2. T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDisabling and hacking networks are a major threat
to computers at school, home, businesses, or in public
places.
VAnother concern is keeping all data and software
protected from corruptions.
VKeeping email free from spam is also a part of
network security.
3. Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VOne major misconception is that only those that are computer
illiterate are going to be attacked. Computer specialists are
affected by network security as well. The Y2k was a big scare
for those.
VAnother misconception is those that believe the school districts
can stop malicious attacks and theft of information. Districts
have made technology unpleasant, nonflexible, and difficult
for instruction to take place in the classroom.
4. T he realities Of Network security
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VCost: Keeping the network secure is a high price to pay.
VSensitive and Confidential Information: District networks usually contain personal
information, grades, assessments of both students and teachers. Many legal implications
can come about if confidentiality is breached.
VStudent Safety: Administrators have to make certain that all students are protected
from harmful content or situations
VTeacher Access and Productivity: Some districts have provided an extremely secure
firewall so teachers can have access to virtual private networks (BPNs) from school and
home.
VAccess and Functionality: This would entail teachers being provided with a server space
for educational websites and Internet access. Teachers need the capability to be able to
transport work from school and home computers.
5. Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Some common responses include: Restricting Permissions: Users are allowed to complete certain functions.
This can be overridden with a password.
V Blocking Instant Messaging (IM): Misuse of the network and the content that can be viewed through IM.
Many districts have disable this feature.
V Disabling of USB Drives: Illegal downloading and file sharing are the main reasons for USB drives to be
disabled.
V Firewalls, Antivirus, and Spam Filters: Schools are using antivirus software which are installed on the
proxy server.
V Policies and Procedures: The security policies include the roles and responsibilities of network users,
regular maintenance, and implementation of security assessments.
V Restricting Server Use: Some districts forbid the use of the server for classroom and teacher websites.
“Teachers are simply not allowed to upload any files or create access points on the web.” (Robinson, Brown,
& Green, 2010). These district are trying to prevent network security breaches from what teachers are
posting that can accidentally or purposefully harm the network.
6. A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Network Rights Strategies: Acceptable Use Policies (AUPs)- contracts between the school and the
students and teachers to keep the school’s network safe.
V Balance Instructional Needs with Desktop Security: Teachers making sure software being
installed is legal.
V Server Space and Network Use: This will enhance teaching by allowing teachers to use the web
to utilize Web 2.0 tools and create websites, etc. for student learning.
V Monitor Student Use: Districts use software that monitor all the users’ activity while using the
internet.
V Firewalls: Districts need to invest in buying a good firewall that will have fast Internet access
while still blocking the viruses and protecting that servers.
V Security Assessments: District should have a security assessment plan that include knowledge of
security measures, policies, and procedures, characteristics of the network and regular updates,
and how the firewall works.
V Secure Passwords: Teacher should create and memorize passwords.