Ireland’s Schools Network: Delivering a Safer Online Environment for Irish Schools? Presentation to TERENA Networking Conference 2007 by Ronan Byrne, HEAnet.

Slides:



Advertisements
Similar presentations
Using the Self Service BMC Helpdesk
Advertisements

Action Research Not traditional educational research often research tests theory not practical Teacher research in classrooms and/or schools/districts.
Bridging Research, Information and Culture An Initiative of the Research and Planning Group for California Community Colleges Your Name Your Institution.
International Conference on Establishment Surveys 1 Everything you wanted to know about Electronic Data Reporting (EDR) at Statistics Canada June 2007.
Influenza Vaccine Surveillance System Pilot Project Pandemic Influenza Vaccine: Doses Administered and Safety Training Conference Atlanta, GA—Aug. 22,
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
ESS Mixed mode experiment ESRA Conference, Ljubljana, July 2013 Alun 18 July 2013.
HEAnet & The Schools Network Presentation to HEAnet National Networking Conference by Ronan Byrne & Tim Maher 10 th November 2005.
7.Implications for Analysis: Parent/Youth Survey Data.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Summary of Key Results from the 2012/2013 Survey of Visa Applicants Who Used a Licensed Adviser Undertaken by Premium Research Prepared: July 2013.
A Crawler-based Study of Spyware on the Web Author: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, Henry M.Levy Presented At: NDSS, 2006 Prepared.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
Unconstrained Endpoint Profiling (Googling the Internet)‏ Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Department Of Computer Engineering
Securing Schools Firewalling and Filtering on the Broadband for Schools Network. Liam Kennedy Network Engineer HEAnet Ltd.
RESEARCH QUESTIONS, AIMS AND OBJECTIVES
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Choosing Your Primary Research Method What do you need to find out that your literature did not provide?
1 Classroom-Based Research: How to Be a Researcher in Your Classroom Basic Skills Initiative Teaching and Learning Workshop October 2009 Darla M. Cooper.
Improving Management Effectiveness HR Chally Employee selection tool.
TalkTalk network security overview 14 th April 2011.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Summary of Key Results from the 2013/2014 Survey of Visa Applicants Who Used a Licensed Adviser Survey undertaken by: Premium Research Report prepared:
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Stuart Hollis Where are we now? An exploration of the provision of teacher training programmes for the Learning and Skills Sector following the 2007 Workforce.
1 Final Version© Ipsos MORI Final Version Evaluation of Adult Cancer Aftercare Services Quantitative and Qualitative Service Evaluation for NHS Improvement.
EPSINet Conference Athens 14 th January mepsir Athens 14 th January 2005 mepsir Measuring European Public Sector Information Resources Project won.
Value of licensing survey Presentation May Introduction One of the key areas of strategic focus for the Authority is: “The perceived value of immigration.
BECTa ICT Research Conference – June 2002 Intro  Survey Details  Secondary Surveys conducted July 2000 and June/July 2001  Sponsored by Fischer Family.
Progress monitoring. Progress Monitoring Create a common template for all of your general education teachers using Excel or another similar program Befriend.
ACSP Report – Review of Open Suggestions Nate Davis.
Security Services Agenda Overview of HEAnet security services HEAnet CERT (Computer Emergency Response) Anti-Spam RBL (Real time blacklist service) HEAnet.
INTERNET SAFETY Public Hearing  September 8, 2014.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Vantage Report 3.0 Product Sales Guide
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Encourage and Support University Teachers to Use ICT in Education Sonja Prišćan, Daliborka Pašić.
MyFloridaMarketPlace Vendor Performance Tracking Overview: Requestor Interface February 23, 2006.
1 1 Hosted Network Security EarthLink Complete™ Data.
Online & Radio A Media Conjunction Study July 2005.
A program of ITEST (Information Technology Experiences for Students and Teachers) funded by the National Science Foundation Lesson Plan Title: Subtitle.
Title Page programmemanagementsystem KPMD (IT Solutions) Ltd Blades Enterprise Centre, Bramall Lane, Sheffield S2 4SU, United Kingdom telephone: +44 (0)114.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Marie Reddan, Librarian NUI Galway. 15 Nov ‘07HEAnet Networking Conference 2007 Presentation Outline IReL background Funding Management Product selection.
NACEP Conference 2004 Capturing them in the Web: Using Web- Based Surveys to Increase Response Rates for College Freshman Debbie.
Because you need to protect your computers!!! By: Ashley Hubbard.
Safe Internet access through the Internet Service Provider accreditation scheme George Reubens Senior Manager Technical Evaluation and Assurance.
Chapter 15 Fieldwork and the Research Report. Copyright © Houghton Mifflin Company. All rights reserved.15 | 2 Chapter overview The chapter looks at the.
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom Copyright  2001 Stevens Institute of Technology, CIESE, All Rights Reserved.
Compliance Monitoring and Enforcement Audit Program - The Audit Process.
NetTech Solutions Protecting the Computer Lesson 10.
Just before we get started… Who are we? How questions will be handled Resources available after the webinar Key QILT Dates & the AGS Item Review 2.
An Introduction to NHS Evidence
Program Assessment User Session Experts (PAUSE) Information Sessions: RSS & Subscription Services October , 2006.
August 2002BioCoRE 2002 Survey1 D. Brandon, R. Brunner, K. Vandivort and G. Budescu August 2002.
Service Level Agreements White Paper - A Summary Quality of Service Task Force The Open Group Presented by: Jon Saperia
TEMPLATE DESIGN © The Collaborative Classroom Website: An Interactive Instructional Tool for the 21 st Century Michelle.
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
AUTHOR: NADIRAN TANYELI PRESENTER: SAMANTHA INSTRUCTOR: KATE CHEN DATE: MARCH 10, 2010 The Efficiency of Online English Language Instruction on Students’
Component D: Activity D.3: Surveys Department EU Twinning Project.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
Managing Windows Security
Trend Micro Consumer 2010 Easy. Fast. Smart.
Delivering a Network Services Portfolio to Ireland’s Schools Network
Children’s Internet Protection Act (CIPA)
Biography Eddie is an Assistant Professor in the Security Systems and Law Enforcement Technology Department in the School of Engineering Technology at.
Presentation transcript:

Ireland’s Schools Network: Delivering a Safer Online Environment for Irish Schools? Presentation to TERENA Networking Conference 2007 by Ronan Byrne, HEAnet 22nd May 2007

Presentation Structure  Background: Ireland’s Schools Network  Technical Design Overview  Schools Survey Approach  Findings  Conclusions

Background: Irish Schools Network 4,000 schools 3 Year Government/Industry Agreement 6 Telcos interconnect directly with HEAnet HEAnet manage backbone network HEAnet provide portfolio of managed services: –Managed Internet access –Network Monitoring & SLA Management –Network Security –Webmail & Webhosting –Content Filtering HEAnet Schools NOC provide 2 nd Line Support

Technical Overview

Centralised Content Filtering Dept. of Education requirement “Centralised” approach Public Tender Procurement 2004/2005 Fortinet solution Security node at 2 x PoPs 500 Mbps ‘in-line’ & scalable Web filtering; virus scanning; anti-spam; IDS/IPS Logging & statistics “Security Profiles” set by Dept. of Education

Fortinet: Web Filtering Database of 26 million rated Websites 76 Categories 24x7 Managed Service White & Blacklists – override categories Unrated sites blocked (24hr rating) Currently 2 levels of filtering but is capable of giving each school it’s own profile

Content Filtering: “Is it working?”

Research Questions  In assessing overall effectiveness, four key research objectives were identified: 1.Assess the general support for filtering in schools 2.Effectiveness at blocking inappropriate material 3.Extent of over-blocking 4.Extent to which schools are more likely to incorporate the Internet in the classroom

Research Methodologies Survey Questionnaires (quantitative & qualitative) Follow-up telephone interviews (qualitative) Analysis of filtering logs at HEAnet (quantitative)

Survey Approach Survey conducted over Q schools contacted (representative sample) Questionnaire designed to investigate key research objectives Questionnaire by postal & survey Realised sample of 136 schools Also, questionnaire completed by 10 teachers at a single school

Survey Questionnaire Findings

Analysis of Filtering Logs (for same sample of 136 schools for 1 week)

Top 10 Blocked Categories across All Schools

Spyware 34,997 Pornography 7,611 Personals & Dating 18,883 File Sharing 16,605 Adult Materials 37,619 POST-PRIMARY SCHOOLS

Spyware 71,873 Adult Materials 5,955 Malicious Websites 5,175 PRIMARY SCHOOLS

Conclusions

General Support for Filtering Service Filtering welcomed by schools No evident opposition Not considered a form of censorship Filtering supported even though similar controls may not exist outside school 99% of survey sample felt schools had a responsibility to filter but only 26% had a solution in place prior to HEAnet solution

Effectiveness at Blocking Inappropriate Content Significant volume of inappropriate content has been blocked Over 220,000 HTTP look-ups (3.7% of traffic) were to blocked categories (1 week for 136 schools) Extrapolating beyond 1 week and across 4,000 schools amounts to a significant volume of inappropriate content! Spyware represents 2.02% of all traffic (or 2 out of every 100 HTTP gets is Spyware generated!) Significant reduction in virus detections

Extent of Over-Blocking 85% of primary schools describe filtering sensitivity as “just right” 52% of post-primary schools describe filtering sensitivity as “just right” Suggests a filtering level more specific to post-primary schools is needed Telephone interviews reflect schools moving from more restrictive to less restrictive filtering option Majority of schools do not desire local control/responsibility A ‘teacher override’ option desired by most schools

Inclination to use Internet in classroom 78% of schools surveyed state that they would further incorporate the Internet in classroom activity since the introduction of the filtering service A significant success factor in itself!

Closing Summary Teachers welcome filtering service Inappropriate material being blocked Degree of over-blocking not significant for majority Large volume of spyware is now blocked Virus incidents have reduced significantly 96% of schools surveyed either “agree” or “strongly agree” solution is delivering a safer online environment 78% of schools surveyed more inclined to use Internet CAUTION: Filtering technology is not a silver bullet

Thank you!