Secure IT The Management Challenge John Woollard.

Slides:



Advertisements
Similar presentations
Digital Citizenship Scaffold
Advertisements

HIGHLIGHTS OF SCHOOL EDUCATION IN UNITED KINGDOM (U.K.)
PRESENTATION ON INTERNET PROFICIENCY SCHEME INTERNET SAFETY AT SCHOOL AND IN THE HOME Produced by Childnet International. Copyright 2003.
Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
Lesson Planning 1.
Computer Technology Timpview High School. A collection of local, regional, national, and international computer networks that are linked together to exchange.
Are you being a safe and successful digital citizen? E-safety
Hart District Acceptable Use Policy Acceptable Use Policy.
Let’s Talk About Cyber Security
In 1989, governments worldwide promised all children the same rights by adopting the UN Convention on the Rights of the Child (CRC).
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
More challenging behaviour Scenario 1: Defusing a conflict between pupils Behaviour Scenarios Resources to support Charlie Taylor’s Improving Teacher Training.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
 You must always get permission from a teacher before using the ICT System or accessing any information or application.  You must keep secret your personal.
E – Safety Awareness Parents Forum November 2012.
The Buzz Cyber Safety Curriculum and Strategies… Bradbury School April
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Riverside Community School District
Acceptable Use Policy Quiz Boston Public Schools Technology Awareness Initiative.
Factors to be taken into account when designing ICT Security Policies
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Are you being a safe and successful digital citizen?
Do you know how to keep yourself safe?
1-Experiential Learning The World Wide Web makes it possible for students to tackle a huge amount of human experience. In such a way, they can learn by.
MSTI 131 April 16, 2009 Kahley Stalteri, Alex Suto, Pete Balaji, Joey Yager, John Sullivan.
Second Grade Laptop Information Please sit at the table labeled with your child’s teacher’s name
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
Module 3 Developing A Classroom System. Developing a Classroom System So far we have discussed a major component of your system- procedures and routines.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
ACCEPTABLE USE POLICY by Donna Varney Manchester Education Partnership.
The 9 digital elements By : Rana Asaad Class : 6E.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Internet Safety Internet Safety LPM
Online Safety Parent Workshop Helping to keep your children safe online.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Using eTwinning to enhance your Comenius project today’s session will begin at 430pm please check that you will be able to hear us by clicking ‘Tools’
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
Preventing Bullying in Schools
Ms. Hall’s Technology Policy How we will ensure safe, proper, and equal use of technology for each student.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
Third Grade Parent Night Parent Information Meeting
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Support children & young people’s health and safety Unit 11.
Computer Literacy – Grade 8
Remember the rules of online safety.
Answer the questions to reveal the blocks and guess the picture.
Protecting your personal information and privacy
Digital Learning in Portree Primary School
Computer Literacy – Grade 8
Computer Security.
Rules To Help You Navigate the Internet Safely
Presentation transcript:

Secure IT The Management Challenge John Woollard

Securing a safe environment As ICT teachers we have a responsibility to ensure –the security and welfare of the children –the security and maintenance of the ICT equipment

Hardware protection put up security warning signs - it may work

Hardware protection label the equipment - you might get it back

Hardware protection lock the classroom doors when unattended - it helps

Hardware protection paint or deface the kit - no one would want it anyway

Hardware protection physically bolt, strap or tie the equipment to the work surfaces - so they can't take it

Hardware protection fit motion alarms for out-of-hours security - they can't carry as much if they are running away

Hardware protection put up security warning signs label the equipment lock the classroom doors when unattended paint or deface the kit physically bolt, strap or tie the equipment to the work surfaces fit motion alarms for out-of-hours security

The Internet the internet provides immense opportunities for our pupils. This is disquieting. In our lessons, the pupil is in an almost unique position to be able to, without physically moving from their seat, break the law.

The Internet The vast majority of our pupils do not want to break the law and are embarrassed or upset if they do. We have a duty to protect them.

The Internet There are a few pupils who will take every opportunity to maliciously and purposely do things that are wrong. We have a duty to persuade them or, failing that, stop them doing that.

The Internet When the law is broken in a school and the public find out the school is embarrassed. We have a duty to the pupils and our colleagues to ensure that it does not happen.

Preventing downloads –Gridwatch ( for reporting about NGfL pageshttp:// –Internet Service Providers Association ( –London Internet Exchange ( –Internet Watch Foundation ( 'rating' of internet pages.

Preventing downloads deny lists allow lists (the walled garden) filtering

Knowledge is security  do we know who is using the computer?  do we know what software is available to them?  do we know which software they have used?  did they use the internet?  what messages did they send?  what messages did they receive?  which pages did they visit?  what resources did they down load?  how long were they on the computer?

Securing the desktop Three approaches: –rebuild after every session –remember user profiles –total limits

Dealing with viruses  creating a policy;  presenting low-key sensible rules;  providing 24 hour protection;  being prepared;  raising awareness;  suppressing the hoaxes.

In conclusion  security has three aspects:  the physical location of our computers and equipment;  the software protection (both the desktop and virus) and  the people aspect, protecting them from inappropriate material and stopping them doing inappropriate things.