Presentation on theme: "Secure IT The Management Challenge John Woollard."— Presentation transcript:
Secure IT The Management Challenge John Woollard
Securing a safe environment http://vtc.ngfl.gov.uk/vtc/library/pub.html As ICT teachers we have a responsibility to ensure –the security and welfare of the children –the security and maintenance of the ICT equipment
Hardware protection put up security warning signs - it may work
Hardware protection label the equipment - you might get it back
Hardware protection lock the classroom doors when unattended - it helps
Hardware protection paint or deface the kit - no one would want it anyway
Hardware protection physically bolt, strap or tie the equipment to the work surfaces - so they can't take it
Hardware protection fit motion alarms for out-of-hours security - they can't carry as much if they are running away
Hardware protection put up security warning signs label the equipment lock the classroom doors when unattended paint or deface the kit physically bolt, strap or tie the equipment to the work surfaces fit motion alarms for out-of-hours security
The Internet the internet provides immense opportunities for our pupils. This is disquieting. In our lessons, the pupil is in an almost unique position to be able to, without physically moving from their seat, break the law.
The Internet The vast majority of our pupils do not want to break the law and are embarrassed or upset if they do. We have a duty to protect them.
The Internet There are a few pupils who will take every opportunity to maliciously and purposely do things that are wrong. We have a duty to persuade them or, failing that, stop them doing that.
The Internet When the law is broken in a school and the public find out the school is embarrassed. We have a duty to the pupils and our colleagues to ensure that it does not happen.
Preventing downloads –Gridwatch (http://www.ngfl.gov.uk/ngfl) for reporting about NGfL pageshttp://www.ngfl.gov.uk/ngfl –Internet Service Providers Association (http://www.ispa.org.uk)http://www.ispa.org.uk –London Internet Exchange (http://www.linx.net)http://www.linx.net –Internet Watch Foundation (http://www.internetwatch.org.uk).http://www.internetwatch.org.uk 'rating' of internet pages.
Knowledge is security do we know who is using the computer? do we know what software is available to them? do we know which software they have used? did they use the internet? what messages did they send? what messages did they receive? which pages did they visit? what resources did they down load? how long were they on the computer?
Securing the desktop Three approaches: –rebuild after every session –remember user profiles –total limits
Dealing with viruses creating a policy; presenting low-key sensible rules; providing 24 hour protection; being prepared; raising awareness; suppressing the hoaxes.
In conclusion security has three aspects: the physical location of our computers and equipment; the software protection (both the desktop and virus) and the people aspect, protecting them from inappropriate material and stopping them doing inappropriate things.