Introduction to Computing @ WSU



Similar documents
Introduction to WSU

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

IT Service Desk

Quick Start Guide to Logging in to Online Banking

Charter Business Desktop Security Administrator's Guide

VPN AND CITRIX INSTALLATION GUIDE

THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Reliance Bank Fraud Prevention Best Practices

Vancouver Community College Web Orientation

Using UWyo Wireless vs. WyoLync

Online Banking Fraud Prevention Recommendations and Best Practices

Technology for Employees at South Central College

Frequently Asked Questions

Millikin University Student Tech Training

Student ANGEL FAQs. General Issues: System Requirements:

Remote Access - Mac OS X

Frequently Asked Questions

Business ebanking Fraud Prevention Best Practices

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

TUT IT services > STUDY INFO > IT Services

New Employee Technology Orientation

VPN: Virtual Private Network Setup Instructions

Security considerations are denoted by a lock icon.

ViRobot Desktop 5.5. User s Guide

Macs are not directly compatible with Noetix.

Information Technology Department. Miller School of Medicine New User Guide

Cox Business Premium Security Service FAQs

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

High Speed Internet - User Guide. Welcome to. your world.

Why you need. McAfee. Multi Acess PARTNER SERVICES

Technology Guide for New Students

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ONE Mail Direct for Mobile Devices

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Student Access Reference Guide

How do I Install and Use the Cisco VPN Any Connect Client for the Berkeley Campus?

Activating Wake on LAN/Remote Access for Your Office Computer

Frequently Asked Questions The next section includes FAQs to help you to access and use your student account.

Windows and MAC User Handbook Remote and Secure Connection Version /19/2013. User Handbook

Setting up VPN and Remote Desktop for Home Use

Business Internet Banking / Cash Management Fraud Prevention Best Practices

MyAACC Anne Arundel Comm om uni ty C y ollege

Thank you for choosing Zoom Internet!

User's Manual. Intego Remote Management Console User's Manual Page 1

New Student Orientation Information Technology Packet

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

Off-Campus Piratedrive Connection Using VPN

Airtel PC Secure Trouble Shooting Guide

Yale School of Art Digital Technology Office Information

Accessing the Media General SSL VPN

Mac OS X: INSTALLING TUNNELBLICK

Working Together - Your Apple Mac and Microsoft Windows

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System

Recommended Settings for PACS HRS-d/eJacket via Remote Access

HELP DESK Park Library

BEST / Act 230 Funding

About This Guide. Security considerations are denoted by a lock icon.

Contents. McAfee Internet Security 3

The initial set up takes a few steps, but then each time you want to connect it is just a two set process.

MAPPING THE WEBDRIVE REFERENCE GUIDE

UCL Remote Access VPN Service Mac OS X User Guide

Cyber Security Awareness

Using TS-ACCESS for Remote Desktop Access

General Questions Requesting Access Client Support Downloading Issues Installation Issues Connectivity Issues...

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

ACCESS INSTRUCTIONS for Mac Users

Yale Software Library

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How To Install A Cisco Vpn Client V4.9.9 On A Mac Or Ipad (For A University)

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Computing Orientation

Research Information Security Guideline

Welcome to the UVU IT Help Desk

TUSCULUM COLLEGE. Ellucian Go: Installing and using the mobile application

Information Technology Services technology immersion for new employees

Steps for: POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) setup on MAC Platforms

Best Practices Guide to Electronic Banking

New ehealth Computer Account User Information. July 2014

COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT STANDARD POLICY AND PROCEDURE. Remote Access and Security I. PURPOSE.2 II. BACKGROUND.

ecstudent-ts Terminal Server How to Use

MSD IT High Compliance system Fact sheet

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

GREEN HOUSE DATA. Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

Accessing TP SSL VPN

Secured Remote Access Using Cisco AnyConnect with your Grid Card or Token Information Technology Services January 2015

Secure Share (Novell Filr) Remote Teacher Video Sharing Process School Year

Manchester Community College Student Technology Handbook. How to log into campus PCs

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

Accessing the SUNYIT wireless network for the first time

Connecting to securevirtual Workspace

ecfshome-ts Terminal Server How to Use

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

How to find your VCCS username, password, and emplid to access NOVAConnect and Blackboard

Mortgage Quest WebDesk Setup and Login Instructions

Getting credit for completing this lab

Password Management Help

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Student Getting Started Guide

Transcription:

Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information to Remember... 4 4 Anti-spam Utility... 4 5 - Network Drives... 4 6 - Logging into the Campus Network... 5 7 VPN (Virtual Private Network) Software... 5 8 Accessing Your Network Files from Home... 6 9 - WINGS Wright Information, News, and Group Services... 6 10 - Campus Password... 7 Information to Remember... 8 11 - WINGS Express (WE)... 8 12 - University ID (UID) and PIN... 8 13 - Email... 9 14 Software Discounts... 9 15 File Encryption... 9 Information to Remember...10 16 - WINGS Resource Center (WRC)... 10 17 - CaTS Resources... 11 18 Contact CaTS... 11

1 - Information Technology (IT) Security IT security has become an integral part of the worldwide computing environment, and keeping computers, networks, and data safe is of utmost importance. In keeping with this trend, CaTS has created a security website that houses a wealth of information regarding IT security. Please visit http://www.wright.edu/security/itwright/ to review this information. You can also view a short security video at the following website: http://www.wright.edu/security/securityvideo/flashvideo.html. Information to Remember Downloading and installing security updates are crucial when defending against viruses and other computer oriented attacks Never allow another person to use your computer account Close and lock your door whenever you leave your office Use a password protected screensaver Lock your workstation whenever you leave for any amount of time 2 - Malware Malware is a term that encompasses both viruses and spyware. A computer virus is a program that is infectious and can by highly complex. Viruses implant instructions in other programs or storage devices that can attack, scramble, or erase computer data. To check WSU s current computing status go to the CaTS homepage (http://www.wright.edu/cats/) and look for the CaTS Bulletin button on the right sidebar. Check this location for important computing news or alerts such as the latest worm/virus outbreak information. The following activities are among the most common ways of getting computer viruses. Minimizing the frequency of these activities will reduce your risk of getting a computer virus: Freely sharing computer programs and system disks Downloading executable software from public-access bulletin boards Opening email attachments from people you don't know 2

Spyware is software that watches your activities and collects personal data without your permission. Adware displays pop-ups and other forms of unauthorized advertising. Because these programs run in the background while you use your computer, they consume system resources and can slow down your PC significantly. WSU Policy: Wright State University is concerned with the health of your computer and with maintaining effective network resources. In the interest of your computer and the health of the University network, you are REQUIRED to have up-to-date operating system patches as well as virus and spyware scanning software on your system. In order to ensure uninterrupted network access, you must keep your operating system and all virus/spyware tools updated. Virus and Spyware scanning software for home use is available on the ConnectWright website, located at https://www.wright.edu/cats/cw/. Information to Remember Characteristics of spyware: monitoring computer activity, collect personal information, sends personal information back to the spyware creator Macintosh computers are susceptible to this type of computer oriented attack; CaTS recommends users download and install our free antivirus program for the Mac OS Characteristics of a virus: erase data, scramble data, replicate itself 3 - Firewalls A firewall is a system that is designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software formats. Here at Wright State University, CaTS maintains both hardware and software perimeter firewalls for the entire campus community that control Internet traffic in and out of our network. For individual computers, personal desktop firewalls, such as Windows Firewall, should be installed to help prevent unauthorized access. CaTS manages the security software on all university computers. For home use, the easiest and most convenient firewall to use is the Windows Firewall, but other popular programs include Zone Alarm and Tiny Firewall, which can be downloaded from the website http://www.download.com. 3

Information to Remember Personal firewalls protect your computer from unauthorized access 4 Anti-spam Utility Unsolicited commercial email, also known as spam, has become an increasing problem at WSU. To reduce the amount of time involved with managing spam, CaTS offers a spam filtering service for faculty, staff, and students. The service is currently available to all users with CaTS based email accounts (addresses ending in @wright.edu). Instructions for using the utility can be found at: http://www.wright.edu/cats/antispam/. The screenshot below shows the new End User Digest, a way to see all the spam that the filter has blocked for your account. 5 - Network Drives Active Directory Description H:/ Drive 5 GB Personal network storage K:/ Drive Dependent on department Shared departmental drive 4

6 - Logging into the Campus Network Recently, Wright State University made a transition from Novell to Microsoft Active Directory for our file storage and printing network infrastructure. The screenshot below shows what the login screen should look like when you turn on your computer. To log in, type in your campus w username and password and click the blue arrow. 7 VPN (Virtual Private Network) Software The AnyConnect VPN from Cisco allows authorized users to securely connect to the WSU data network from the campus wireless network or from off campus using various commercial Internet Service Providers (ISPs). Using AnyConnect, wireless and remote users are connected to the university's internal network as if they were directly connected to the campus network. This allows WSU wireless and remote users to access servers and other devices restricted to WSU network users. In addition, a VPN connection allows the user to access all network files (Home H:\ and shared drives K:\). To learn more about VPN software or to download it for your computer, please visit the CaTS VPN site, located at http://www.wright.edu/cats/vpn/. 5

8 Accessing Your Network Files from Home If you want to access your personal and departmental files from off-campus you must use the university s VPN connection. This connection allows you to securely connect to the WSU data network to access your files stored on your network drives. In order to use the connection you will be required to install the university s VPN software on your computer and use it to connect to your files. For instructions on how to download, install, and use the VPN client, please visit the following website: http://www.wright.edu/cats/vpn/. You will need to click on the link for AnyConnect VPN Registration to start the process. After downloading and installing the software, re-visit the above listed website and click on the Accessing Your Files from Home link under the Existing AnyConnect VPN Users section. 9 - WINGS Wright Information, News, and Group Services WINGS (an acronym for Wright Information, News, and Group Services), is an electronic portal used by the WSU community to access various systems, services, and information from one location. This secure site provides you with a customizable layout enabling you to add channelized content that matters to you. Log in using your campus account to access your email, personal calendar, announcements, course software, and WINGS Express. Visit WINGS at the following location: http://wings.wright.edu. 6

10 - Campus Password Account management should be done through the WINGS portal (http://wings.wright.edu). Once you are on the WINGS login page, click the Forgot your Campus Password? link located on the left side of the screen and you will have the ability to change your password. Your campus password must be changed every 180 days. When changing your campus password there are a few things to keep in mind: The password length must be 8 to 14 characters The password must contain a letter The password must contain at least one of these special characters: 0123456789^()-_!$ Do not use names or common words in the dictionary Do not use the following symbols: % #. @ The password cannot be one that you have used before Resetting your password There are two ways to change your password. Here s the preferred way for you to do it. 1) Login to WINGS (http://wings.wright.edu). 2) Click the My Account link in the top left corner. 3) Enter your current password. 4) Enter your new password and confirm it. 5) Click the Save Changes button. If you have trouble changing the password using this route, or you can t log in to WINGS, there s a second way to change your password. Here s how. 1) Go to the WINGS website (http://wings.wright.edu). 2) Click the Forgot Your Campus Password? link under the WINGS login box. 3) Enter your UID and PIN then click Submit. 4) Answer your security question(s). 5) Enter and re-enter your new password. 6) Click Submit. 7

Information to Remember Characteristics of a secure password: a random collection of numbers and letters Secure password are not easily guessed or found in the dictionary Example of secure password: summer2009=5umm3r2oo9 Simply exchanging numbers for letters can make a password more secure Never write down your password, even if you plan to store it in a secure place 11 - WINGS Express (WE) WINGS Express is a service that allows faculty and staff to access personal information at Wright State University, including pay information and grade entering. You can access WINGS Express by logging in to WINGS, then clicking the WINGS Express icon in the top right corner. 12 - University ID (UID) and PIN Your 9-digit University Identification Number (UID) is assigned to you when you apply as a student or become affiliated with Wright State University. Your UID never changes and is never re-used. It replaces the use of your Social Security Number as a permanent, unique ID number identifying you as a member of the university community. The UID, along with your PIN, is used to access the WINGS Express system. If you have forgotten your PIN, go to http://wingsexpress.wright.edu, enter your UID then click the Forgot PIN? button. Answer your security questions correctly and you ll be able to create a new PIN. 8

13 - Email There are numerous methods to check your email: WINGS (http://wings.wright.edu), Thunderbird, Outlook, etc. The most convenient method is through WINGS. Login to WINGS and click the Email icon in the top right. Email Quota: Faculty/Staff = 250 MB Official WSU Email Policy: There is an increasing reliance on electronic communication among students, faculty, staff and administration at Wright State University. Because of this reliance and the acceptance of electronic communication, email is considered the official means for communication. The University will send official communications via email and expects that those communications will be received and read in a timely fashion. Students are expected to check their official email address frequently to stay current with university communications. 14 Software Discounts Wright State University has a special licensing agreement with Microsoft and Apple that allows the distribution of a broad range of Microsoft and Apple software to employees. The software can be purchased by logging into the WINGS portal (http://wings.wright.edu), clicking on the Resources tab, and then on Order Software under the CaTS Support channel. Available software includes: Office 2010 for the PC, Office 2008 for the Macintosh, Windows and Macintosh system upgrades, and various other software titles. To see the list of all available titles and to read more about software licensing at the university, visit www.wright.edu/software/. 15 File Encryption Encryption is the process of transforming information from clear or plain text into a non-readable format so that only the intended reader can understand or change the message content. Encryption ensures privacy. It is a way to keep prying eyes from reading confidential information that is sent across the public internet. Certain software applications have encryption methods embedded in them for sending and receiving secure information and for the storage of information. There is also third party software available that can be used to encrypt information. 9

For directions on encrypting files, check out the following links: Encrypting files using Microsoft Office Word, Excel, and PowerPoint 2007 http://www.wright.edu/security/datacomp/office_07_encryption.pdf Encrypting files using Microsoft Office Access 2007 http://www.wright.edu/security/datacomp/access_07_encryption.pdf Encrypting files using Microsoft Office 2003 http://www.wright.edu/security/datacomp/office_07_encryption.pdf Encryption with the Macintosh Operating System http://www.wright.edu/security/datacomp/mac_encryption.pdf Information to Remember A Microsoft document can be encrypted so that a password is required to view the contents Documents should be encrypted if they contain any personal information The following are examples of personal information: username, password, educational records such as grades, social security numbers, etc Never include the encryption password in your email If you have any questions about what should be encrypted, please contact the CaTS Help Desk 16 - WINGS Resource Center (WRC) Looking for help accessing your information in WINGS and WINGS Express? Turn to the WINGS Resource Center, designed to help you more easily navigate WINGS, WINGS Express, and more. In this central location you will find training videos, documentation, training dates, FAQs, and more. You can find the WINGS Resource Center at https://support.wright.edu/wrc/. 10

17 - CaTS Resources Resource CaTS Website WINGS WINGS Resource Center IT Security Online Training Online Documentation Online Forms Computer Lab Schedules Anti-Spam Software CaTS Bulletin Free Software Web Location http://www.wright.edu/cats/ http://wings.wright.edu https://support.wright.edu/wrc/ http://www.wright.edu/security/ http://www.wright.edu/cats/train/ http://www.wright.edu/cats/docs/ http://www.wright.edu/cats/forms/ http://www.wright.edu/cats/labs/ http://www.wright.edu/cats/antispam/ http://www.wright.edu/cats/info/ https://www.wright.edu/cats/cw/ 18 Contact CaTS Contact CaTS for all of your campus computing needs. Here s our information: Phone: (937) 775-4827 or 1-888-775-4827 Email: helpdesk@wright.edu Location: 025 Library Annex (basement of Dunbar Library) 11