Presentation is loading. Please wait.

Presentation is loading. Please wait.

Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.

Similar presentations


Presentation on theme: "Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College."— Presentation transcript:

1 Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College

2 Contents  The college  ICT Facilities  Security issues  How do we address them?

3 The College  City College  18,000 Learners  950 Staff  18 Academic schools  3 Main Campuses  Community & External Sites

4 ICT Facilities  Network 10/100/1000 –1,600 workstations –45 Servers –9,000+ student accounts –800 Staff accounts –3 Major sites –9 External sites

5 ICT Facilities - 2  E-mail – All network members –Staff –Students  Internet Access – All networked computers –2 High speed connections –1 dedicated E-mail connection –Unfiltered & logged/Monitored access

6 ICT Facilities - 3  Intranet systems –Secure and differentiated access –Staff related facilities –Student related facilities –Common areas  College Web Site –Over 305,000 monthly hits (Jan. 2002)

7 ICT Facilities - 4  Drop-in and open access areas –LR Centres –UK OnLine & Community Centres –Cyber Cafés  Intranet Publishing  IT/ICT/ILT consultancy  IT Systems development & investigation  User Support  Staff development  Student Induction  Video conferencing

8

9 Security issues  External attacks  Internal abuse  Data Loss  Internet Misuse  User awareness

10 How do we address them?  Prevention –Firewalls and proxies –Virus protection –User accountability –Intelligent systems –Avoid temptation –No 9x –Standard settings and controlled installations –User Education

11 How do we address them?(2)  Monitoring –All things technical+ –Internet usage –Storage space

12 How do we address them(3)?  Backup & disaster recovery –Roaming profiles & Network drives –Use the geographic dis/advantage –Cross site backup –Replication of service –Standard hardware platforms

13 Rules & Enforcement  Acceptable use - a college policy  Clear penalties  Support


Download ppt "Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College."

Similar presentations


Ads by Google