student account ecs-id user’s guidecomputer viruses harmful computer programs that can be...

19
Student Account ECS-ID User’s Guide Institute for Information Management and Communication (IIMC) Kyoto University http://www.iimc.kyoto-u.ac.jp/ April 1 , 2014

Upload: others

Post on 27-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Student Account ECS-ID

User’s Guide

Institute for Information Management and Communication (IIMC)

Kyoto University

http://www.iimc.kyoto-u.ac.jp/

April 1 , 2014

Page 2: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Contents

� Purpose of Today’s Lecture

� Take the e-Learning course on information security

� On Student Account (ECS-ID)� Procedures relating ECS-ID

� Notice of using ECS-ID

� Important Reminders around using computers and the internet

� IT services for students� Common portal for all students

� KUINS: the university-wide computer network system of Kyoto university

� KUMOI: Mail Service for Students and Researchers

� PandA: Cource Management System

� Open Course Ware

� PC terminals and Regulations

2

Purpose of Today’s Lecture

� Student Account ECS-ID is an account so as to access the IT services provided by the university.

� This talk will provide� Your entitlement and responsibilities to use

services for computers and the net in Kyoto University.

� an overview of the services using ECS-ID and relating procedures.

� as well as potential problems that may arise in a network environment and what your responsibilities are.

3

Page 3: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Request to Users:Take the E-Learning Course on Information Security

� Reinforcement of topics covered today

� Take the course within a month

� If you don’t complete it, available services may be restricted.

� How to access: click on e-learningicon on PC desktop

� Or, from your home/laboratory, access the following site:

http://www.iimc.kyoto-u.ac.jp/en/services/ismo/e-Learning/

4

On Student Account (ECS-ID)

Page 4: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Activation of ECS-ID

� ECS-ID is informed by document “Notification of Student

Account” handed from your school when you enroll.� Your ECS-ID, activation key and its expiration date are described in it.

� Activate your ECS-ID to start usage. � First, you should activate your ECS-ID to use IT services.

� Activation Key is used only for activation of your ECS-ID.

� The activation should be completed until key expiration date.

� For the activation, you need to access next web site;

https://ecs.iimc.kyoto-u.ac.jp/

• You can activate with your mobile phone.

• Also you can use a PC in OSL and your home.

• In the site, you can change password and forwarding

e-mail address, and confirm registration information.

6

Procedures relating ECS-ID

� If you� forget your ECS-ID and/or Password or,

want to alter registration information,

Visit our helpdesk (1st Floor of South Building of ACCMS) with

your student IC card or non-regular identification (made of paper) from educational staff of your department.

� want to get “Notification of Student Account”, because you don’t get it yet.

Visit the educational staff of your department or our helpdesk (1st

Floor of South Building of ACCMS).

� need to know FAQ (frequently asked questions) on ECS-ID .

Access the following site of Integrated Authentication Center;

http://www.iimc.kyoto-u.ac.jp/en/services/cert/

7

Page 5: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Why Do I Need an ECS-ID?

� The PCs of the Educational ComputerSystem are used by many individuals.� In most cases, a user uses a different PC

each time he/she logs on.

� But it is preferable to have access tothe same user ‘environment’ regardlessof the PC being used. � When a user relays his/her user information

to the server and PC, that user’s ‘environment’ (settings, files) areretrieved from the server

and displayed via the network.

� ECS-ID [a0xxxxxx] – the information thatidentifies a user to the system.

� Along with your ECS-ID, typing in your password (which only you should know) proves that you are the user to whom the ID was assigned .

8

Server

PC

PC

PC

User’s files

Safeguarding Your ECS-ID &

Password� What can happen when someone else uses your ECS-ID for

malicious purposes:� He/she may read, alter or delete your e-mail and/or personal files.

� He/she may send malicious e-mails using your name.

� He/she may attempt unauthorized access of other computers.

� Important! Safeguard your ECS-ID and password.� Do not let anyone else use your ECS-ID, and do not use anyone else’s

ECS-ID.• Acts of unauthorized use of a user’s ID are prohibited by the Unauthorized Computer

Access Law, and may be punishable by law

• Keep your password an absolute secret.

• Do not tell anyone your ECS-ID unless absolutely necessary.

� Do not leave computer unattended while you are logged in.

� Create a password that is difficult to guess in the right way.• Memorize your password but do not write it down.

(The memo could easily be lost; mobile phones are often left behind as well.)

9

Page 6: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

How to Choose a Password

� Examples of bad passwords:

A7U8, JKUEDL, TYamada, 19850401, Tigers

� Your password should be at least 8 characters long, and contain upper-case and lower-case letters and numbers

� Avoid using common words in your password

� You could become the victim of dictionary-based password cracking

� Create a unique password that you can easily recallEx. i4i2TH42th (� “Eye for eye, tooth for tooth”)

Even though the password may appear meaningless at first glance, with repeated typing your fingers will memorize it.

Caution! The above example is no longer a good password because everyone in this room now knows it!

10

Important Reminders around

using computers and the internet

Page 7: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Build Attitudes toward Troubles

� Issues related the internet use

� Potential contact with a variety of people in a variety of ways.• Not a closed environment created for you alone.

� real-world problems that are encountered in the network environment as well.

• e.g. Fraud, threats, demagoguery …

� Your attitudes

� Should you encounter a problem, remain calm and use common sense. Avoid acting or responding in haste.

� Consult a specialist for advice.

� Exercise caution whenever linked to a network.

� Issues requiring special caution.

� Protection of personal information

� Copyright and intellectual property rights

� Information security (ex. computer viruses)

12

Computer Viruses - Important Reminders (1)

� Computer Viruses� Harmful computer programs that can be transmitted via e-mail

file attachments, the Web, etc.

� Viruses can also be spread via USB flash memory sticks and other file transfer methods.

� You are not the only person affected – the damage can spread to other users as well.

� Anti-Virus Measures (taken by IIMC)� PCs installed with anti-virus software

� Software updates

� Viruses deleted from e-mails

� However, even these measures aren’t perfect! � Careless actions increase the danger of infection.

13

Page 8: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Computer Viruses - Important Reminders (2)

� All users:

� Please do not open suspicious e-mails.

� Do not open e-mail attachments that you do not recognize.

� Do not open/download files from unknown sources. • “Freeware” can be especially dangerous

� Do not access suspicious web sites or links.

� Recommended for PC owners

� Install and update anti-virus software.

� Update other software (Windows and Macintosh OS, Office).

14

To Prevent Copyright Infringement

� The following rules must be complied

� Obtain and use only the genuine and legitimate software under the coverage of the license agreement

� Do not make unauthorized copies violating the license

� Do not redistribute unauthorized copies of software

� Do not make copyrighted material available on the Web without the permission of the copyright owner

� Do not download illegally distributed music and videos

� Copyright infringement constitutes a crime

� Status of residence for foreign students may be revoked

15

Page 9: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Do Not Use P2P File Exchange Software

� What is P2P file exchange software?� P2P file exchange software is widely used for sharing files among

anonymous and unidentified users

� Kyoto University prohibits use of the P2P file exchange software to prevent copyright infringement over KUINS

� Do not use P2P file exchange software on KUINS� This prohibition includes remote non-campus use (e.g., via PPTP service)

� You will be warned under Kyoto University information security policies if detected by KUINS security monitoring system

� Well-known P2P file exchange software� Winny、BitTorrent、BitComet、Share、LimeWire、Cabos、Xunlei

16

IT Services for Students

Page 10: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Information Services using ECS-ID

� Common portal for all students: Integrated Access Window to the KULASIS, MyKULINE, KUMOI, Information Security e-Learning, PandA(LMS)

https://student.iimc.kyoto-u.ac.jp/

� Individual Service including above portal is available by following URL.� KULASIS: registration of liberal arts subjects

https://www.k.kyoto-u.ac.jp/

� KUMOI: Kyoto University Mail for Students and Researchers

https://mail.st.kyoto-u.ac.jp/

� Information Security e-Learning: You must learn

http://www.iimc.kyoto-u.ac.jp/en/services/ismo/e-Learning/

� PandA: Learning Management System for Lectures

https://panda.ecs.kyoto-u.ac.jp/

� KULINE: online service of the Library

http://kuline.kulib.kyoto-u.ac.jp/

� The automatic certificate-issuing machine (password only)

� OSL PC Terminal, CALL system Terminal

� KUINS VPN connection� University Wi-Fi(MIAKO Net) & Access tool from off-campus(i.e.PPTP protocol)

18

Click on portal icon on PC desktop

Kyoto University Integrated Information Network System(KUINS)

� “KUINS (Kyoto University Integrated information Network System)” is the university-wide computer network system of Kyoto university.

� KUINS covers the whole of university, not only the main campuses such

as Yoshida, Uji and Katsura, but also remote institutes located

throughout Japan.

19

Network outside Network outside Network outside Network outside

universityuniversityuniversityuniversity

・・・・The InternetThe InternetThe InternetThe Internet

Network outside Network outside Network outside Network outside

universityuniversityuniversityuniversity

・・・・The InternetThe InternetThe InternetThe Internet

KUINS

YoshidaCampus

Facilities in remote areas

Communication

Router

Router

Router

Router

Firewall

Firewall

Firewall

Firewall

Uji Campus Katsura Campus

Page 11: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Main services provided by KUINS

� Network connection using Ethernet plugs (LAN ports) inside campus.� To use Ethernet plugs, you need to get permission from the faculty staff who is

responsible for the room containing that plug.

� Connection from off-campus via VPN (Virtual Private Network) � Using VPN connection, you can use limited services (e.g. accessing

e-journals or homepages accessible only to university members) from outside campus. ECS-ID is used for authentication.

� We provide several connection methods (such as PPTP and SSHport-forwarding).

� Connection by campus wireless LAN (MIAKO-NET,eduroam)

� About 900 wireless LAN access points are located at public spaces. These access points are available for university members who have authentication IDs (such as ECS-ID or SPS-ID).

� VPN connection is required for using wireless connection(details are given in the next page).

20

Ethernet plug

Access point of

wireless LAN

Example of connection via campus wireless LAN

� You first access the VPN server via a wireless LAN access point.

After authenticating at the server, you can access the Internet.

21

② Connect to the VPN server

⑤ Access the Internet

③ Authenticate by ECS-ID

To use our services, you need to set up your PC, but this is not so difficult. Please refer to the “Information Environment Manual for Student” or KUINS homepage (http://www.kuins.kyoto-u.ac.jp/ja/index.php) for details.

① Connect to the access point

Internet

VPN(PPTP) Server

MIAKO-NETaccess point

PC,Tablet PC

Example)Access to the Internet via the wireless LAN access point (MIAKO-NET)

④ Authentication success

Page 12: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Kyoto University Mail for Students and Researchers

KUMOI?

� Kyoto University Mail clOud Interface

22

Cloud Service

of Microsoft

Mailbox: 50GB

Calendar

Active

How to use E-Mail Services

� Your E-Mail address:

� You can confirm your E-Mail addressvia the “Notification of Student Account” .

Or, following URL: https://ecs.iimc.kyoto-u.ac.jp/

� Getting Started

� Click the link on Common Portal for All Students(https://student.iimc.kyoto-u.ac.jp/) or access login system (https://mail.st.kyoto-u.ac.jp/).• There is shortcut icon on Educational Computer System’s PC desktop.

� Login with your ECS-ID and the password.

� You can receive important message from Kyoto University, if you forward received messages with Student Mail to your mobile phone or usual mail.

23

Page 13: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Request to Users:

Please Follow E-Mail Etiquette

� Mobile phone e-mail users: please pay special caution

� The e-mails a user writes should be befitting a student of Kyoto University � Clearly state the subject of your e-mail

� Indicate your address and name at the top of the mail

� Clarify what it is you are writing about (quote from previous e-mails as needed)

� Make sure your writing is easy-to-read and well organized; use line breaks for easier reading

� Avoid attaching large files• generally 5 MB is the limit

24

Subject: Apology for missing items in

report

Professor AA:

This is CC (Student ID XXXXXX) in

Department BB.

I would like to apologize for the report

on XX which I submitted on 4/20.

> Graphs 4 & 5 concerning the data

from your experiment are missing.

As you pointed out, two graphs were

left out of the report; I am attaching

them now.

Request to Users:

Check Your E-Mail

� Important notification will be sent by E-Mail.

� Personal message

� Emergence contact

� Check Your E-Mail Regularly.

� Once a day

� Before you come to University

25

Page 14: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Course Management System

‘PandA’

� What’s PandA? Panda is a web system used

for, e.g.,

� Distribution of course materials

� Submission of course

assignments

� Test and Quiz in class

� The nickname ‘PandA’ is give as an

abbreviation of ‘People and Academe’ based

on the concept of “Environment for

Awareness and Learning”.

26

Usage of PandA

� Instructors of courses will open course

worksites on PandA if they need to use it.

� With the following workflow, you start to

use PandA course sites.

27

KULASIS

Course Registration

Instructor opens

a PandA course site

You are registered the PandAcouse site automatically

KULASIS

Course Registration

Instructor opens a PandA

course site, and register you.

You join the PandAcourse site

Page 15: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

What is Kyoto University Open Course Ware?

� Kyoto University Open Course Ware (OCW) is the website which is sending out the information on the lecture notes and lecture videos achieved in the university to inside people and outside people.

� You can access the following URL:http://ocw.kyoto-u.ac.jp/ (All videos are free!!)

� What are the merits of utilizing Kyoto University OCW:

① When attending a class, you can do pre-study and can get deep understanding.

② Convenient tool to prepare for examination.

③ You can watch lectures with which the timetable has overlapped.

④ You can find out lectures and lecturers that would fit your interest.

28

Kyoto University Open Course

Ware Contents

29

The message from people representing Japan and the world to Kyoto Univ. students.

You can know and understanding cutting edge research activities that

are changing the world.

Final lectures by distinguished professors will tell you Why did professors become a

researcher? What kind of research has been done?

Daw Ayng San Suu Kyi「Socio-Political Change in Recent Burma and Women's Participation in It」

By studying English at an English lecture, hold the flow in the world where globalization progresses.

Novel Prize WinnerProf. Shinya Yamanaka

High school student special lecture “Kyoto Prizes high school forum” - Inscrutable are the ways of Heaven -

Prof. Eriko Kawai“Business English IV : Introduction to Finance”

Faculty of EconomicsProf. Hideo Tanaka

(My 40 years researchfor History of Social Thought : ScottishEnlightenment and

Republicanism)

Graduate School for BusinessLecturer. Ken Watanabe “Entertainment business management”

Contact:[email protected]

Page 16: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

PC Services

� Approximately 1400 PCs in 30 locations across campus (see handbook [Information Environment Manual for Students] for map of locations)

� Classrooms (Media Center), Satellite Learning Centers

� OSL (Open Space Laboratory) - PCs available for self-study

(Media Center [South Building & North Building], Kyoto University Library, Yoshida-South Library, B Cluster Funai Center E study room)

� Windows 7� E-mail, World Wide Web

� Word, Excel, PowerPoint

� Linux Environment

� Programming Environment

� Printers

30

OSL & Satellite Laboratory

� Media Center South Building OSL hours: 10:00~20:00� Also open Saturdays 10:00~18:00.

� Concerning open hours of Satellite Laboratories, please consult individual faculties.

� No Smoking.

No Food or Drink.

� Please handle learning materials and devices with care.

� We will supply paper and toner cartridges, but users must refill paper and change toner when needed.� Please refer to accompanying poster when changing toner

� Please report computer and printer problems to TAs at Media Center South Building OSL.

31

OSL & Satellite Learning Centers

Page 17: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

CALL System

� A language learning system using personal

computers

� A wealth of original CALL materials at Kyoto University

� CALL classrooms� Academic Center for Computing and Media

Studies, South Bldg (3rd floor CALL rooms)

� Yoshida-South Campus Academic Center Bldg

� PCs for language study available� Some of the CALL materials are available for

self-study in OSLs. (Media Center [South Bldg] etc.).

� Headphones are required to listen to the audio.

32

Regulations on Printing

� Limit on printing:

� Maximum 200 pages per year.

� If you exceed your limit, you will not be able to print (even during classes), so conserve

and print wisely.

� For printing needs that exceed the above limit, color printing and A3 size printing, use

the pay-per-print printers in Kyoto University Co-op (Yoshida shop, Clock Tower Co-op

shop).

� To check your usage, click on the screen icon on PC desktop.

� Please conserve! See hints for efficient printing at our web site.

� Show consideration for other users.

� Each user allowed 300 MB for file storage.

� Please utilize external USB memory media for additional storage needs.

� CD/DVD writing is not available. Floppy disk drives is not available.

33

Page 18: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Request to Users:

Use Self-Help Troubleshooting Methods

� Should you encounter a problem a PC of the Educational Computer System or pre-installed software, please try to manage the problem on your own.� Refer to the 「Information Environment Manual for Students」 Handbook

� See the FAQ (Frequently Asked Questions) posted on the website for the Educational Computer System

� PC Help Menu

� Search other sites (ex., Google, Yahoo) for hints/solutions

� If you are unable to solve the problem using the methods above, consult one of the Teaching Assistants in the OSL.

� If you forget your ECS-ID or password, visit the Media Center Office South Bldg (1st floor) with you student ID.

34

Page 19: Student Account ECS-ID User’s GuideComputer Viruses Harmful computer programs that can be transmitted via e-mail file attachments, the Web, etc. Viruses can also be spread via USB

Thank you for listening

Please follow the instructions for completing

today’s registration procedures.

If you have any questions, please do not

hesitate to ask.