Presentation is loading. Please wait.

Presentation is loading. Please wait.

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard.

Similar presentations


Presentation on theme: "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard."— Presentation transcript:

1 C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard Phillips and Rayton R. Sianjina

2 A CCESS P OLICY Computers and access to the Internet are essential tools for navigating in the informational age today. This technology and various software programs increase productivity and efficiency in every discipline across the spectrum. K-12 organizations are faced with an emerging problem with computer abuse among employees at work. According to Arnesen and Weis (2007) of the employees who access the Internet more than 60 percent admitted they used the Internet while at work for personal reasons (Websense, 2006). © Routledge

3 A CCESS P OLICY Password and Logon Requirements and Complexities Policy statements should address:  All passcodes, passwords, IDs and encrypted information are the property of the district.  No students are issued with passcode. Monitoring and Auditing/Network Access  Usage of all of a district’s technology resources and any electronic data created, sent, received, or stored in the system are, and remain, the property of the district. © Routledge

4 A CCESS P OLICY Rights and Privileges  The use of the district’s technology resources is a privilege, not a right, which may be revoked by the district at any time and for any reason. Unattended Idle Configuration  There are unattended software programs created to free technicians from routine work, such as tedious program installations. Biometrics  Biometrics ientification system allows technicians to input a person’s contact information, using finger print recognition software, to capture a digital photograph and retrieve his/her finger prints from a central console. © Routledge

5 Wireless Access In a computer networking system, a wireless access point (WAD) is a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth, or other related standard wireless equipment. Wireless Access Tools Tools and utilities designed to test, monitor, and protect wireless network. © Routledge A CCESS P OLICY

6 Remote Access Technology allows the IT professional to perform administrative tasks to run programs on a remote computer as if they were working locally. In other words, access is gained to another computer from a different terminal to perform administrative tasks. © Routledge A CCESS P OLICY

7 WorkStation Frozen with Deepfreeze or Clean Slate Deep Freeze is a kernel level driver that protects hard drive integrity by redirecting information being written to the hard drive or partition, leaving the original data intact. © Routledge A CCESS P OLICY

8 C ONCLUSION The purpose of these policies is to provide support to employees through the use of technology; therefore, anyone who utilizes the Internet or district‘s technology systems must foster that purpose by using Internet resources only for educational purposes and in an appropriate and legal manner. © Routledge


Download ppt "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard."

Similar presentations


Ads by Google