Oklahoma Science, Technology, Engineering, and Mathematics (STEM) Mentorship Program

download Oklahoma  Science, Technology, Engineering, and Mathematics (STEM) Mentorship  Program

If you can't read please download the document

description

Oklahoma Science, Technology, Engineering, and Mathematics (STEM) Mentorship Program. What is the OITMP?. The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet , and other institutions with students in the technology field. - PowerPoint PPT Presentation

Transcript of Oklahoma Science, Technology, Engineering, and Mathematics (STEM) Mentorship Program

PowerPoint Presentation

Oklahoma Science, Technology, Engineering, and Mathematics (STEM) Mentorship Program

What is the OITMP?The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet, and other institutions with students in the technology field.

It is part of an NSF grant to enhance Oklahomas educational and research capability through network improvements.

http://www.oscer.ou.edu/ostemmp.php2Job ShadowingThe goal:

IDENTIFY, DEVELOP and RECRUIT Talent

Activities include:Presentations to students throughout OKJob shadowing opportunities (on-site & virtual)

http://www.oscer.ou.edu/ostemmp.php3Job ShadowingOn-SiteSchedule a time with us to see what we do!Virtuale-mail us at [email protected] (OU IT Network Team)Facebook: [email protected]://www.oscer.ou.edu/ostemmp.php4

Other Opportunities/ResourcesJobs at OUhttp://jobs.ou.edu

Jobs at OneNethttp://www.okhighered.org/job-opportunities/http://www.oscer.ou.edu/ostemmp.php5About This PresentationWhat do I do in the IT field?Lessons learned for getting this job.Recommendations for keeping the job.Being successful in this field.http://www.oscer.ou.edu/ostemmp.php6

About This Presentation (cont.)(But not this time)http://www.oscer.ou.edu/ostemmp.php7

[Cyber Security] Things that keepMe awake at nightNumber 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Number 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Number 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Too intimidatedto ask questionsOnly has a computer because a grandchild gave it to him

Assumes all e-mails are legitimate

Typically a member of several botnets

Number 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Too intimidatedto ask questionsNumber 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Fluent in at least three languages, including Klingon, Gallifreyan, and the binary language of moisture vaporators.

Devorkian keyboard layout.

Member of a local Cyber Security club.

Calls Help Desks to let them know what is wrong.ExtremesNumber 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Calls Help Desksto let them knowwhat is wrongToo intimidatedto ask questionsNumber 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Calls Help Desksto let them knowwhat is wrongToo intimidatedto ask questions

The rest of usNumber 5http://www.oscer.ou.edu/ostemmp.phpThe Users

Calls Help Desksto let them knowwhat is wrongToo intimidatedto ask questions

The rest of us

AKA:ID10TLoose nut between keyboard and chairNumber 5http://www.oscer.ou.edu/ostemmp.phpUser education is important!!!

Number 5http://www.oscer.ou.edu/ostemmp.phpUser education is important!!!

Number 4http://www.oscer.ou.edu/ostemmp.phpExpectation vs. Reality

Example: The firewallNumber 4http://www.oscer.ou.edu/ostemmp.phpThe Firewall (or: User Expectations)

Internet

Users assume that there is a firewall between them and the Internet.Number 4http://www.oscer.ou.edu/ostemmp.phpThe Firewall (or: User Expectations)

Internet

EXPECTATION: This firewall is a morality filter that separates the good from the bad.

Number 4http://www.oscer.ou.edu/ostemmp.phpThe Firewall (or: User Expectations)

InternetREALITY: IT knows that firewalls are just a screen door.

Number 4http://www.oscer.ou.edu/ostemmp.phpExpectation vs. Reality

Firewall is just one exampleIT is watching everything that I do

Wireless is available everywhere for free

My antivirus software can clean up anything

What works at home should work in the corporationNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Number 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Active DirectoryNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Active Directory

NetFlow DataNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Active Directory

MAC AddressDatabase

NetFlow DataNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Active Directory

MAC AddressDatabase

NetFlow Data

Syslog DataNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Active Directory

MAC AddressDatabase

NetFlow Data

Syslog Data

Wireless LocationNumber 3http://www.oscer.ou.edu/ostemmp.phpGovernance and Big Data

Independently, these are benign.

Tie them together, and you may create privacy concerns!

Worse yet, who watches the watchmen?Number 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

Number 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

Number 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

SDNNumber 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

SDN

Cloud ComputingNumber 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

SDN

Cloud Computing

Circuit-Based NetworkingNumber 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

SDN

Cloud Computing

Circuit-Based Networking

Number 2http://www.oscer.ou.edu/ostemmp.phpNext Generation Networking

Security Policies have yet to be developed!Number 1http://www.oscer.ou.edu/ostemmp.phpInternet of things

Number 1http://www.oscer.ou.edu/ostemmp.phpNetworks used to be simple:

Number 1http://www.oscer.ou.edu/ostemmp.phpNow everything is network attached:

Number 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

Number 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

LocationNumber 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

Location

Over-the-airtransmissionNumber 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

Location

Tunneling

Over-the-airtransmissionNumber 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

Location

Tunneling

Over-the-airtransmission

Firewall TraversalNumber 1http://www.oscer.ou.edu/ostemmp.phpBut what about the protocols used?

Users assume that the devices that they connect to are both KNOWN and TRUSTWORTHY!

If you got em, ask em!Please take a moment to fill out the evaluationsor NOT! The evaluations are completely optional!

No personal or personally identifiable data is collected.

Data is used by the grant providers to gauge success.Evaluation Time!The End (about time too)

(and now for Chris Mallow)