Download presentation
Presentation is loading. Please wait.
Published byNelson Inskeep Modified over 9 years ago
1
Secure IT The Management Challenge John Woollard
2
Securing a safe environment http://vtc.ngfl.gov.uk/vtc/library/pub.html As ICT teachers we have a responsibility to ensure –the security and welfare of the children –the security and maintenance of the ICT equipment
3
Hardware protection put up security warning signs - it may work
4
Hardware protection label the equipment - you might get it back
5
Hardware protection lock the classroom doors when unattended - it helps
6
Hardware protection paint or deface the kit - no one would want it anyway
7
Hardware protection physically bolt, strap or tie the equipment to the work surfaces - so they can't take it
8
Hardware protection fit motion alarms for out-of-hours security - they can't carry as much if they are running away
9
Hardware protection put up security warning signs label the equipment lock the classroom doors when unattended paint or deface the kit physically bolt, strap or tie the equipment to the work surfaces fit motion alarms for out-of-hours security
10
The Internet the internet provides immense opportunities for our pupils. This is disquieting. In our lessons, the pupil is in an almost unique position to be able to, without physically moving from their seat, break the law.
11
The Internet The vast majority of our pupils do not want to break the law and are embarrassed or upset if they do. We have a duty to protect them.
12
The Internet There are a few pupils who will take every opportunity to maliciously and purposely do things that are wrong. We have a duty to persuade them or, failing that, stop them doing that.
13
The Internet When the law is broken in a school and the public find out the school is embarrassed. We have a duty to the pupils and our colleagues to ensure that it does not happen.
14
Preventing downloads –Gridwatch (http://www.ngfl.gov.uk/ngfl) for reporting about NGfL pageshttp://www.ngfl.gov.uk/ngfl –Internet Service Providers Association (http://www.ispa.org.uk)http://www.ispa.org.uk –London Internet Exchange (http://www.linx.net)http://www.linx.net –Internet Watch Foundation (http://www.internetwatch.org.uk).http://www.internetwatch.org.uk 'rating' of internet pages.
15
Preventing downloads deny lists allow lists (the walled garden) filtering
16
Knowledge is security do we know who is using the computer? do we know what software is available to them? do we know which software they have used? did they use the internet? what messages did they send? what messages did they receive? which pages did they visit? what resources did they down load? how long were they on the computer?
17
Securing the desktop Three approaches: –rebuild after every session –remember user profiles –total limits
18
Dealing with viruses creating a policy; presenting low-key sensible rules; providing 24 hour protection; being prepared; raising awareness; suppressing the hoaxes.
19
In conclusion security has three aspects: the physical location of our computers and equipment; the software protection (both the desktop and virus) and the people aspect, protecting them from inappropriate material and stopping them doing inappropriate things.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.