K-12 Web & Content Filtering Michael I. DeBakey Network and Systems Administrator Lester S. Stoltzfus Director of.

Slides:



Advertisements
Similar presentations
Information Security The Responsibility of Security Lies on The Shoulders of Each and Every User……. R. LaRocca 1997 Robert LaRocca - Director Information.
Advertisements

TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Project Management Methodology Procurement management.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter 7 HARDENING SERVERS.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Interpret Application Specifications
YNG Solutions Website Usability Review Prepared by Josepha Rood December 19, 2008.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
New Data Regulation Law 201 CMR TJX Video.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
IT Priorities and Concerns Update December 19, 2006.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Chapter 7: Using Windows Servers to Share Information.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Chapter 9: Novell NetWare
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Protecting Students on the School Computer Network Enfield High School.
BYOD BRING YOUR OWN DEVICE November 15, 2012 Ken Gibson IT Administrator - Twin Valley School District
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Archiving Solutions Software vs. Hosted vs. Appliance Based.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Module 11: Designing Security for Network Perimeters.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Security fundamentals Topic 9 Securing internet messaging.
NetTech Solutions Protecting the Computer Lesson 10.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
ASBO Annual Conference Ocean City May WiFi Username: asbo WiFi Password: asbo2016.
CLOUDENTIFY.
Stop Those Prying Eyes Getting to Your Data
Secure Software Confidentiality Integrity Data Security Authentication
Securing the Network Perimeter with ISA 2004
Welcome To : Group 1 VC Presentation
Bluffs School 1:1 Digital Conversion Orientation for Parents August 2015.
Cloud Security for Endpoints
Securing Windows 7 Lesson 10.
Employee Monitoring Solution
Presentation transcript:

K-12 Web & Content Filtering Michael I. DeBakey Network and Systems Administrator Lester S. Stoltzfus Director of Technology Michael Boggess Regional Sales Manager, Lightspeed Systems Delivering Professional Responsive Quality Service Brian Steigauf Systems Administrator Lancaster-Lebanon IU 13

District Information Encompasses Lampeter, Strasburg, Willow Street, and the southeast corner of the city of Lancaster 36.2 square miles 3,225 total students 470 total number of employees

Our Buildings Five educational buildings (1 HS, 1 MS, 3 ES) Two non-educational buildings (Administration Building and Maintenance Building) All on one campus except for one elementary school

Traditional Web Filtering Problems Obtuse and complex whitelist / blacklist Too much overhead to submission / approval process I.T.’s “fingerprints” are all over the place Non-existent or minimal integration with directory service

A Checklist for Content Management Decisions CoSN’s (Consortium for School Networking) “Secure District” website: Some excellent questions to ask on this topic…

CoSN: Philosophical Questions to Ask Do you want students to be able to direct their own learning or is it more important for teachers to retain control of what goes on in the classroom? Should different standards be applied, based on the age of the student? Should school employees be subject to the same rules as students, to their own set of rules or to no rules? Would you prefer to simply monitor how students and employees use the Internet, rather than blocking their access to sites? Are there other issues that you want to address at the same time? (Viruses, malware, application security, mail filtering, etc.) How will school officials respond if students are found to be accessing inappropriate material? What strategies will your school district use to teach "information literacy?"

CoSN: Evaluating Content Management Products What kinds of content are you concerned about? What has the experience been with the solution you propose to use? How are users notified when they try to access a blocked site? Does the proposed solution address other forms of content besides just Web sites? How easy would it be for a child to hack into and disable a particular filtering solution? Does the proposed solution incorporate advertising messages? Will third parties be able to collect information about how your students are accessing the Internet? If your students speak many different languages, does your proposed solution control access to sites written in languages other than English? How will the proposed solution serve your district in the future?

L-S’s Questions How easily does the product fit with our existing security model - Firewall, NAT, VPN, “offline” laptops, wireless? Will it require any fundamental changes to our network topology? What kind of hardware do we need? What software do we need to install? Do we need to touch every computer on the network? How granular is the control? Per student / staff user, per group, per computer, per subnet? The $64,000 question: Does the authentication mechanism integrate with our existing single sign on model? Will it cost us $64,000???

How About ? Spam, open relays, viruses Attachment limits Student accounts hosted or on-site? Regulations relating to Do your “e-Recordkeeping” practices reflect your paper recordkeeping practices? Archival methods… Are you prepared to store all of that stuff?

Lightspeed TTC 7 Mail and Web Content Filtering In-Line Filtering for Best Performance “Internal” and “External” Network Interfaces Three Web Filter Policy Levels: Student, Staff, Administrative/IT MS SQL Server 2005 Required for Each TTC Server

Lightspeed TTC 7 Mail and Web Content Filtering In-Line Filtering for Best Performance “Internal” and “External” Network Interfaces Three Web Filter Policy Levels: Student, Staff, Administrative/IT MS SQL Server 2005 Required for Each TTC Server Web Filtering Hardware 1 x Dell PowerEdge 2950 Server 1 x Silcom Failover card ( 2 x 1000BaseT interfaces) 1 x Intel PCI NIC (2 x 1000BaseT interfaces)

Lightspeed TTC 7 Mail and Web Content Filtering In-Line Filtering for Best Performance “Internal” and “External” Network Interfaces Three Web Filter Policy Levels: Student, Staff, Administrative/IT MS SQL Server 2005 Required for Each TTC Server Web Filtering Hardware 1 x Dell PowerEdge 2950 Server 1 x Silcom Failover Card ( 2 x 1000BaseT interfaces) 1 x Intel PCI NIC (2 x 1000BaseT interfaces) Mail Filtering Hardware 1 x Dell PowerEdge 2950 Server 1 x Intel PCI NIC (2 x 1000BaseT interfaces) 1 x Dell MD1000 Disk Array

Lightspeed TTC 7 In-Line Installation Always a Best Practice TTC 7.3 Console Remote Deployment of Security Agent “One Stop Shop” for Managing Antivirus Scans and Client Updates Active Directory-Integrated User, Group, Computer Lookup Functionality Security Agent Provides Desktop Antivirus Provides Scheduled AV Scans and Definition Updates Provides Program Permissions (L-S Does Not Use This) Zero Client Configuration Required When Deployed through Console Correctly Resolves AD Group Membership and Usernames

Thank you! Act 48 Code: BL182085