Netbooks, PDA and Phones Thread, Why iPads are not for the Enterprise in Technical; Originally Posted by alttab
with proper training of staff (that's the key bit), guidelines on usage for regular users and ...
22nd July 2012, 07:28 AM #106
Ahahahaahha users taking responcibility for themselves 'we didn't sign up to teach to fix X', 'we don't have time for that', 'student x has found a way around the - non-existant - lockdowns.
Originally Posted by alttab
Don't hide behind the infrastructure and AV stuff, there are still vunrabilities and malware for such devices and it is only getting worse. Sure you can outsource stuff to the 'cloud' so you don't have to do that hard clicking of buttons yourself but you still need a whole stack of infrastructure behind the scenes and a big internet link. What happens when some kid blackholes all the traffic with ARP poisoning? There's an app for that you know. Oh look there's that need for local managment again of the network if not the devices.
22nd July 2012, 01:46 PM #107
i take your point, but the threats from users using 1:1 devices as a tool to wreak havoc by launching such attacks is why for user-controlled or user owned devices which aren't under your control you'd already have implemented network segmentation - not saying the proliferation of these devices themselves don't create a need for additional infrastructure and i don't think for a minute you'd want to throw out any of the the existing windows infrastructure, but i don't think it needs to be the case that it has to be locked down to the nth degree or wholly managed which is the situation we've got after years of windows administration despite everything being under IT control and very little accommodation of BYOD - and which people seem to want out of Windows 8 tablets, which i just cannot fathom really. IT seems a rather expensive way of operating which netbooks already do at far cheaper cost.
Originally Posted by SYNACK
....plus users need to authenticate to your network first before they try and launch such nasties so there it's a clear case of inappropriate use...you wouldn't bother to have use policies if you could guarantee that no pupil could install unauthorised software or try and initiate a network attack from a pc. a linux liveCD and usb wifi dongles can also be used as weapons, i know the argument about disabling access to boot from Cd/DVD, network infrastructure lockdown mechanisms etc. are better rehearsed vs tablets and wifi connectivity....and to be fair i think that's still something people are working out and trying to get their heads around so as not to limit the potential of such devices without compromising security. mitigating risk from introducing idevices is just as important as is the case in the pc domain. The good thing about such internet-centric devices is that allowing internet only through a VLAN or VPN doesn't limit the devices as much because as you say so much of it is internet and cloud based anyway.
Last edited by alttab; 22nd July 2012 at 01:47 PM.
22nd July 2012, 02:01 PM #108
It depends on how much you lock down your current gear too, its not all about locking down but about preconfiguring stuff so that it just works. Isn't that the siren call, it must 'just work' otherwise it will 'compromise learning', blah, blah, blah... rubbish, rubbish, rubbish. If you can prestage everything so that it has the best chance of working off the bat then things do go smoother and you don't get as much of ICT being used as an excuse instead of a tool. Not all managment of devices is a bad un-nessisary thing desinged to pollute the environment with unfairly exerted power, a big chunk is to fix stuff before it 'breaks'. No matter how easy it is some users will always run to tech support about this problem that is 'not their job' that they have 'no time' to look into themselves - despite wasting more time winging about it than it woud take to look it up and fix it.
Originally Posted by alttab
Document templates, report writing tools, SMS systems are all templated handeling of inputs as not every user can do it by themselves. The managment tools for an OS can also be seen as this, they take care of the little things so that even those that can't are able to get good results. Apples version is simply removing choice and givving you a happy little groupthink world that is vaguely customisable where the hammer dictates the builder rather than the builder dictating the hammer.
How does it go, any user that can be replaced by a small shell script...
3rd August 2012, 03:46 PM #109
By sujonbappi in forum Internet Related/Filtering/Firewall
Last Post: 14th October 2011, 01:57 AM
By aerospacemango in forum Jokes/Interweb Things
Last Post: 23rd September 2011, 09:14 AM
By laserblazer in forum Jokes/Interweb Things
Last Post: 26th August 2011, 08:58 AM
By DaveP in forum General Chat
Last Post: 7th January 2011, 07:52 AM
By DaveP in forum IT News
Last Post: 15th October 2009, 06:41 PM
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)