Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.

Slides:



Advertisements
Similar presentations
Leveraging ICT to improve the business model for a Technology Innovation Centre or Science Park Bob Cushing Harwell 9 th February 2011.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Hosted Revolution Ltd Hosted Exchange October 2009 V2.01.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
East Ayrshire Libraries Acceptable Use Policy and Filtering.
Myspace.com What you need to know. What is it?  My Space in theory is a social networking site that allows users to share photos, videos, and text based.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Factors to be taken into account when designing ICT Security Policies
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Computer Networks IGCSE ICT Section 4.
Technology Round 7 Exploring I.C.T. in the Syllabus.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
Networking Computers. Advantages & Disadvantages of Networking.
Nelson Androes Online Achievement Level Setting Software.
Protecting ICT Systems
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
ENAM ENAM - INFRA Project 2013.
Macau Polytechnic Institute I.T. Forum 2000 Campus Computing Environment & Technical Projects Presented by Voyage, Io Hio Hong.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer Networks S3 Prepared by May Lau
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
How to evaluate ICT use for small organisations Session 2.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
FIT03.05 Explain features of network maintenance.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Creating and Managing Networks CSC February, 1999.
CPT 123 Internet Skills Class Notes Internet Security Session B.
G046 Lecture 04 Task C Briefing Notes Mr C Johnston ICT Teacher
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Introduction to Networking. What is a Network? Discuss in groups.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
UNIT V Security Management of Information Technology.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Networks 1 Key Revision Points.
Data and database administration
CONNECTING TO THE INTERNET
Online software and backups
Online Learning.
A Glimpse Into a Few Current Tech Projects
Presentation transcript:

Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College

Contents  The college  ICT Facilities  Security issues  How do we address them?

The College  City College  18,000 Learners  950 Staff  18 Academic schools  3 Main Campuses  Community & External Sites

ICT Facilities  Network 10/100/1000 –1,600 workstations –45 Servers –9,000+ student accounts –800 Staff accounts –3 Major sites –9 External sites

ICT Facilities - 2  – All network members –Staff –Students  Internet Access – All networked computers –2 High speed connections –1 dedicated connection –Unfiltered & logged/Monitored access

ICT Facilities - 3  Intranet systems –Secure and differentiated access –Staff related facilities –Student related facilities –Common areas  College Web Site –Over 305,000 monthly hits (Jan. 2002)

ICT Facilities - 4  Drop-in and open access areas –LR Centres –UK OnLine & Community Centres –Cyber Cafés  Intranet Publishing  IT/ICT/ILT consultancy  IT Systems development & investigation  User Support  Staff development  Student Induction  Video conferencing

Security issues  External attacks  Internal abuse  Data Loss  Internet Misuse  User awareness

How do we address them?  Prevention –Firewalls and proxies –Virus protection –User accountability –Intelligent systems –Avoid temptation –No 9x –Standard settings and controlled installations –User Education

How do we address them?(2)  Monitoring –All things technical+ –Internet usage –Storage space

How do we address them(3)?  Backup & disaster recovery –Roaming profiles & Network drives –Use the geographic dis/advantage –Cross site backup –Replication of service –Standard hardware platforms

Rules & Enforcement  Acceptable use - a college policy  Clear penalties  Support