skip to main content
10.1145/1181216.1181273acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article

The [216:1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies

Published: 05 November 2006 Publication History

Abstract

Philadelphia University has developed radically as an entity since 1992. In 2002-2003, the University technology infrastructure was forced to evolve in response to selective pressure from a series of catastrophic worm (Blaster, Nachi, Sasser) incidents that crippled the network. In response, new technologies were deployed to protect the students, faculty and staff. The University became more agile and innovative with its technologies and is able to do more with less. The number of support incidents on the student network, along with specific types relating to viruses and spyware, has dropped exponentially. This is due to the implementation of various technologies and containment strategies outlined within the paper. Coupling these technologies with an active response team of six students, we are able to support the entire resident campus body (~1300 students). Thus emerges our ratio of 216 students to each student staffer. This paper represents a case study of the technologies and methodologies that enable an optimized support structure in the wake of forced evolution.

References

[1]
Knowles, Dogulas, Federic Perriot, and Peter Szor. "W32.Blaster.Worm." Symantec Security Response - W32.Blaster.Worm. Symantec. http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.html.
[2]
Sophos. "W32/Nachi-A." Sophos Virus Analysis: W32/Nachi-A. http://www.sophos.com/virusinfo/analyses/w32nachia.html.
[3]
Microsoft Corporation. "Software Update Services Overview White Paper." Software Update Services. http://www.microsoft.com/windowsserversystem/updateservices/evaluation/previous/susoverview.mspx
[4]
Ben, Aguliluz, and Sean Bently. "Microsoft Windows Server Update Services Overview." Microsoft Windows Server Update Services Overview. Microsoft. http://www.microsoft.com/downloads/details.aspx?FamilyId=2478D594-A29C-483C-9DC1-9740BF3081A5&displaylang=en.
[5]
Microsoft. "You may experience problems in Windows Explorer or in the Windows shell after you install security update MS06-015." You may experience problems in Windows Explorer or in the Windows shell after you install security update MS06-015. http://support.microsoft.com/kb/918165/en-us.
[6]
McAfee. "McAfee VirusScan Enterprise 8.0i." McAfee VirusScan Enterprise 8.0i - Integrated Antivurs Intrusion Prevention. http://www.mcafee.com/us/enterprise/products/anti_virus/file_servers_desktops/virusscan_enterprise_80i.html.
[7]
McAfee. "McAfee ePolicy Orchestrator." McAfee ePolicy Orchestrator - Centralized policy Enforcement and Reporting. http://www.mcafee.com/us/enterprise/products/system_security_management/epolicy_orchestrator.html.
[8]
Ovid, Metamorphoses 12.453
[9]
Tufts University. "The Life and Times of Hercules." The Life and Times of Hercules. http://www.perseus.tufts.edu/Herakles/bio.html.
[10]
Jeff Reed, Classic Networking CEO, interview by Author, Philadelphia, Pennsylvania, 19 May 2006
[11]
Bradford Networks. "Bradford Campus Manager's NAC OS (Network Access Control Operating System)." Bradford Networks. http://www.bradfordnetworks.com/products/overview.html. *At Philadelphia University, we are using the Network Sentry 8200 software version 2.6.
[12]
"Security Management Application." Bradford Networks Security Management Application. http://www.bradfordnetworks.com/products/security.html.
[13]
Classic Networking. "Client Assessment Tool." Client Assessment Tool. http://www.clientassessmenttool.com/.
[14]
Kerry Fretz, Network Engineer, Philadelphia University, interview by Author, Philadelphia, Pennsylvania, 19 May 2006
[15]
Cisco PIX Security Applications. Cisco Systems. http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/index.html.
[16]
Packeteer. "Packet Shaper." Packeteer Packetshaper. http://www.packeteer.com/products/packetshaper/.
[17]
Barracuda Networks. "Spam Firewall Overview." Spam Firewall Overview. http://www.barracudanetworks.com/ns/products/spam_overview.php
[18]
McAfee. "McAfee GroupShield for Microsoft Exchange 2000/2003." McAfee GroupShield for Microsoft Exchange. http://www.mcafee.com/us/enterprise/products/anti_virus/email_servers/groupshield_microsoft_exchange.html.
[19]
Microsoft Corporation. "Exchange Intelligent Message Filter: Exchange Intelligent Message Filter." Microsoft Exchange Server. http://www.microsoft.com/technet/prodtechnol/exchange/downloads/2003/imf/default.mspx
[20]
Adams, Douglas. "Dogulas Adam Quotes: Computers." Douglas Adams - Wiqiquote. Wikipedia. http://en.wikiquote.org/wiki/Douglas_Adams.
[21]
Wu, Feng, Bernardo A. Huberman, Lada A. Adamic, and Joshua R. Tyler. "Information Flow in Social Groups." HP Research: Information Flow in Social Groups. HP. http://www.hpl.hp.com/research/idl/papers/flow/flow.pdf.
[22]
CNN. "IM game spreads virulent ad-delivery software." Cnn.com IM game spreads virulent ad-delivery software. http://www.cnn.com/2004/TECH/internet/02/11/instantmessenger.ad.ap/index.html.
[23]
Keizer, Gregg. "IM Threats Growing 50% Per Month." IM Threats Growing by 50% Per Month. Information Week. http://www.informationweek.com/story/showArticle.jhtml?articleID=60407752.
[24]
Espiner, Tom. "Study: Instant-messaging attacks rose in 2005." Study: Instant-messaging attacks rose in 2005. CNet. http://news.com.com/Study+Instant-messaging+attacks+rose+in+2005/2100-7349_3-6025226.html.
[25]
Hines, Matt. "IM threats rising sharply, reports confirm." IM threats rising sharply, reports confirm. CNet. http://news.com.com/IM+threats+rising+sharply%2C+reports+confirm/2100-7349_3-5655267.html?tag=st.ref.goo
[26]
About.com. "Cryopaedia: The Education of Cyrus." Xenophon - Cryopaedia Epilogue. http://ancienthistory.about.com/library/bl/bl_text_xenophon_cryopedia_epi.htm.
[27]
Numara. "Numara Track-It 7." Numara Track-It 7. http://itsolutions.intuit.com/Track-It.asp.
[28]

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGUCCS '06: Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries
November 2006
478 pages
ISBN:1595934383
DOI:10.1145/1181216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive networking
  2. adaptive support
  3. antivirus
  4. malware
  5. network access standardization
  6. network security
  7. personal computer security
  8. preventative computing
  9. remediation
  10. spyware
  11. updates
  12. virus

Qualifiers

  • Article

Conference

SIGUCCS Fall06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 192 of 261 submissions, 74%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 216
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media