Successfully reported this slideshow.
Your SlideShare is downloading. ×

3 - Interaction between Cyber Security and School IT Policy .pdf

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
Loading in …3
×

Check these out next

1 of 10 Ad

More Related Content

Slideshows for you (20)

Similar to 3 - Interaction between Cyber Security and School IT Policy .pdf (20)

Advertisement

More from HomeContentRSSLog ineLearning Consortium 電子學習聯盟 (20)

Recently uploaded (20)

Advertisement

3 - Interaction between Cyber Security and School IT Policy .pdf

  1. 1. INTERACTION BETWEEN CYBER SECURITY AND SCHOOL IT POLICY Amika Au Chief Information Officer Diocesan Boys’ School
  2. 2. Cyber Security in the School Application Network Infrastructure Information Data Server Computer Network Devices Internet of Things User Disaster Recovery Firewall NAS Smartboard Cloud VPN Remote Desktop Online Payment iPad Mobile Phone BYOD Cloud Computing Web Portal WiFi Internet of Things User Cloud Disaster Recovery
  3. 3. Why Do We Need IT Policy Operation System & Application Control, Security, Mgmt. IT Policy Guidelines & Rules Development Innovation
  4. 4. Operation ■ Teaching and Learning ■ Administration ■ Flip Classroom ■ Online Lesson ■ BYOD ■ Smartboard & Apple TV Operation System & Application Development Innovation
  5. 5. System & Application ■ School Administration System ■ Google & Microsoft ■ Smart Classroom ■ Network System ■ Server ■ VR & AR ■ IoT, Supporting System ■ In-house Programme / Assignment Operation System & Application Control, Security, Mgmt.
  6. 6. Control, Security and Mgmt. ■ Access control (Physical and Network) ■ Account management ■ Subnet, vLAN, VPN ■ Protection Application, Filtering, etc. ■ Version control, encryption, programming language System & Application Control, Security, Mgmt. IT Policy
  7. 7. IT Policy ■ Acceptable Use Policy ■ Network Policy ■ Data and Information Protection Policy ■ Backup Policy ■ Email Policy ■ Disaster Recovery Plan Control, Security, Mgmt. IT Policy Guidelines & Rules
  8. 8. Guidelines & Rules ■ Password rules ■ Two-step verification ■ User training and education ■ User manual and working procedures for IT systems ■ Application for discretion Operation IT Policy Guidelines & Rules
  9. 9. Tips for Policy Making ■ Know your situation ■ Define the problems ■ Collect user requirement from stakeholders ■ Work in team ■ Educate the users ■ Train the trainers ■ Evaluate and start again
  10. 10. Thank You

×