Skip to Content
My MSU

Department of Information Science & Systems


Computer Lab Policies

INSS DEPARTMENT LABS

Specialized Lab GSBM 313: Network/Security Simulation Lab

Other Labs: GSBM 120, 216, 324, 417 and 425

Labs have Visual Studio, Microsoft Office, SAP, Visio, SPSS, and other specialized software.

Network/Security Simulation Lab

313, Earl Graves School of Business and Management

Hours of Operation: Monday - Friday 9 a.m. - 9 p.m.

313 Lab Outside

313 Network/Security Simulation Lab

There are twenty-four workstations with servers in the lab, along with a state-of-the-art high density plotter. Each workstation will be a dual boot server - with Windows Server and Linux booting capabilities. The lab will be used to meet two objectives: 1) train students on Networking and Security , 2) outreach capability to conduct workshops on Security for industry participants. Oracle 11g will be installed for the data layer tier, IIS as a web layer and SAP GUI will be installed for the application layer. SAP is hosted by California State University, Chico.

Security topics that students would be exposed to include: Malware Threats, Host Security, Protocol Analyzers, Network Vulnerabilities, Vulnerability Scanning, Certificate concepts, Application security, Access control, Authentication, Compliance and audits, Network Security routers and Protocol, Firewall, IPSec, Spam, DNS Poisoning, SNMP, iSCSI, Service management, patching, encryption - data and transport, backup, load balancing, Cloud computing, RAID, Clustering. The final design of the lab is still being worked out in terms of Routers, switches and communication devices.

Several courses will use the resources in the lab: INSS.391 IT Infrastructure and Security (a required course for the Information Science and Systems major), INSS.390 Enterprise Information Systems I (a required course for the Information Science and Systems major), INSS.380 Data and Information Management (a required course for the Information Science and Systems major), INSS.480 Advanced Data and Information Management (an elective course), INSS.494 Information Security and Risk Management (an elective course).

POLICIES

The labs is for your use. Please use all equipment with care.

  • No eating, or drinking in the labs.
  • The Networking and Security lab used by the department contain specialized and licensed software for use by Information Systems majors.
  • Users should ONLY use their assigned user name and password to access these machines.
  • At all times, please save data to your USB flash drives to assure security of your data.
  • Secure your user name and password to prevent unauthorized use of the software/data.
  • Change passwords as per university policy. Avoid using your name, your family member's name or friend's name or a password that can easily be guessed.
  • Do not leave terminals unattended without logging out. If a terminal is found that is not logged out you make user name and password available for unauthorized use. As a result, you are responsible for any damage and loss or data.
  • Do not engage in any activity that is an attempt to gain unauthorized access to privileged areas such as secure networks or crack encryption code.
  • Users are prohibited from loading any system without approval from the system administrator. All unauthorized software will be deleted.
  • Users are prohibited from using computers to make illegal copies of licensed or copyrighted software. Copyrighted software must only be used in accordance with its license or purchase agreement.
  • Users are prohibited from using software that is designed to destroy data, provide unauthorized access to the computer system or disrupt computing processes to any other way. Do not use software or disks that have been infected with a viruses. Report any unusual workstation performance to the lab assistant.
  • Users are prohibited from using these machines for transmitting fraudulent, harassing or obscene message and files. You must not send any message or e-mail by forging another identity or attempt to conceal the origin of the message in any other way.
  • Do not use computers to harass anyone. This includes the use of insulting, sexist, racist, obscene, or suggestive e-mail.
  • Users must not deliberately attempt to degrade or deface the computers in any way. Seek assistance to avoid damage to hardware and software.
  • All hardware is property of Morgan State University and must remain in the lab.
  • Avoid any activity around your workstation that may result in damage or disturbance.
  • Do not waste paper or workstation time or other resources. Please be considerate to your fellow students when you see them waiting to use the lab.