SlideShare a Scribd company logo
1 of 39
Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute  July 26, 2006   Kelly Smith Assistant Superintendent for Technology Services
Ripped from Recent Headlines! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CyberSMART Principles   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios for Discussion ( print version ) ( print version ) Classroom Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object],Office  Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
S = Security M   =  Manners A     =  Acceptable Use R     =  Responsibility T     =  Training
Security:  Why Worry? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security:  Why Now? ,[object Object],[object Object],[object Object]
Security:  Your Role ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords and Security
Passwords and Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords and Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protect that Data! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Student Safety ,[object Object],[object Object],[object Object],[object Object]
S     =  Security M = Manners A     =  Acceptable Use R     =  Responsibility T     =  Training
Effective E-mail Netiquette Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Effective E-mail Netiquette Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion Break Let’s discuss those scenarios! Great idea! What do you think about Mr. Carter?
S     =  Security M   =  Manners A = Acceptable Use R     =  Responsibility T     =  Training
[object Object],[object Object],Acceptable Use:  AKA “Digital Citizenship”
Digital Citizenship at Work: Principle #1 ,[object Object]
Digital Citizenship at Work: Principle #2 ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Digital Citizenship at Work: Principle #3 System use is  electronically monitored.
E-mail Acceptable Use
[object Object],[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],E-mail as a Public Record Source: TEC-09 DISTRICT E-MAIL RETENTION REGULATION
S     =  Security M   =  Manners A  =  Acceptable Use R = Responsibility T     =  Training
[object Object],[object Object],[object Object],[object Object],Model and Emphasize Data Confidentiality
Know the Acceptable Use District Policies & Regs  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Educate Others  ,[object Object],[object Object],[object Object],[object Object]
Report Incidents / Violations  ,[object Object],[object Object],[object Object],[object Object]
Manage the Paperwork ,[object Object],[object Object],[object Object],[object Object],[object Object]
S     =  Security M   =  Manners A  =  Acceptable Use R  =  Responsibility T = Training
Online Acceptable Use Class ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion Break Let’s discuss those scenarios! Great idea! What are some important points?
Classroom Scenario Points  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Office Scenario Points  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute  July 26, 2006   Kelly Smith Assistant Superintendent for Technology Services

More Related Content

Similar to CyberSMART Addressing Safe Tech Use

Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdfHemprasad Badgujar
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Srashti Jain
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxEMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxIrishFaye5
 

Similar to CyberSMART Addressing Safe Tech Use (20)

Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdf
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
E-Safety
E-SafetyE-Safety
E-Safety
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxEMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
 
Acl esafety awareness
Acl esafety awarenessAcl esafety awareness
Acl esafety awareness
 

CyberSMART Addressing Safe Tech Use

  • 1. Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute July 26, 2006 Kelly Smith Assistant Superintendent for Technology Services
  • 2.
  • 3.
  • 4.
  • 5. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 15.
  • 16.
  • 17. Discussion Break Let’s discuss those scenarios! Great idea! What do you think about Mr. Carter?
  • 18. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 19.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 35.
  • 36. Discussion Break Let’s discuss those scenarios! Great idea! What are some important points?
  • 37.
  • 38.
  • 39. Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute July 26, 2006 Kelly Smith Assistant Superintendent for Technology Services

Editor's Notes

  1. Consider these questions : Would you want your own SS# shared with just anyone? Would you want your own child’s name and address shared with just anyone? Have you come to rely on our network and information systems and want them to be tamper-proof and available? Do you want the community to trust our ability to protect sensitive data? Why – student safety, voter support, etc. Do you want to be “at fault” if and when sensitive data is compromised?
  2. As more districts centralize academic and other information to make data-driven decisions—as encouraged under No Child Left Behind —they leave themselves even more vulnerable to risk. Open environment = data is available / accessible for parents, employees, and students when they have a legal or legitimate need to know (CMS, Parent Connection, Winocular, etc.) Reports of students’ in other districts gaining access to school networks to change grades, delete teachers’ files, or steal data are becoming more common. Unlike 10 years ago, people don’t have to be computer geeks to become hackers. Online chat rooms, listservs, and Web sites give step-by-step directions on how to hack and make it easy for students—and anyone else—to tap into networks rich with confidential data.
  3. TEC-02 USER/WORKSTATION SECURITY MEASURES Use passwords that are unique and not easily guessed. Passwords should not be easily accessible to others or stored near the computer. Recommended password guidelines are as follows: a. Minimum of 8 characters in length b. Alphanumeric c. Upper and lower case d. At least one special character TEC-01 ELECTRONIC COMMUNICATION AND DATA MANAGEMENT TEC-10 MOBILE TECHNOLOGY EQUIPMENT SECURITY MEASURES Set a password that is not easily guessed on mobile devices · Laptops Computers · Personal Digital Assistants (PDA) · Pocket Personal Computers (Pocket PCs) · Password Capable Storage Devices (e.g. USB Flash Drives)
  4. TEC-10 MOBILE TECHNOLOGY EQUIPMENT SECURITY MEASURES Be extremely careful about the type of data stored on the mobile equipment. Personnel are responsible for the NISD data stored on the mobile equipment. Do not store sensitive or confidential data on the device without realizing the risk assumed by doing so. The disclosure of certain types of information does violate federal regulations such as CIPA, HIPPA, FERPA, etc. and could result in a federal violation. Do not share or loan your device with others for non-business use at any time. Personnel are responsible for the physical safeguarding of District mobile technology equipment TEC-02 USER/WORKSTATION SECURITY MEASURES lock the workstation or log out when leaving the area requires password protected screensavers Keyloggers : a type of surveillance software that has the capability to record every keystroke you make to a log file. A keylogger can record account information (i.e., usernames and passwords), e-mail, and any information you type at any time using your keyboard. The log file can then be used by someone to gain unauthorized access to your data. Keyloggers are not illegal and HS students know all about them! Dumpster diving : going through the garbage fo paper copies of sensitive data Phishing : uses a combination of e-mail messages and fake Web sites to convince users they are dealing with a major company to try to trick someone into electronically sharing personal data such as a Social Security or credit card number. Social engineering / pre-texting : influencing and manipulating people into innocently giving away confidential data, often by pretending to be somebody in an “official” capacity
  5. The Internet is an important teaching tool used in Northside ISD classrooms and libraries. The Internet can, however, provide students with access to inappropriate material. Federal law ( CIPA - Children's Internet Protection Act, 2001 ) requires school districts to use "filtering" software to block access to content that is obscene, pornographic, inappropriate for students, or harmful to minors, as defined by CIPA and as determined by the District. NISD currently filters content in approximately 35 categories / subcategories, reviewed annually (e.g., Nudity, Gambling, Racism and Hate; see online document for others) Internet Safety Committee reviews requests to unblock / block specific sites as necessary
  6. Openness = nothing is ever truly anonymous online