ITAC Meeting Minutes
December 4, 2014
I. Announcements
January 8 – Research Computing symposium featuring speakers who use Research Computing, the Research Computing Service Model will be revealed and poster sessions featuring research at Duke leveraging Research computing infrastructure will be held.
II. Agenda Items
4:05 – 4:25 – Social Media – Are you a target? – Richard Biever, Phillip Batton (10 presentation, 10 discussion)
What it is: Security threats on social media continue to grow, and if you don’t know about them then you won’t be able to overcome these challenges. You may enjoy connecting with friends, relatives and other professionals on Facebook, Twitter and LinkedIn, but there are security risks you need to be aware of.
Why it’s relevant: We will discuss the security risk involved in using social media and discuss ways to limit those risks.
- Operation Cleaver – Iranian hacking group has attacked government agencies and campuses
- Operation Auroragold
- Why use social networking? Communication, sharing/collaboration, self-marketing, networking. However, these come at a cost. General Risks – Ownership of data, removing data, privacy of data, who can see the data?
- Snapchat: Transmits location, collects contact information
- Facebook – Did research on approximately 689,000 users and selectively posted
- The DEA used Facebook to track criminals.
- Living with social media: The information will be public, your data will be sold and used, you will be tracked (geo-location, cookies, and history), you are the product.
- How do users get copies of your data? Both Facebook and Google
- Disconnect.me is a tool that shows how you’re being tracked.
- Forget.me – only available to Europeans
- Ello.co is a social networking service that does not track, does not use adds, etc…..
Question: If a user selects no when prompted to use location services, does it minimize those risks?
Answer: Students – How much of what you’ve heard is a problem? I see it as a partnership
4:25 – 4:45 – New Trends in Payment Options – Richard Biever, Nick Tripp (10 presentation, 10 discussion)
What it is: With the increasing ease of on-the-go payments and single-click transactions, it is important to familiarize yourself with the payment technologies of the future.
Why it’s relevant: The IT Security Office will attempt to break down the many options available to consumers.
- In the past year many retailers were hit with data breaches the largest two being Target and Home Depot affecting approximately 100 million cards.
- There are 2 forms of chipped cards… Chip & PIN around the world, Chip & Signature in the United States
- NFC (Near Field Communication) Payments – They prevent credit card numbers from being used, and data can be secured. There are 2 implementations
1. Apple Pay – Uses Device ID + Transaction Code – Purchase data not tracked, Secured by TouchID
2. Google Wallet – Storing CC numbers, and uses a Virtual CC number + actual CC number, purchases are tracked, transactions are secured by PIN.
- Bitcoin – Completely secure by default, not widely adopted. Q – Is there any specific insight/wisdom about uses cards oversees? Call the bank and get a chipped card.
Question: What about PayPal?
Answer: If you use it, ensure multi-factor authentication.
4:45 – 5:00 – CIT Showcase – Shawn Miller (10 presentation, 5 discussion)
What it is: The Duke Center for Instructional Technology Showcase recently hosted a free one-day conference to celebrate creativity and innovation in using technology in education at Duke. The event featured many presentations and demonstrations by Duke faculty and staff.
Why it’s relevant: We will share outcomes from our evaluations and get feedback on recommendations for future Showcases.
- The CIT showcase is an annual event that is a chance for Duke faculty to share 242 attendees with over 100 participants responding. Approximately 42% were staff. Arts & Sciences and School of Medicine were in the greatest attendance. Over half were returning attendances with the most interest in technology in teaching/learning. Recording Playback – Michael Feldstein was the keynote speaker.
Question: What venue was used? Washington Duke Inn. We’ve previously used the Bryan Center and the Library, however those spaces have been renovated and/or are currently under construction and have proven to be more chaotic logistically. Comment: A CIT Showcase roadshow might help –
Question: Is anything recorded? We record the keynote, but statistically did not have very many views of the other content.
5:00 - 5:30 - Reception