Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.

Slides:



Advertisements
Similar presentations
1 Bandwidth management essentials Issues for technical staff and technical solutions.
Advertisements

Chapter 3: Planning a Network Upgrade
D2 – ICT Don’t worry about IT. Services offered  Desktop support 2000, XP, Vista, Windows 7 \ Windows 8.1  Windows Server and Windows SBS 2000\2003\2008.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Part II: Strategic Planning for a Successful 1:1 Program
Stephen S. Yau CSE , Fall Security Strategies.
Network security policy: best practices
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Comprehensive IT Consulting Services an innovative approach to business.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
November 2009 Network Disaster Recovery October 2014.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
Every student prepared for a world yet to be imagined Seamless Technology and Services that are available every time, without fail Provide excellent, distinctive.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
School Technology Solutions, LLC Technology Audits What's in it for you? 4 th Annual SW/WC Technology Conference March 11, 2010 Presenter: Lee Whitcraft.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Alabama Supercomputer Authority A partnership of … and.
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
Concepts of Database Management Sixth Edition
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
Communications Pool FY ’06 Marla Meehl Friday, 10/21/05 NETS – Network Engineering & Telecommunications Section Enterprise Services Computer Security.
ITSC Writing an Operational Security Plan E. Jane Powanda FISSEA 2005 Conference March 22,
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
 miles  Named for Patriot Joseph Kershaw  23 rd largest county in SC.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Campus Texas STaR Chart Presentation for Los Fresnos HS Technology Leadership EDTC Project 2 Jaime Villarreal.
Information Security tools for records managers Frank Rankin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
«My future profession»
3.1 Types of Servers.
Technology Department Annual Report
3.1 Types of Servers.
Information Technology (IT) Department
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
Security week 1 Introductions Class website Syllabus review
PLANNING A SECURE BASELINE INSTALLATION
6. Application Software Security
Global One Communications
Presentation transcript:

Ed Tech Audit Case Study Pete Reilly

Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator Meeting with teacher teams from each building Surveys of the entire staff copyright 2008 Ed Tech Journeys

Process Visits to labs and facilities WAN and LAN technical data Examination of all policies, plans, and documentation Discussions with RIC and BOCES Additional meetings for clarification and verification copyright 2008 Ed Tech Journeys

Areas of Focus Leadership Infrastructure and Access Technical Support Professional Development Software and Content Safety and Security copyright 2008 Ed Tech Journeys

Leadership Vision and Goals Governance Policy Procedures Budget and Financing copyright 2008 Ed Tech Journeys

Leadership Is there a clear-shared vision? Is there Leadership at high levels? What decision making process is in place? Are there appropriate policies in place? Are there procedures and processes in place? Is there adequate financing? copyright 2008 Ed Tech Journeys

Infrastructure & Access Access to technology Cabling Local area network Wide area network Application servers copyright 2008 Ed Tech Journeys

Infrastructure &Access Is there enough access? Is technology deployed in ways that maximize usage? What are the ages of the computers? How are the buildings cabled? Are they certified and documented? copyright 2008 Ed Tech Journeys

Infrastructure & Access How is the network designed? Is there a suitable backbone? Are switches adequate? Servers? What network OS is in place? What workstation OS is in place? copyright 2008 Ed Tech Journeys

Infrastructure & Access How is the WAN configured? What is the bandwidth to the Internet? How are the traffic patterns? What are the key apps running on the infrastructure ( server, etc.) copyright 2008 Ed Tech Journeys

Tech support Network Issues Network administration Network maintenance Installations and projects Equipment repair Desktop support copyright 2008 Ed Tech Journeys

Tech support How are network problems reported and queued? How satisfied are users with tech support? What is the average response/resolve time? Do you have support contracts for routers, switches, servers? copyright 2008 Ed Tech Journeys

Tech Support Do you have complete network documentation including passwords for all systems and applications? Who maintains firewall, content filter, spam filter, server, web server, DNS server, routers, and switches? Is there backup for technical staff in emergencies? copyright 2008 Ed Tech Journeys

Tech Support What are the key technical issues? Are there policies and procedures for adding and deleting users, rolling over users to new grade levels, etc. How quickly are new patches and service packs applied to servers and workstations? How are new installs and special projects handled? copyright 2008 Ed Tech Journeys

Tech Support What support do users get at the desktop level? How are warranty and equipment repairs handled? copyright 2008 Ed Tech Journeys

Prof Development What PD opportunities are available? How effective is the PD? How aware are staff members about what is available to them? How open are teachers to PD? copyright 2008 Ed Tech Journeys

Software & COntent Software acquisition approach and process Software usage Software license and compliance Software updates Administrative software copyright 2008 Ed Tech Journeys

Safety & Security Student Safety Security - Prevention Security - Recovery copyright 2008 Ed Tech Journeys

safety & security Have you focused on Cyberbullying and provided the related PD?Cyberbullying What policies are in place to protect students? Who decides what is blocked and filtered? copyright 2008 Ed Tech Journeys

Safety & Security Has there been an outside, high level security audit performed? Are there written security policies and related PD? Is the firewall up to date? Reviewed periodically? Are patches applied to all systems quickly? copyright 2008 Ed Tech Journeys

Safety & Security Are there proper backups being taken? Are tapes rotated off-site? Is there an agreement with a Hot Site partner to restore tapes in case of emergency? How are desktops secured? Is the wireless secure? copyright 2008 Ed Tech Journeys

Cyberbullying Statistics 90% of MS students have had their feelings hurt online 42% have been bullied online copyright 2008 Ed Tech Journeys

Cyberbullying Statistics 35% have been threatened online 21% have gotten threatening copyright 2008 Ed Tech Journeys

Cyberbullying Statistics 53% have said something mean or hurtful online 58% have not told their parents about bullying incidents copyright 2008 Ed Tech Journeys

Cyberbullying Bully At school Poor relationship with teachers Fear of physical retribution Cyberbully At home Good relationship with teachers Fear of loss of tech privileges Further under the radar than bullying copyright 2008 Ed Tech Journeys

copyright 2008 Ed Tech Journeys