SlideShare a Scribd company logo
KAM WAI MING
Chairman
Hong Kong Association for Computer Education
Cyber Security Risks in Schools
Security VS Convenience
Building a Cyber-Secure Culture
• Mindset
• Given the prevalence of cyber attacks, we need to
stay alert and prepared.
• Leadership
• Set overall direction, establish priorities, maintain
influence, and mitigate risks
• School IT Team should model good personal
security habits based on guidelines
• Training and Awareness
• Awareness training programs build an
understanding of risks and provide specific
steps for mitigating them.
Managing and Maintaining
Cyber-security in School
• Policies and Procedures
• Infrastructure and Technology
• Education and Training
• Standards and Inspection
Policies and Procedures
• Include cyber risks in the school risk management process
• Nominate right person responsible for cyber security issues
• Systematic and regular review of cyber security policies, at
least on an annual basis
• Ensure policies and procedures that incorporate cyber
security concerns are in place
• Establish a routine reporting process for cyber risks within
the school
• Maintenance, Monitoring, and Analysis of audit logs
• Record cyber security incidents and actions taken
Infrastructure and Technology
• Secure configurations for hardware and software on
mobile devices, laptops, workstations, and servers
• Ensure that appropriate filtering and monitoring is in
place.
• Inventory of Authorized and Unauthorized Devices
• Managing user privileges
• Malware prevention
• Patch system software and application software
• Data Recovery Capability
• Limitation and Control of Network Ports, Protocols,
and Services
• Data Protection
ISP LINE A ISP LINE B ISP LINE C
Firewall Outbound Bandwidth Management
Wi-Fi Network and Existing
School Network (Model 1)
Teacher
Wifi Network
School existing
Network
VLAN 2 VLAN 1
Student
Wifi Network
Guest
Wifi Network
VLAN 3
ISP LINE A
Wifi Network
ISP LINE B
School existing
Network
Wi-Fi Network and Existing
School Network (Model 2)
ISP LINE A ISP LINE B ISP LINE C
Firewall Outbound Bandwidth Management
Wi-Fi Network and Existing
School Network (Model 3)
Wifi Network School existing
Network
VLAN 1 VLAN 2
Mobile device management
Device Enrollment Program (IOS) /
Zero Touch Enrollment (Android)
• Force the device to enroll with SimpleMDM
• Select which SimpleMDM group devices should
initially join
• Disable users ability to un-enroll from SimpleMDM
manually
• Place device in supervised mode
• Skip passcode setup, location services, restoring from
backup, signing in to Apple ID and iCloud, Apple Pay setup
Education and Training
• Ensure the whole school community is aware of what is
appropriate online behaviour and understand the sanctions
for misuse.
• For teachers :
Implement regular training for all members of staff
• For TSS :
Refresh knowledge and skill at regular intervals to enable
them to keep up-to-date with current research,
legislation and trends
Education and Training
• For students :
- Ensure that appropriate cyber security education is
embedded throughout the curriculum; promoting the
responsible use of technology and empowering students to
keep themselves and others safe online
- Actively engage with events to promote positive online
behavior
• For parents :
Ensure that online safety is promoted to parents through a
variety of channels and approaches
http://medialiteracy.hk/
https://www.hkace.org.hk/
Standards and Inspection
• Evaluate the delivery and impact of the settings security
policy and practice
• Review any reported online safety incidents to inform
and improve future areas of teaching, training and
policy development
• Regular Vulnerability Assessment and Remediation
Further resources
School e-Security Checklist –
• 20 e-security controls
https://www.tripwire.com/state-of-security/secur
ity-data-protection/20-critical-security-controls-
control-1-inventory-of-authorized-and-unautho
rized-devices/
• 10 steps to protect your school’s network
http://www.nen.gov.uk/advice/10-steps-to-prot
ect-your-school-s-network-a-guide-for-school-l
eaders
THANK YOU

More Related Content

What's hot

3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
Donald E. Hester
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
everestsky66
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
K-12 School Campus Safety and Security
K-12 School Campus Safety and SecurityK-12 School Campus Safety and Security
K-12 School Campus Safety and Security
patricia franklin
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
patricia franklin
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
mdhague
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Nihal Jani
 

What's hot (20)

3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
CyberSecurity - Linda Sharp
CyberSecurity - Linda SharpCyberSecurity - Linda Sharp
CyberSecurity - Linda Sharp
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Ch.8[1]
Ch.8[1]Ch.8[1]
Ch.8[1]
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
K-12 School Campus Safety and Security
K-12 School Campus Safety and SecurityK-12 School Campus Safety and Security
K-12 School Campus Safety and Security
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cyber Security Risks in Schools

Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
JasonTrinhNguyenTruo
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
canpaksolutions04
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
Rebecca Avery
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
Jisc
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
Mark Boorman
 
Isaca tech session 19 feb 2013 securing mobile devices rev
Isaca tech session 19 feb 2013   securing mobile devices revIsaca tech session 19 feb 2013   securing mobile devices rev
Isaca tech session 19 feb 2013 securing mobile devices rev
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
Internetwork Engineering (IE)
 
Esafety for Ofsted - Icon Learning
Esafety for Ofsted - Icon LearningEsafety for Ofsted - Icon Learning
Esafety for Ofsted - Icon Learningbellla33
 
Nursery school system management ppt.pptx
Nursery school system management ppt.pptxNursery school system management ppt.pptx
Nursery school system management ppt.pptx
ImmanImman6
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
NAFCU Services Corporation
 
Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...
CloudMoyo
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
Rebecca Avery
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352llh67aggie
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
DigitalMarketing166846
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
Martin Lawrence
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
AIS Network
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 

Similar to Cyber Security Risks in Schools (20)

Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Isaca tech session 19 feb 2013 securing mobile devices rev
Isaca tech session 19 feb 2013   securing mobile devices revIsaca tech session 19 feb 2013   securing mobile devices rev
Isaca tech session 19 feb 2013 securing mobile devices rev
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
Esafety for Ofsted - Icon Learning
Esafety for Ofsted - Icon LearningEsafety for Ofsted - Icon Learning
Esafety for Ofsted - Icon Learning
 
Nursery school system management ppt.pptx
Nursery school system management ppt.pptxNursery school system management ppt.pptx
Nursery school system management ppt.pptx
 
Resum
ResumResum
Resum
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 

More from eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
eLearning Consortium 電子學習聯盟
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
eLearning Consortium 電子學習聯盟
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
eLearning Consortium 電子學習聯盟
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
eLearning Consortium 電子學習聯盟
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
eLearning Consortium 電子學習聯盟
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
eLearning Consortium 電子學習聯盟
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
eLearning Consortium 電子學習聯盟
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
eLearning Consortium 電子學習聯盟
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
eLearning Consortium 電子學習聯盟
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
eLearning Consortium 電子學習聯盟
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
eLearning Consortium 電子學習聯盟
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
eLearning Consortium 電子學習聯盟
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
eLearning Consortium 電子學習聯盟
 

More from eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Cyber Security Risks in Schools

  • 1. KAM WAI MING Chairman Hong Kong Association for Computer Education Cyber Security Risks in Schools
  • 3.
  • 4.
  • 5.
  • 6. Building a Cyber-Secure Culture • Mindset • Given the prevalence of cyber attacks, we need to stay alert and prepared. • Leadership • Set overall direction, establish priorities, maintain influence, and mitigate risks • School IT Team should model good personal security habits based on guidelines • Training and Awareness • Awareness training programs build an understanding of risks and provide specific steps for mitigating them.
  • 7. Managing and Maintaining Cyber-security in School • Policies and Procedures • Infrastructure and Technology • Education and Training • Standards and Inspection
  • 8. Policies and Procedures • Include cyber risks in the school risk management process • Nominate right person responsible for cyber security issues • Systematic and regular review of cyber security policies, at least on an annual basis • Ensure policies and procedures that incorporate cyber security concerns are in place • Establish a routine reporting process for cyber risks within the school • Maintenance, Monitoring, and Analysis of audit logs • Record cyber security incidents and actions taken
  • 9. Infrastructure and Technology • Secure configurations for hardware and software on mobile devices, laptops, workstations, and servers • Ensure that appropriate filtering and monitoring is in place. • Inventory of Authorized and Unauthorized Devices • Managing user privileges • Malware prevention • Patch system software and application software • Data Recovery Capability • Limitation and Control of Network Ports, Protocols, and Services • Data Protection
  • 10. ISP LINE A ISP LINE B ISP LINE C Firewall Outbound Bandwidth Management Wi-Fi Network and Existing School Network (Model 1) Teacher Wifi Network School existing Network VLAN 2 VLAN 1 Student Wifi Network Guest Wifi Network VLAN 3
  • 11. ISP LINE A Wifi Network ISP LINE B School existing Network Wi-Fi Network and Existing School Network (Model 2)
  • 12. ISP LINE A ISP LINE B ISP LINE C Firewall Outbound Bandwidth Management Wi-Fi Network and Existing School Network (Model 3) Wifi Network School existing Network VLAN 1 VLAN 2
  • 13. Mobile device management Device Enrollment Program (IOS) / Zero Touch Enrollment (Android) • Force the device to enroll with SimpleMDM • Select which SimpleMDM group devices should initially join • Disable users ability to un-enroll from SimpleMDM manually • Place device in supervised mode • Skip passcode setup, location services, restoring from backup, signing in to Apple ID and iCloud, Apple Pay setup
  • 14. Education and Training • Ensure the whole school community is aware of what is appropriate online behaviour and understand the sanctions for misuse. • For teachers : Implement regular training for all members of staff • For TSS : Refresh knowledge and skill at regular intervals to enable them to keep up-to-date with current research, legislation and trends
  • 15. Education and Training • For students : - Ensure that appropriate cyber security education is embedded throughout the curriculum; promoting the responsible use of technology and empowering students to keep themselves and others safe online - Actively engage with events to promote positive online behavior • For parents : Ensure that online safety is promoted to parents through a variety of channels and approaches
  • 16.
  • 19. Standards and Inspection • Evaluate the delivery and impact of the settings security policy and practice • Review any reported online safety incidents to inform and improve future areas of teaching, training and policy development • Regular Vulnerability Assessment and Remediation
  • 20.
  • 21. Further resources School e-Security Checklist – • 20 e-security controls https://www.tripwire.com/state-of-security/secur ity-data-protection/20-critical-security-controls- control-1-inventory-of-authorized-and-unautho rized-devices/ • 10 steps to protect your school’s network http://www.nen.gov.uk/advice/10-steps-to-prot ect-your-school-s-network-a-guide-for-school-l eaders