Science Technology Engineering and Mathematics STEM Mentorship Program What is the OITMP The Oklahoma STEM Mentorship Program is an educational outreach connecting networking professionals from OU ID: 321603
Download Presentation The PPT/PDF document "Oklahoma" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Oklahoma
Science, Technology, Engineering, and Mathematics (STEM) Mentorship
ProgramSlide2
What is the OITMP?
The Oklahoma STEM Mentorship
Program is an educational outreach connecting networking professionals from OU, OneNet, and other institutions with students in the technology field.It is part of an NSF grant to enhance Oklahoma’s educational and research capability through network improvements.
http://
www.oscer.ou.edu
/ostemmp.php
2Slide3
Job Shadowing
The goal:
IDENTIFY, DEVELOP and RECRUIT Talent
Activities include:Presentations to students throughout OKJob shadowing opportunities (on-site & virtual)
http://
www.oscer.ou.edu/ostemmp.php
3Slide4
Job Shadowing
On-SiteSchedule a time with us to see what we do!
Virtuale-mail us at network@ou.edu (OU IT Network Team)Facebook: oknetworkmentor@groups.facebook.com
http://
www.oscer.ou.edu
/ostemmp.php
4Slide5
Other Opportunities/Resources
Jobs at OUhttp://jobs.ou.edu
Jobs at OneNethttp://www.okhighered.org/job-opportunities/
http://
www.oscer.ou.edu
/ostemmp.php
5Slide6
About This Presentation
What do I do in the IT field?
Lessons learned for getting this job.Recommendations for keeping the job.Being successful in this field.
http://
www.oscer.ou.edu
/ostemmp.php
6Slide7
About This Presentation (cont.)
(But not this time…)
http://
www.oscer.ou.edu
/
ostemmp.php
7
[Cyber Security]
Things that keep
Me awake at night…Slide8
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Slide9
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Slide10
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Too intimidatedto ask questionsOnly has a computer because a grandchild gave it to himAssumes all e-mails are legitimateTypically a member of several botnetsSlide11
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Too intimidated
to ask questionsSlide12
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Fluent in at least three languages, including Klingon, Gallifreyan, and the binary language of moisture vaporators
.Devorkian keyboard layout.
Member of a local Cyber Security club.Calls Help Desks to let them know what is wrong.
ExtremesSlide13
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Calls Help Desksto let them knowwhat is wrong
Too
intimidated
to ask questionsSlide14
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Calls Help Desksto let them knowwhat is wrong
Too
intimidated
to ask questions
The rest of us…Slide15
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
The Users…Calls Help Desksto let them knowwhat is wrong
Too
intimidated
to ask questions
The rest of us…
AKA:
“ID10T”
“Loose nut between keyboard and chair”Slide16
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
User education is important!!!Slide17
Number 5…
http://
www.oscer.ou.edu
/
ostemmp.php
User education is important!!!Slide18
Number 4…
http://
www.oscer.ou.edu
/
ostemmp.php
“Expectation” vs. “Reality”Example: The “firewall”…Slide19
Number 4…
http://
www.oscer.ou.edu
/
ostemmp.php
The “Firewall”… (or: “User Expectations”)Internet
Users assume that there is a “firewall” between them and the Internet.Slide20
Number 4…
http://
www.oscer.ou.edu
/
ostemmp.php
The “Firewall”… (or: “User Expectations”)Internet
EXPECTATION: This “firewall” is a “morality filter” that separates the “good” from the “bad”.Slide21
Number 4…
http://
www.oscer.ou.edu
/
ostemmp.php
The “Firewall”… (or: “User Expectations”)Internet
REALITY: IT knows that firewalls are just a “screen door”.Slide22
Number 4…
http://
www.oscer.ou.edu
/
ostemmp.php
“Expectation” vs. “Reality”Firewall is just one example…IT is watching everything that I do…Wireless is available everywhere for free…My antivirus software can clean up anything…What works at home should work in the corporation…Slide23
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Slide24
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Active DirectorySlide25
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Active DirectoryNetFlow DataSlide26
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Active DirectoryMAC AddressDatabase
NetFlow
DataSlide27
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Active DirectoryMAC AddressDatabase
NetFlow
Data
Syslog DataSlide28
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”Active DirectoryMAC AddressDatabase
NetFlow
Data
Syslog Data
Wireless LocationSlide29
Number 3…
http://
www.oscer.ou.edu
/
ostemmp.php
Governance and “Big Data”
Independently, these are “benign”.
Tie them together, and you may create privacy concerns!
Worse yet, who watches the watchmen?Slide30
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSlide31
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSlide32
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSDNSlide33
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSDNCloud ComputingSlide34
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSDNCloud Computing
Circuit-Based NetworkingSlide35
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation NetworkingSDNCloud Computing
Circuit-Based NetworkingSlide36
Number 2…
http://
www.oscer.ou.edu
/
ostemmp.php
Next Generation Networking
Security Policies have yet to be developed!Slide37
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
Internet of “things”…Slide38
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
Networks used to be simple:Slide39
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
Now everything is network attached:Slide40
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?Slide41
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?LocationSlide42
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?LocationOver-the-airtransmissionSlide43
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?LocationTunneling
Over-the-air
transmissionSlide44
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?LocationTunneling
Over-the-air
transmission
Firewall TraversalSlide45
Number 1…
http://
www.oscer.ou.edu
/
ostemmp.php
But what about the “protocols” used?
Users assume that the devices that they
connect to are both KNOWN and TRUSTWORTHY!Slide46
If you got ‘
em
, ask ‘em!Slide47
Please take a moment to fill out the evaluations…or NOT! The evaluations are completely optional!
No personal or personally identifiable data is collected.
Data is used by the grant providers to gauge success.
Evaluation Time!Slide48
The End (about time too…)
(and now for Chris Mallow…)