SlideShare a Scribd company logo
1 of 7
Download to read offline
NETWORK
T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDisabling and hacking networks are a major threat
to computers at school, home, businesses, or in public
places.
VAnother concern is keeping all data and software
protected from corruptions.
VKeeping email free from spam is also a part of
network security.
Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VOne major misconception is that only those that are computer
illiterate are going to be attacked. Computer specialists are
affected by network security as well. The Y2k was a big scare
for those.
VAnother misconception is those that believe the school districts
can stop malicious attacks and theft of information. Districts
have made technology unpleasant, nonflexible, and difficult
for instruction to take place in the classroom.
T he realities Of Network security
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VCost: Keeping the network secure is a high price to pay.
VSensitive and Confidential Information: District networks usually contain personal
information, grades, assessments of both students and teachers. Many legal implications
can come about if confidentiality is breached.
VStudent Safety: Administrators have to make certain that all students are protected
from harmful content or situations
VTeacher Access and Productivity: Some districts have provided an extremely secure
firewall so teachers can have access to virtual private networks (BPNs) from school and
home.
VAccess and Functionality: This would entail teachers being provided with a server space
for educational websites and Internet access. Teachers need the capability to be able to
transport work from school and home computers.
Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Some common responses include: Restricting Permissions: Users are allowed to complete certain functions.
This can be overridden with a password.
V Blocking Instant Messaging (IM): Misuse of the network and the content that can be viewed through IM.
Many districts have disable this feature.
V Disabling of USB Drives: Illegal downloading and file sharing are the main reasons for USB drives to be
disabled.
V Firewalls, Antivirus, and Spam Filters: Schools are using antivirus software which are installed on the
proxy server.
V Policies and Procedures: The security policies include the roles and responsibilities of network users,
regular maintenance, and implementation of security assessments.
V Restricting Server Use: Some districts forbid the use of the server for classroom and teacher websites.
“Teachers are simply not allowed to upload any files or create access points on the web.” (Robinson, Brown,
& Green, 2010). These district are trying to prevent network security breaches from what teachers are
posting that can accidentally or purposefully harm the network.
A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Network Rights Strategies: Acceptable Use Policies (AUPs)- contracts between the school and the
students and teachers to keep the school’s network safe.
V Balance Instructional Needs with Desktop Security: Teachers making sure software being
installed is legal.
V Server Space and Network Use: This will enhance teaching by allowing teachers to use the web
to utilize Web 2.0 tools and create websites, etc. for student learning.
V Monitor Student Use: Districts use software that monitor all the users’ activity while using the
internet.
V Firewalls: Districts need to invest in buying a good firewall that will have fast Internet access
while still blocking the viruses and protecting that servers.
V Security Assessments: District should have a security assessment plan that include knowledge of
security measures, policies, and procedures, characteristics of the network and regular updates,
and how the firewall works.
V Secure Passwords: Teacher should create and memorize passwords.
Sources USED
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access.
International Society for Technology in Education

More Related Content

What's hot

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
miarmenta
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
Ecwaytech
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
tbanks
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technology
tcitrano
 

What's hot (19)

User wareness
User warenessUser wareness
User wareness
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Mobile
MobileMobile
Mobile
 
An Administrator's Introduction to Social Networking
An Administrator's Introduction to Social NetworkingAn Administrator's Introduction to Social Networking
An Administrator's Introduction to Social Networking
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Erdleymurray Sini2007
Erdleymurray Sini2007Erdleymurray Sini2007
Erdleymurray Sini2007
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
Security
SecuritySecurity
Security
 
Network security
Network securityNetwork security
Network security
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web Browser
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technology
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs Overview
 

Viewers also liked

Spaghettim winter menu dec12
Spaghettim winter menu dec12Spaghettim winter menu dec12
Spaghettim winter menu dec12
weiss2001
 
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
Resultados 2012: La Liga de las Sonrisas y Conectando SonrisasResultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
La liga de las Sonrisas
 
Matt Stewart Resume1-2
Matt Stewart Resume1-2Matt Stewart Resume1-2
Matt Stewart Resume1-2
Matt Stewart
 
Daftar calon asisten non mipa 20152
Daftar calon asisten non mipa 20152Daftar calon asisten non mipa 20152
Daftar calon asisten non mipa 20152
Deny Saputro
 
News stagione 2012/2013
News stagione 2012/2013News stagione 2012/2013
News stagione 2012/2013
jekofx
 

Viewers also liked (15)

Spaghettim winter menu dec12
Spaghettim winter menu dec12Spaghettim winter menu dec12
Spaghettim winter menu dec12
 
9 Guia Turistica Recorriendo Caviahue-Copahue
9 Guia Turistica Recorriendo Caviahue-Copahue9 Guia Turistica Recorriendo Caviahue-Copahue
9 Guia Turistica Recorriendo Caviahue-Copahue
 
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
Resultados 2012: La Liga de las Sonrisas y Conectando SonrisasResultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
 
Insightful Controllership
Insightful ControllershipInsightful Controllership
Insightful Controllership
 
Inclusão digital
Inclusão digitalInclusão digital
Inclusão digital
 
Matt Stewart Resume1-2
Matt Stewart Resume1-2Matt Stewart Resume1-2
Matt Stewart Resume1-2
 
Thank you Sponsor sign 2014 final
Thank you Sponsor sign 2014 finalThank you Sponsor sign 2014 final
Thank you Sponsor sign 2014 final
 
Head of Quality
Head of QualityHead of Quality
Head of Quality
 
Portfolio
PortfolioPortfolio
Portfolio
 
14- Guia turistica "Recorriendo Caviahue- Copahue"
14- Guia turistica "Recorriendo Caviahue- Copahue"14- Guia turistica "Recorriendo Caviahue- Copahue"
14- Guia turistica "Recorriendo Caviahue- Copahue"
 
Daftar calon asisten non mipa 20152
Daftar calon asisten non mipa 20152Daftar calon asisten non mipa 20152
Daftar calon asisten non mipa 20152
 
News stagione 2012/2013
News stagione 2012/2013News stagione 2012/2013
News stagione 2012/2013
 
28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"
28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"
28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"
 
Marketing and communications tools for historical societies and other history...
Marketing and communications tools for historical societies and other history...Marketing and communications tools for historical societies and other history...
Marketing and communications tools for historical societies and other history...
 
Portafolio de capacitaciones de sst
Portafolio de capacitaciones de sstPortafolio de capacitaciones de sst
Portafolio de capacitaciones de sst
 

Similar to Network security ppt

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
Muhammad Zeeshan
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
arhodes
 
Staff training session
Staff training sessionStaff training session
Staff training session
mander5208
 
Group Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docxGroup Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docx
whittemorelucilla
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
IJNSA Journal
 
Ed Tech NJ 2013 Conference BYOD presentation
Ed Tech NJ 2013 Conference BYOD presentationEd Tech NJ 2013 Conference BYOD presentation
Ed Tech NJ 2013 Conference BYOD presentation
spaul6414
 

Similar to Network security ppt (20)

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Group Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docxGroup Project RisksThreatsWeaknessesCountermeasures©.docx
Group Project RisksThreatsWeaknessesCountermeasures©.docx
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Ed Tech NJ 2013 Conference BYOD presentation
Ed Tech NJ 2013 Conference BYOD presentationEd Tech NJ 2013 Conference BYOD presentation
Ed Tech NJ 2013 Conference BYOD presentation
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Network security ppt

  • 2. T heTHREAT wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VDisabling and hacking networks are a major threat to computers at school, home, businesses, or in public places. VAnother concern is keeping all data and software protected from corruptions. VKeeping email free from spam is also a part of network security.
  • 3. Common Misconceptions wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VOne major misconception is that only those that are computer illiterate are going to be attacked. Computer specialists are affected by network security as well. The Y2k was a big scare for those. VAnother misconception is those that believe the school districts can stop malicious attacks and theft of information. Districts have made technology unpleasant, nonflexible, and difficult for instruction to take place in the classroom.
  • 4. T he realities Of Network security wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VCost: Keeping the network secure is a high price to pay. VSensitive and Confidential Information: District networks usually contain personal information, grades, assessments of both students and teachers. Many legal implications can come about if confidentiality is breached. VStudent Safety: Administrators have to make certain that all students are protected from harmful content or situations VTeacher Access and Productivity: Some districts have provided an extremely secure firewall so teachers can have access to virtual private networks (BPNs) from school and home. VAccess and Functionality: This would entail teachers being provided with a server space for educational websites and Internet access. Teachers need the capability to be able to transport work from school and home computers.
  • 5. Common Responses wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww V Some common responses include: Restricting Permissions: Users are allowed to complete certain functions. This can be overridden with a password. V Blocking Instant Messaging (IM): Misuse of the network and the content that can be viewed through IM. Many districts have disable this feature. V Disabling of USB Drives: Illegal downloading and file sharing are the main reasons for USB drives to be disabled. V Firewalls, Antivirus, and Spam Filters: Schools are using antivirus software which are installed on the proxy server. V Policies and Procedures: The security policies include the roles and responsibilities of network users, regular maintenance, and implementation of security assessments. V Restricting Server Use: Some districts forbid the use of the server for classroom and teacher websites. “Teachers are simply not allowed to upload any files or create access points on the web.” (Robinson, Brown, & Green, 2010). These district are trying to prevent network security breaches from what teachers are posting that can accidentally or purposefully harm the network.
  • 6. A few Recommendations wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww V Network Rights Strategies: Acceptable Use Policies (AUPs)- contracts between the school and the students and teachers to keep the school’s network safe. V Balance Instructional Needs with Desktop Security: Teachers making sure software being installed is legal. V Server Space and Network Use: This will enhance teaching by allowing teachers to use the web to utilize Web 2.0 tools and create websites, etc. for student learning. V Monitor Student Use: Districts use software that monitor all the users’ activity while using the internet. V Firewalls: Districts need to invest in buying a good firewall that will have fast Internet access while still blocking the viruses and protecting that servers. V Security Assessments: District should have a security assessment plan that include knowledge of security measures, policies, and procedures, characteristics of the network and regular updates, and how the firewall works. V Secure Passwords: Teacher should create and memorize passwords.
  • 7. Sources USED wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access. International Society for Technology in Education