SlideShare uma empresa Scribd logo
1 de 32
Jisc/Janet updates from Network
Operations, Operational Services
and StrategicTechnologies
23/03/2016 Janet Network DDoS experience
Steve Kennett
Head of operational services and
Senior information risk owner, Jisc
technologies
23/03/2016 Janet Network DDoS experience
23/03/2016 Janet Network DDoS experience
Operational services
23/03/2016 Janet Network DDoS experience
Janet Computer Incident ResponseTeam - CSIRT
Janet Computer Security Incident ResponseTeam
»Safeguarding your current and future computer security, with a
primary function to monitor and resolve any security incidents that
occur on the Janet network
»Our mission is to create a secure environment to conduct your
online activities. Our primary function is to monitor and resolve
any security incidents that occur on the network, with specialists
tracking a range of platforms, including Unix, Linux andWindows
23/03/2016 Janet Network DDoS experience
Janet Computer Security Incident ResponseTeam
»We work closely with our community to detect, report and
investigate incidents that pose a threat to the security of our
customers' information systems.We also investigate other forms
of network abuse such as spam and copyright infringement
»Due to the geographical scope of incidents, we assist national and
international law enforcement agencies in their investigations,
connecting them to our trusted contacts within the community
23/03/2016 Janet Network DDoS experience
MonthlyTotal Incidents Completed 2015
7
CSIRT – Cost benefits
Costs: time to fix the breach, remove infection from computers, deal with
questions, inform staff and students, time that systems are unavailable to staff
and students, fines and compensation, business loss, reputational damage.
» 12.5% of organisations using Janet avoid having one severe security breach
annually due to the existence of CSIRT;
» Using the figures in the BIS report and working with the Jisc SSU
» £22.5 million
23/03/2016 Janet Network DDoS experience
BIS report “2015
Information Security
Breaches Survey”
£1.46m
to £3.14m
Average cost to a business
of its worst security
breach of the year.
£75k
to £311k
Large
Small
Programme of security activities
»Information security
management
»ISO27001
»DDoS mitigation
»Security X-ray
»Cybersecurity intelligence
»Vulnerability assessment
»Phishing mitigation
»Malware analysis
»Digital forensics
»Password managers
»Web filtering
23/03/2016 Janet Network DDoS experience
Scary but true
23/03/2016 Janet Network DDoS experience
jisc.ac.uk
Computer Security Incident ResponseTeam
23/03/2016 Janet Network DDoS experience
0300 999 2340
irt@csirt.ja.net
Visit the Janet network CSIRT blog
23/03/2016 Janet Network DDoS experience
Trust and identity
Jisc trust and identity services
eduroam
» 372 members – increase of 14% and an increase of 18% in operational eduroam
deployments to 277 organisations
» Jisc customersencouragedto work with local authoritiesto increaseeduroam footprint
UK Access Management Federation
» Reached 1K members, now at 1,037
» Important for the ~400 Shib IdPs v2 to upgrade before end of support in July
Assent
» Working to develop and implement Moonshot technology
into big infrastructure facilities as well as ‘everyday’ type services
23/03/2016 Janet Network DDoS experience
Jisc trust and identity services
Certificate service
» S/MIME certificates for digitally signing and encrypting emails is coming this summer
» High Assurance ExtendedValidation certs available for important / high profile
websites
Domain registry service (formally Naming service)
» Online portal now available for managing all your .ac.uk domains. Contact
domains@jisc.ac.uk to get access
T&I Networkshop events:
» Share and explore (BoF) – Wednesday @ 16:30 (room 2.219/2.220 (120))
» T&I parallel session –Thursday @ 09.15 (room 4.205/4.206 (120))
23/03/2016 Janet Network DDoS experience
23/03/2016 Janet Network DDoS experience
Shared data centre
Shared data centre current status – 1.5MW
»15 customers including anchor tenants
»Pipeline of customers
»160 racks (including 18 Jisc) and growing
»Total power requirement 1.542MW
Current status:
23/03/2016 Janet Network DDoS experience
So where next?
Shared data centre v2
»Geographically diverse
»Anchor tenants in place
› Universities of Liverpool, Leeds, Sheffield,
and Sheffield Hallam University, as well as
the N8 Research Partnership
»Project moving quickly – aiming for service
in place by Q3/Q4 2016
»Wednesday 23 March, Parallel sessions
(11:30 - 12:45)
23/03/2016 Janet Network DDoS experience
23/03/2016 Janet Network DDoS experience
Trans National Education -TNE
Transnational education
» Transnational education (TNE) is the
provision of education for students based
in a country other than the one in which
the awarding institution is located
Strategic importance
23/03/2016 Janet Network DDoS experience
23/03/2016 Janet Network DDoS experience
Workshop to Raise Awareness of Prevent
(WRAP)
Workshop to Raise Awareness of Prevent (WRAP)
»An understanding of the Prevent strategy and your role within it
»The ability to use existing expertise and professional judgment to
recognise the vulnerable individuals who may need support
»Local safeguarding and referral mechanisms and people to
contact for further help and advice
»This workshop is an introduction to the Prevent strategy,
it does not cover wider institutional responsibilities
under the duty
WRAP is a free specialist workshop, designed by
HM Government to give you:
23/03/2016 Janet Network DDoS experience
Workshop to Raise Awareness of Prevent (WRAP)
»Facilitated online learning, no travel required
»Delivered by our award winning training team
»Highly participatory sessions
»Share best practice across the sectors and nationwide
»Information and registration at jisc.ac.uk/advice/training
23/03/2016 Janet Network DDoS experience
Workshop to Raise Awareness of Prevent (WRAP)
» We are currently running four
sessions per week
» Sessions currently available to
book for March - May
» Number of sessions run to date:
104 and 25 scheduled for
March/April
» Total delegates completed
courses: 1575
» HE: 39%
» FE/Skills: 56%
» Others: 5%
» Broad mix of participants
including participation from
» Student Union/councils,
senior management, governors
(e.g. Principle, IT Director,
Director student services,
tutors and support staff)
23/03/2016 Janet Network DDoS experience
23/03/2016 Janet Network DDoS experience
Operational services delivery group
Service news and developments
»Web Filtering Service - Updated
› Updated to a cloud service August 2015
› Unlawful Extremist Content filter made available from Nov 2015
› User based filtering (Windows AD) now available
»Framework – Available from mid-May
› Multi-supplier, Multi-technology (Cloud, local and Hybrid),
aggregated discounts, possible licensing discounts for
existing installations
Web Filtering and Monitoring
22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all) 25
Cloud news and developments
»Amazon have removed the egress charges for education and
research users
»Maximum egress discount is 15% of total bill – the average
amount for egress charges is 5% and there is no cost to upload
data into AWS, or move data betweenAmazon Simple Storage
Service (Amazon S3) andAmazon ElasticCompute Cloud
(Amazon EC2). Users of Arcus portal will benefit from the
egress charge exemption
»Further details on the Jisc website
AmazonWeb Service
22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all) 26
Vscene developments
The service currently facilitates ~6000 conferences per month
across 500+ educational organisations
3 phases ofVscene development:
»a completely re-written customer interface
(phase 1, completed July 2014)
»a refresh of its underlying infrastructure
(phase 2, completesAugust 2016)
»a re-procurement ofVscene operational support
(phase 3, starting April 2016)
23/03/2016 Janet Network DDoS experience
Vscene developments
The new infrastructure:
»Double the current capacity to cope with ongoing increasing
domestic and international demand
»Give the flexibility to burst into cloud capacity to ensure
responsiveness of provision and minimise costs
»Increased interoperability with desktop users with introduction
ofWebRTC and Skype for business capability
»Support theTNE by enhancing communications between home
and foreign campuses of UK universities, e.g. a pilot between
Nottingham and China
23/03/2016 Janet Network DDoS experience
Vscene developments
Proposed future enhancements:
»Support for mobile devices (Smartphones &Tablets)
»Text chat capability
»VLE integration
23/03/2016 Janet Network DDoS experience
ISO 9001:2008 & 9001:2015 Quality Update
› Maintenance of ISO9001 certification since 1998
› The standard focuses on our products and services and currently
covers our network and associated services
› A full certificate renewal audit (to ISO9001:2008) is taking place
at the end of April 2016
› Work is already underway to align our quality management
system to ISO9001:2015 with a plan to transition to
ISO9001:2015 late 2016
› Discussions underway around how to expand our quality
management system across the whole organisation
22/03/2016 Operational Services
)
ISO 27001:2013 Information Security Update
› Project started August 2014 to implement and gain certification
against ISO27001:2013 (information security)
› Initial scope and certification looks at Eduroam(UK), Janet Certificate
Service, UK Access Management Federation and Jisc Assent
› Stage 1 audit with certification body scheduled for March 2016 (first
part of the formal certification process)
› Work is already underway to bring additional services into our
certification scope post successful completion of our stage 2 audit
› Additional discussions underway around how to expand our
information security management system across the whole
organisation
22/03/2016 Operational Services
jisc.ac.uk
22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all)
JiscTechnologies
Steve Kennett
Head of Operational Services
steve.kennett@jisc.ac.uk

Mais conteúdo relacionado

Mais procurados

Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014Martin Hamilton
 
The Kent PSN, govroam and HSCN
The Kent PSN, govroam and HSCNThe Kent PSN, govroam and HSCN
The Kent PSN, govroam and HSCNJisc
 
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...Martin Hamilton
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issuesJisc
 
Collaboration through technology: moving from possibility to practice
Collaboration through technology: moving from possibility to practiceCollaboration through technology: moving from possibility to practice
Collaboration through technology: moving from possibility to practiceJisc
 
Directions in research data management - Jisc Digital Festival 2015
Directions in research data management - Jisc Digital Festival 2015Directions in research data management - Jisc Digital Festival 2015
Directions in research data management - Jisc Digital Festival 2015Jisc
 
Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Jisc
 
Something amazing from the University Library - libraries and research workin...
Something amazing from the University Library - libraries and research workin...Something amazing from the University Library - libraries and research workin...
Something amazing from the University Library - libraries and research workin...Jisc
 
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Jisc
 
Parallel session: communications services
Parallel session: communications servicesParallel session: communications services
Parallel session: communications servicesJisc
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...Jisc
 
Good practice in learning analytics - Jisc Digital Festival 2015
Good practice in learning analytics - Jisc Digital Festival 2015Good practice in learning analytics - Jisc Digital Festival 2015
Good practice in learning analytics - Jisc Digital Festival 2015Jisc
 
Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Jisc
 
Transnational education: conversations for success - Jisc Digital Festival 2015
Transnational education: conversations for success - Jisc Digital Festival 2015Transnational education: conversations for success - Jisc Digital Festival 2015
Transnational education: conversations for success - Jisc Digital Festival 2015Jisc
 
Tracking research and research systems
Tracking research and research systemsTracking research and research systems
Tracking research and research systemsJisc
 
Closing plenary - John Wilkin and David Maguire
Closing plenary - John Wilkin and David MaguireClosing plenary - John Wilkin and David Maguire
Closing plenary - John Wilkin and David MaguireJisc
 
Jisc's international strategy
Jisc's international strategyJisc's international strategy
Jisc's international strategyJisc
 
UCISA digital capability survey 2017
UCISA digital capability survey 2017UCISA digital capability survey 2017
UCISA digital capability survey 2017Jisc
 
Working with other sectors
Working with other sectorsWorking with other sectors
Working with other sectorsJisc
 

Mais procurados (20)

Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
 
The Kent PSN, govroam and HSCN
The Kent PSN, govroam and HSCNThe Kent PSN, govroam and HSCN
The Kent PSN, govroam and HSCN
 
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issues
 
Collaboration through technology: moving from possibility to practice
Collaboration through technology: moving from possibility to practiceCollaboration through technology: moving from possibility to practice
Collaboration through technology: moving from possibility to practice
 
Directions in research data management - Jisc Digital Festival 2015
Directions in research data management - Jisc Digital Festival 2015Directions in research data management - Jisc Digital Festival 2015
Directions in research data management - Jisc Digital Festival 2015
 
Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016
 
Something amazing from the University Library - libraries and research workin...
Something amazing from the University Library - libraries and research workin...Something amazing from the University Library - libraries and research workin...
Something amazing from the University Library - libraries and research workin...
 
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
 
Parallel session: communications services
Parallel session: communications servicesParallel session: communications services
Parallel session: communications services
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...
 
Good practice in learning analytics - Jisc Digital Festival 2015
Good practice in learning analytics - Jisc Digital Festival 2015Good practice in learning analytics - Jisc Digital Festival 2015
Good practice in learning analytics - Jisc Digital Festival 2015
 
Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...
 
Transnational education: conversations for success - Jisc Digital Festival 2015
Transnational education: conversations for success - Jisc Digital Festival 2015Transnational education: conversations for success - Jisc Digital Festival 2015
Transnational education: conversations for success - Jisc Digital Festival 2015
 
Tracking research and research systems
Tracking research and research systemsTracking research and research systems
Tracking research and research systems
 
Closing plenary - John Wilkin and David Maguire
Closing plenary - John Wilkin and David MaguireClosing plenary - John Wilkin and David Maguire
Closing plenary - John Wilkin and David Maguire
 
Jisc's international strategy
Jisc's international strategyJisc's international strategy
Jisc's international strategy
 
UCISA digital capability survey 2017
UCISA digital capability survey 2017UCISA digital capability survey 2017
UCISA digital capability survey 2017
 
Working with other sectors
Working with other sectorsWorking with other sectors
Working with other sectors
 

Destaque

Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44Jisc
 
Jisc update janet6 upgrade networkshop44
Jisc update janet6 upgrade   networkshop44Jisc update janet6 upgrade   networkshop44
Jisc update janet6 upgrade networkshop44Jisc
 
Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Jisc
 
Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Jisc
 
Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Jisc
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44Jisc
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Jisc
 
End to end performance networkshop44
End to end performance   networkshop44End to end performance   networkshop44
End to end performance networkshop44Jisc
 
Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Jisc
 
Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Jisc
 
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Jisc
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Jisc
 
Hyper efficient data centres – key ingredient intelligence networkshop44
Hyper efficient data centres – key ingredient intelligence   networkshop44Hyper efficient data centres – key ingredient intelligence   networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44Jisc
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
Dev ops, noops or hypeops - Networkshop44
Dev ops, noops or hypeops -  Networkshop44Dev ops, noops or hypeops -  Networkshop44
Dev ops, noops or hypeops - Networkshop44Jisc
 
Tv white space reusing old spectrum in innovative ways - Networkshop44
Tv white space reusing old spectrum in innovative ways  - Networkshop44Tv white space reusing old spectrum in innovative ways  - Networkshop44
Tv white space reusing old spectrum in innovative ways - Networkshop44Jisc
 
Campus network refresh - Networkshop44
Campus network refresh -  Networkshop44Campus network refresh -  Networkshop44
Campus network refresh - Networkshop44Jisc
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Jisc
 
Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Jisc
 

Destaque (20)

Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44
 
Jisc update janet6 upgrade networkshop44
Jisc update janet6 upgrade   networkshop44Jisc update janet6 upgrade   networkshop44
Jisc update janet6 upgrade networkshop44
 
Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44
 
Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44
 
Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 
End to end performance networkshop44
End to end performance   networkshop44End to end performance   networkshop44
End to end performance networkshop44
 
Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44
 
Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016
 
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
 
Hyper efficient data centres – key ingredient intelligence networkshop44
Hyper efficient data centres – key ingredient intelligence   networkshop44Hyper efficient data centres – key ingredient intelligence   networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Dev ops, noops or hypeops - Networkshop44
Dev ops, noops or hypeops -  Networkshop44Dev ops, noops or hypeops -  Networkshop44
Dev ops, noops or hypeops - Networkshop44
 
Tv white space reusing old spectrum in innovative ways - Networkshop44
Tv white space reusing old spectrum in innovative ways  - Networkshop44Tv white space reusing old spectrum in innovative ways  - Networkshop44
Tv white space reusing old spectrum in innovative ways - Networkshop44
 
Campus network refresh - Networkshop44
Campus network refresh -  Networkshop44Campus network refresh -  Networkshop44
Campus network refresh - Networkshop44
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44
 
Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44
 

Semelhante a Jisc and janet network updates from network operations, operational services and strategic technologies

Understanding Prevent - the role of education in tackling radicalisation - Ji...
Understanding Prevent - the role of education in tackling radicalisation - Ji...Understanding Prevent - the role of education in tackling radicalisation - Ji...
Understanding Prevent - the role of education in tackling radicalisation - Ji...Jisc
 
Janet in a changing world
Janet in a changing world Janet in a changing world
Janet in a changing world Jisc
 
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Jisc
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkAPNIC
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44Jisc
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Jisc
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516Tony Evans
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingJisc
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...IRJET Journal
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETKaren Rose
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Mark Skilton
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 

Semelhante a Jisc and janet network updates from network operations, operational services and strategic technologies (20)

Understanding Prevent - the role of education in tackling radicalisation - Ji...
Understanding Prevent - the role of education in tackling radicalisation - Ji...Understanding Prevent - the role of education in tackling radicalisation - Ji...
Understanding Prevent - the role of education in tackling radicalisation - Ji...
 
Janet in a changing world
Janet in a changing world Janet in a changing world
Janet in a changing world
 
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current Work
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 

Mais de Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

Mais de Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Último

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Último (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Jisc and janet network updates from network operations, operational services and strategic technologies

  • 1. Jisc/Janet updates from Network Operations, Operational Services and StrategicTechnologies 23/03/2016 Janet Network DDoS experience
  • 2. Steve Kennett Head of operational services and Senior information risk owner, Jisc technologies 23/03/2016 Janet Network DDoS experience
  • 3. 23/03/2016 Janet Network DDoS experience Operational services
  • 4. 23/03/2016 Janet Network DDoS experience Janet Computer Incident ResponseTeam - CSIRT
  • 5. Janet Computer Security Incident ResponseTeam »Safeguarding your current and future computer security, with a primary function to monitor and resolve any security incidents that occur on the Janet network »Our mission is to create a secure environment to conduct your online activities. Our primary function is to monitor and resolve any security incidents that occur on the network, with specialists tracking a range of platforms, including Unix, Linux andWindows 23/03/2016 Janet Network DDoS experience
  • 6. Janet Computer Security Incident ResponseTeam »We work closely with our community to detect, report and investigate incidents that pose a threat to the security of our customers' information systems.We also investigate other forms of network abuse such as spam and copyright infringement »Due to the geographical scope of incidents, we assist national and international law enforcement agencies in their investigations, connecting them to our trusted contacts within the community 23/03/2016 Janet Network DDoS experience
  • 8. CSIRT – Cost benefits Costs: time to fix the breach, remove infection from computers, deal with questions, inform staff and students, time that systems are unavailable to staff and students, fines and compensation, business loss, reputational damage. » 12.5% of organisations using Janet avoid having one severe security breach annually due to the existence of CSIRT; » Using the figures in the BIS report and working with the Jisc SSU » £22.5 million 23/03/2016 Janet Network DDoS experience BIS report “2015 Information Security Breaches Survey” £1.46m to £3.14m Average cost to a business of its worst security breach of the year. £75k to £311k Large Small
  • 9. Programme of security activities »Information security management »ISO27001 »DDoS mitigation »Security X-ray »Cybersecurity intelligence »Vulnerability assessment »Phishing mitigation »Malware analysis »Digital forensics »Password managers »Web filtering 23/03/2016 Janet Network DDoS experience
  • 10. Scary but true 23/03/2016 Janet Network DDoS experience
  • 11. jisc.ac.uk Computer Security Incident ResponseTeam 23/03/2016 Janet Network DDoS experience 0300 999 2340 irt@csirt.ja.net Visit the Janet network CSIRT blog
  • 12. 23/03/2016 Janet Network DDoS experience Trust and identity
  • 13. Jisc trust and identity services eduroam » 372 members – increase of 14% and an increase of 18% in operational eduroam deployments to 277 organisations » Jisc customersencouragedto work with local authoritiesto increaseeduroam footprint UK Access Management Federation » Reached 1K members, now at 1,037 » Important for the ~400 Shib IdPs v2 to upgrade before end of support in July Assent » Working to develop and implement Moonshot technology into big infrastructure facilities as well as ‘everyday’ type services 23/03/2016 Janet Network DDoS experience
  • 14. Jisc trust and identity services Certificate service » S/MIME certificates for digitally signing and encrypting emails is coming this summer » High Assurance ExtendedValidation certs available for important / high profile websites Domain registry service (formally Naming service) » Online portal now available for managing all your .ac.uk domains. Contact domains@jisc.ac.uk to get access T&I Networkshop events: » Share and explore (BoF) – Wednesday @ 16:30 (room 2.219/2.220 (120)) » T&I parallel session –Thursday @ 09.15 (room 4.205/4.206 (120)) 23/03/2016 Janet Network DDoS experience
  • 15. 23/03/2016 Janet Network DDoS experience Shared data centre
  • 16. Shared data centre current status – 1.5MW »15 customers including anchor tenants »Pipeline of customers »160 racks (including 18 Jisc) and growing »Total power requirement 1.542MW Current status: 23/03/2016 Janet Network DDoS experience
  • 17. So where next? Shared data centre v2 »Geographically diverse »Anchor tenants in place › Universities of Liverpool, Leeds, Sheffield, and Sheffield Hallam University, as well as the N8 Research Partnership »Project moving quickly – aiming for service in place by Q3/Q4 2016 »Wednesday 23 March, Parallel sessions (11:30 - 12:45) 23/03/2016 Janet Network DDoS experience
  • 18. 23/03/2016 Janet Network DDoS experience Trans National Education -TNE
  • 19. Transnational education » Transnational education (TNE) is the provision of education for students based in a country other than the one in which the awarding institution is located Strategic importance 23/03/2016 Janet Network DDoS experience
  • 20. 23/03/2016 Janet Network DDoS experience Workshop to Raise Awareness of Prevent (WRAP)
  • 21. Workshop to Raise Awareness of Prevent (WRAP) »An understanding of the Prevent strategy and your role within it »The ability to use existing expertise and professional judgment to recognise the vulnerable individuals who may need support »Local safeguarding and referral mechanisms and people to contact for further help and advice »This workshop is an introduction to the Prevent strategy, it does not cover wider institutional responsibilities under the duty WRAP is a free specialist workshop, designed by HM Government to give you: 23/03/2016 Janet Network DDoS experience
  • 22. Workshop to Raise Awareness of Prevent (WRAP) »Facilitated online learning, no travel required »Delivered by our award winning training team »Highly participatory sessions »Share best practice across the sectors and nationwide »Information and registration at jisc.ac.uk/advice/training 23/03/2016 Janet Network DDoS experience
  • 23. Workshop to Raise Awareness of Prevent (WRAP) » We are currently running four sessions per week » Sessions currently available to book for March - May » Number of sessions run to date: 104 and 25 scheduled for March/April » Total delegates completed courses: 1575 » HE: 39% » FE/Skills: 56% » Others: 5% » Broad mix of participants including participation from » Student Union/councils, senior management, governors (e.g. Principle, IT Director, Director student services, tutors and support staff) 23/03/2016 Janet Network DDoS experience
  • 24. 23/03/2016 Janet Network DDoS experience Operational services delivery group
  • 25. Service news and developments »Web Filtering Service - Updated › Updated to a cloud service August 2015 › Unlawful Extremist Content filter made available from Nov 2015 › User based filtering (Windows AD) now available »Framework – Available from mid-May › Multi-supplier, Multi-technology (Cloud, local and Hybrid), aggregated discounts, possible licensing discounts for existing installations Web Filtering and Monitoring 22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all) 25
  • 26. Cloud news and developments »Amazon have removed the egress charges for education and research users »Maximum egress discount is 15% of total bill – the average amount for egress charges is 5% and there is no cost to upload data into AWS, or move data betweenAmazon Simple Storage Service (Amazon S3) andAmazon ElasticCompute Cloud (Amazon EC2). Users of Arcus portal will benefit from the egress charge exemption »Further details on the Jisc website AmazonWeb Service 22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all) 26
  • 27. Vscene developments The service currently facilitates ~6000 conferences per month across 500+ educational organisations 3 phases ofVscene development: »a completely re-written customer interface (phase 1, completed July 2014) »a refresh of its underlying infrastructure (phase 2, completesAugust 2016) »a re-procurement ofVscene operational support (phase 3, starting April 2016) 23/03/2016 Janet Network DDoS experience
  • 28. Vscene developments The new infrastructure: »Double the current capacity to cope with ongoing increasing domestic and international demand »Give the flexibility to burst into cloud capacity to ensure responsiveness of provision and minimise costs »Increased interoperability with desktop users with introduction ofWebRTC and Skype for business capability »Support theTNE by enhancing communications between home and foreign campuses of UK universities, e.g. a pilot between Nottingham and China 23/03/2016 Janet Network DDoS experience
  • 29. Vscene developments Proposed future enhancements: »Support for mobile devices (Smartphones &Tablets) »Text chat capability »VLE integration 23/03/2016 Janet Network DDoS experience
  • 30. ISO 9001:2008 & 9001:2015 Quality Update › Maintenance of ISO9001 certification since 1998 › The standard focuses on our products and services and currently covers our network and associated services › A full certificate renewal audit (to ISO9001:2008) is taking place at the end of April 2016 › Work is already underway to align our quality management system to ISO9001:2015 with a plan to transition to ISO9001:2015 late 2016 › Discussions underway around how to expand our quality management system across the whole organisation 22/03/2016 Operational Services
  • 31. ) ISO 27001:2013 Information Security Update › Project started August 2014 to implement and gain certification against ISO27001:2013 (information security) › Initial scope and certification looks at Eduroam(UK), Janet Certificate Service, UK Access Management Federation and Jisc Assent › Stage 1 audit with certification body scheduled for March 2016 (first part of the formal certification process) › Work is already underway to bring additional services into our certification scope post successful completion of our stage 2 audit › Additional discussions underway around how to expand our information security management system across the whole organisation 22/03/2016 Operational Services
  • 32. jisc.ac.uk 22/03/2016 Title of presentation (Insert > Header & Footer > Slide > Footer > Apply to all) JiscTechnologies Steve Kennett Head of Operational Services steve.kennett@jisc.ac.uk

Notas do Editor

  1. Incident Handling Incident handling involves receiving, triaging,23 and responding to requests and reports, and analyzing incidents and events. Particular response activities can include • taking action to protect systems and networks affected or threatened by intruder activity • providing solutions and mitigation strategies from relevant advisories or alerts • looking for intruder activity on other parts of the network • filtering network traffic • rebuilding systems • patching or repairing systems • developing other response or workaround strategies
  2. 162 HEIs in the UK 300 FES organisations
  3. The sessions have also been attended by representatives from BIS and were also reviewed by Matthew Batton from The Home Office. The Home Office liked our approach to facilitated online learning and has since asked us to feature our online WRAP sessions in the forthcoming Prevent Training Catalog. Feedback from sessions has been very positive and there is high demand for courses, from all sectors and a varied audience including tutors, student welfare officers, College principles and members of safeguarding teams.
  4. Jisc sessions are useful for: Senior management Remote staff New starters Student council WRAP delivery is also available from local police and Regional HE/FE Co-ordinators, who also run a train the trainer programme.