What is the OITMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting...
-
Upload
briana-butler -
Category
Documents
-
view
222 -
download
0
Transcript of What is the OITMP? o The Oklahoma STEM Mentorship Program is an educational outreach connecting...
Oklahoma Science, Technology, Engineering, and Mathematics (STEM)
Mentorship Program
What is the OITMP?
o The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU, OneNet, and other institutions with students in the technology field.
o It is part of an NSF grant to enhance Oklahoma’s educational and research capability through network improvements.
http://www.oscer.ou.edu/ostemmp.php 2
Job Shadowing
o The goal:
IDENTIFY, DEVELOP and RECRUIT Talent
o Activities include:o Presentations to students throughout OKo Job shadowing opportunities (on-site &
virtual)http://www.oscer.ou.edu/ostemmp.php 3
Job Shadowing
o On-Siteo Schedule a time with us to see what we do!
o Virtualo e-mail us at [email protected] (OU IT Network Team)o Facebook: [email protected]
http://www.oscer.ou.edu/ostemmp.php 4
Other Opportunities/Resources
o Jobs at OUo http://jobs.ou.edu
o Jobs at OneNeto http://www.okhighered.org/job-opportunities/
http://www.oscer.ou.edu/ostemmp.php 5
About This Presentation
o What do I do in the IT field?o Lessons learned for getting this job.o Recommendations for keeping the job.o Being successful in this field.
http://www.oscer.ou.edu/ostemmp.php 6
About This Presentation (cont.)
(But not this time…)
http://www.oscer.ou.edu/ostemmp.php 7
[Cyber Security] Things that keepMe awake at night…
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Too intimidatedto ask questions
Only has a computer because a grandchild gave it to him
Assumes all e-mails are legitimate
Typically a member of several botnets
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Too intimidatedto ask questions
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Fluent in at least three languages, including Klingon, Gallifreyan, and the binary language of moisture vaporators.
Devorkian keyboard layout.
Member of a local Cyber Security club.
Calls Help Desks to let them know what is wrong.
Extremes
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Calls Help Desksto let them know
what is wrong
Too intimidatedto ask questions
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Calls Help Desksto let them know
what is wrong
Too intimidatedto ask questions
The rest of us…
Number 5…
http://www.oscer.ou.edu/ostemmp.php
The Users…
Calls Help Desksto let them know
what is wrong
Too intimidatedto ask questions
The rest of us…
AKA:“ID10T”
“Loose nut between keyboard and chair”
Number 5…
http://www.oscer.ou.edu/ostemmp.php
User education is important!!!
Number 5…
http://www.oscer.ou.edu/ostemmp.php
User education is important!!!
Number 4…
http://www.oscer.ou.edu/ostemmp.php
“Expectation” vs. “Reality”
Example: The “firewall”…
Number 4…
http://www.oscer.ou.edu/ostemmp.php
The “Firewall”… (or: “User Expectations”)
Internet
Users assume that there is a “firewall” between them and the Internet.
Number 4…
http://www.oscer.ou.edu/ostemmp.php
The “Firewall”… (or: “User Expectations”)
Internet
EXPECTATION: This “firewall” is a “morality filter” that separates the “good” from the “bad”.
Number 4…
http://www.oscer.ou.edu/ostemmp.php
The “Firewall”… (or: “User Expectations”)
Internet
REALITY: IT knows that firewalls are just a “screen door”.
Number 4…
http://www.oscer.ou.edu/ostemmp.php
“Expectation” vs. “Reality”
Firewall is just one example…
IT is watching everything that I do…
Wireless is available everywhere for free…
My antivirus software can clean up anything…
What works at home should work in the corporation…
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”Active Directory
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”Active Directory
NetFlow Data
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”Active Directory
MAC AddressDatabase
NetFlow Data
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”Active Directory
MAC AddressDatabase
NetFlow DataSyslog Data
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”Active Directory
MAC AddressDatabase
NetFlow DataSyslog Data
Wireless Location
Number 3…
http://www.oscer.ou.edu/ostemmp.php
Governance and “Big Data”
Independently, these are “benign”.
Tie them together, and you may create privacy concerns!
Worse yet, who watches the watchmen?
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
SDN
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
SDNCloud Computing
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
SDNCloud Computing
Circuit-Based Networking
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
SDNCloud Computing
Circuit-Based Networking
Number 2…
http://www.oscer.ou.edu/ostemmp.php
Next Generation Networking
Security Policies have yet to be developed!
Number 1…
http://www.oscer.ou.edu/ostemmp.php
Internet of “things”…
Number 1…
http://www.oscer.ou.edu/ostemmp.php
Networks used to be simple:
Number 1…
http://www.oscer.ou.edu/ostemmp.php
Now everything is network attached:
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Location
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Location
Over-the-airtransmission
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Location
Tunneling
Over-the-airtransmission
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Location
Tunneling
Over-the-airtransmission
Firewall Traversal
Number 1…
http://www.oscer.ou.edu/ostemmp.php
But what about the “protocols” used?
Users assume that the devices that they connect to are both KNOWN and TRUSTWORTHY!
If you got ‘em, ask ‘em!
Please take a moment to fill out the evaluations…or NOT! The evaluations are completely optional!
No personal or personally identifiable data is collected.
Data is used by the grant providers to gauge success.
Evaluation Time!
The End (about time too…)
(and now for Chris Mallow…)