Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure IT The Management Challenge John Woollard.

Similar presentations


Presentation on theme: "Secure IT The Management Challenge John Woollard."— Presentation transcript:

1 Secure IT The Management Challenge John Woollard

2 Securing a safe environment As ICT teachers we have a responsibility to ensure –the security and welfare of the children –the security and maintenance of the ICT equipment

3 Hardware protection put up security warning signs - it may work

4 Hardware protection label the equipment - you might get it back

5 Hardware protection lock the classroom doors when unattended - it helps

6 Hardware protection paint or deface the kit - no one would want it anyway

7 Hardware protection physically bolt, strap or tie the equipment to the work surfaces - so they can't take it

8 Hardware protection fit motion alarms for out-of-hours security - they can't carry as much if they are running away

9 Hardware protection put up security warning signs label the equipment lock the classroom doors when unattended paint or deface the kit physically bolt, strap or tie the equipment to the work surfaces fit motion alarms for out-of-hours security

10 The Internet the internet provides immense opportunities for our pupils. This is disquieting. In our lessons, the pupil is in an almost unique position to be able to, without physically moving from their seat, break the law.

11 The Internet The vast majority of our pupils do not want to break the law and are embarrassed or upset if they do. We have a duty to protect them.

12 The Internet There are a few pupils who will take every opportunity to maliciously and purposely do things that are wrong. We have a duty to persuade them or, failing that, stop them doing that.

13 The Internet When the law is broken in a school and the public find out the school is embarrassed. We have a duty to the pupils and our colleagues to ensure that it does not happen.

14 Preventing downloads –Gridwatch (http://www.ngfl.gov.uk/ngfl) for reporting about NGfL pageshttp://www.ngfl.gov.uk/ngfl –Internet Service Providers Association (http://www.ispa.org.uk)http://www.ispa.org.uk –London Internet Exchange (http://www.linx.net)http://www.linx.net –Internet Watch Foundation (http://www.internetwatch.org.uk).http://www.internetwatch.org.uk 'rating' of internet pages.

15 Preventing downloads deny lists allow lists (the walled garden) filtering

16 Knowledge is security  do we know who is using the computer?  do we know what software is available to them?  do we know which software they have used?  did they use the internet?  what messages did they send?  what messages did they receive?  which pages did they visit?  what resources did they down load?  how long were they on the computer?

17 Securing the desktop Three approaches: –rebuild after every session –remember user profiles –total limits

18 Dealing with viruses  creating a policy;  presenting low-key sensible rules;  providing 24 hour protection;  being prepared;  raising awareness;  suppressing the hoaxes.

19 In conclusion  security has three aspects:  the physical location of our computers and equipment;  the software protection (both the desktop and virus) and  the people aspect, protecting them from inappropriate material and stopping them doing inappropriate things.

20


Download ppt "Secure IT The Management Challenge John Woollard."

Similar presentations


Ads by Google