Studying Skilled UsersBy Larry Dignan | Posted 2004-09-01 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
As a new school year starts, university I.T. administrators must learn how to counter threats to their networks from increasingly computer-savvy students.
How You Should STUDY SKILLED USERS
Watch Your Class
See what devices they use. Ask what they're being used for. Evaluate.
Track connections by Internet Protocol address. Watch usage, in progress.
Let them know that monitoring is legal and possible. Establish penalties for unauthorized use of the network.
The best security comes from getting intelligent input from affected users.
Here's a look at how universities are coping with technologies that can hamper academic or network performance, if used improperly.
Bandwidth:Northeastern University uses "traffic shapers" to prevent hogging. This software designates bandwidth for certain activities. Although Northeastern can't monitor content, it can designate certain activities, such as downloading a research paper, as more favorable than downloading a movie. For instance, no more than 5 percent of bandwidth can be used at any one time to connect to file sharing services such as Kazaa.
PDAs in the classroom: Universities across the board have punted on the use of communications tools that could be used for cheating. The "technical" answer: leave it up to professors to decide whether PDAs are permitted in their classrooms.
Wireless networking:A few colleges such as Cleveland State University offer access almost anywhere on campus, through the air. Others are just beginning to test wireless service.
Viruses:Dramatic increase in protective activities, on servers and individual computers. Student welcome kits even include CDs that include ready-to-install antivirus software. The coming academic year will show whether these efforts pay off.