week1 lecture rev3
Week1 lecture rev3Week1 lecture rev3
Week1 lecture rev3
 
Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress
 
Output devices hafiq
Output devices hafiqOutput devices hafiq
Output devices hafiq
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples Presentation
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 

Similar a 07 Open ICT Tools

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 

Similar a 07 Open ICT Tools (20)

Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
The Internet
The InternetThe Internet
The Internet
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
P2p
P2pP2p
P2p
 
Wi-Fi File Explorer
Wi-Fi File ExplorerWi-Fi File Explorer
Wi-Fi File Explorer
 
Lec 1
Lec 1Lec 1
Lec 1
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 

Más de BCE A&E

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
BCE A&E
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
BCE A&E
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
BCE A&E
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
BCE A&E
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
BCE A&E
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
BCE A&E
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
BCE A&E
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
BCE A&E
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
BCE A&E
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
BCE A&E
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
BCE A&E
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
BCE A&E
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
BCE A&E
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
BCE A&E
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
BCE A&E
 

Más de BCE A&E (20)

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
 
BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E: How did we get here?
BCE A&E: How did we get here?
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesJisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
 
JISC:
JISC: JISC:
JISC:
 
09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

07 Open ICT Tools

  • 1.
  • 2.
  • 4. Great Southern Wood (USA)
  • 6.
  • 9. Ohio State University (USA)
  • 10.
  • 11.
  • 12. The Open ICT Tools
  • 13. ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
  • 14.
  • 15.
  • 16. Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
  • 17. What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
  • 18. How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
  • 19. Why do they do it ? Money
  • 20. Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
  • 21. So… We got it hosted externally As demand stabilised we brought it inside
  • 22. Skype Skype got a bad reputation Seen as a threat by network security Its traffic is encrypted Its protocols were kept secret It commandeered PCs for its own purposes
  • 23. So… We initially had a dedicated wireless network We now have it on our normal wireless network If there are no issues we would consider it on main network
  • 24. FTP Huge security risk Do use a bit of Secure FTP (SFTP) Not sensible to open up your systems to allow other people to send you files
  • 25. Instant Messenger We needed a corporate version Self installers use ‘external authentication’ Contacts needs to be self populated
  • 26. So… We chose Office Communication Server Works well internally In the process of installing bridge servers to externals
  • 27.

Notas del editor

  1. Example of communication complexities
  2. Technological common platform enablingdata exchange and communication between Northumbria students its staff and external partners
  3. Jed to provide the context
  4. Jed to provide the context
  5. There is huge growth in the number of viruses etc. being created