SlideShare a Scribd company logo
NETWORK
T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDisabling and hacking networks are a major threat
to computers at school, home, businesses, or in public
places.
VAnother concern is keeping all data and software
protected from corruptions.
VKeeping email free from spam is also a part of
network security.
Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VOne major misconception is that only those that are computer
illiterate are going to be attacked. Computer specialists are
affected by network security as well. The Y2k was a big scare
for those.
VAnother misconception is those that believe the school districts
can stop malicious attacks and theft of information. Districts
have made technology unpleasant, nonflexible, and difficult
for instruction to take place in the classroom.
T he realities Of Network security
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VCost: Keeping the network secure is a high price to pay.
VSensitive and Confidential Information: District networks usually contain personal
information, grades, assessments of both students and teachers. Many legal implications
can come about if confidentiality is breached.
VStudent Safety: Administrators have to make certain that all students are protected
from harmful content or situations
VTeacher Access and Productivity: Some districts have provided an extremely secure
firewall so teachers can have access to virtual private networks (BPNs) from school and
home.
VAccess and Functionality: This would entail teachers being provided with a server space
for educational websites and Internet access. Teachers need the capability to be able to
transport work from school and home computers.
Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Some common responses include: Restricting Permissions: Users are allowed to complete certain functions.
This can be overridden with a password.
V Blocking Instant Messaging (IM): Misuse of the network and the content that can be viewed through IM.
Many districts have disable this feature.
V Disabling of USB Drives: Illegal downloading and file sharing are the main reasons for USB drives to be
disabled.
V Firewalls, Antivirus, and Spam Filters: Schools are using antivirus software which are installed on the
proxy server.
V Policies and Procedures: The security policies include the roles and responsibilities of network users,
regular maintenance, and implementation of security assessments.
V Restricting Server Use: Some districts forbid the use of the server for classroom and teacher websites.
“Teachers are simply not allowed to upload any files or create access points on the web.” (Robinson, Brown,
& Green, 2010). These district are trying to prevent network security breaches from what teachers are
posting that can accidentally or purposefully harm the network.
A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
V Network Rights Strategies: Acceptable Use Policies (AUPs)- contracts between the school and the
students and teachers to keep the school’s network safe.
V Balance Instructional Needs with Desktop Security: Teachers making sure software being
installed is legal.
V Server Space and Network Use: This will enhance teaching by allowing teachers to use the web
to utilize Web 2.0 tools and create websites, etc. for student learning.
V Monitor Student Use: Districts use software that monitor all the users’ activity while using the
internet.
V Firewalls: Districts need to invest in buying a good firewall that will have fast Internet access
while still blocking the viruses and protecting that servers.
V Security Assessments: District should have a security assessment plan that include knowledge of
security measures, policies, and procedures, characteristics of the network and regular updates,
and how the firewall works.
V Secure Passwords: Teacher should create and memorize passwords.
Sources USED
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access.
International Society for Technology in Education

More Related Content

PDF
Inappropriate use of the network ppt
PDF
Customer Success Story on NuEDUSEC Internet Security Service
PPTX
Cyber Ed
PPSX
E safety training
PPTX
Online Copyright Education
PPTX
How to stop computer crime
PPTX
Internet security software
PDF
eSafety policy
Inappropriate use of the network ppt
Customer Success Story on NuEDUSEC Internet Security Service
Cyber Ed
E safety training
Online Copyright Education
How to stop computer crime
Internet security software
eSafety policy

What's hot (18)

PPT
User wareness
PPTX
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
PPTX
Mobile
KEY
An Administrator's Introduction to Social Networking
DOCX
R esearch report with footnote
PPTX
Technology in the classroom
PPTX
Security awareness
PPT
Erdleymurray Sini2007
PDF
A system to filter unwanted messages from osn user walls
PPTX
Security
PPTX
Network security
PPTX
Educause2011PresentationFinal
PPTX
Security Awareness 9-10-09 v5 Web Browser
PPTX
Saint Maur Gr. 8-12 Bring Your Own Technology
PPTX
Cyber Security Awareness Program
PPTX
Point2Protect - keeping children safe
PDF
WCC Programs Overview
User wareness
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Mobile
An Administrator's Introduction to Social Networking
R esearch report with footnote
Technology in the classroom
Security awareness
Erdleymurray Sini2007
A system to filter unwanted messages from osn user walls
Security
Network security
Educause2011PresentationFinal
Security Awareness 9-10-09 v5 Web Browser
Saint Maur Gr. 8-12 Bring Your Own Technology
Cyber Security Awareness Program
Point2Protect - keeping children safe
WCC Programs Overview
Ad

Viewers also liked (15)

PDF
Spaghettim winter menu dec12
PDF
9 Guia Turistica Recorriendo Caviahue-Copahue
PDF
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
PDF
Insightful Controllership
PPTX
Inclusão digital
DOCX
Matt Stewart Resume1-2
PDF
Thank you Sponsor sign 2014 final
DOC
Head of Quality
DOCX
Portfolio
PDF
14- Guia turistica "Recorriendo Caviahue- Copahue"
DOCX
Daftar calon asisten non mipa 20152
PDF
News stagione 2012/2013
PDF
28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"
PPTX
Marketing and communications tools for historical societies and other history...
PPTX
Portafolio de capacitaciones de sst
Spaghettim winter menu dec12
9 Guia Turistica Recorriendo Caviahue-Copahue
Resultados 2012: La Liga de las Sonrisas y Conectando Sonrisas
Insightful Controllership
Inclusão digital
Matt Stewart Resume1-2
Thank you Sponsor sign 2014 final
Head of Quality
Portfolio
14- Guia turistica "Recorriendo Caviahue- Copahue"
Daftar calon asisten non mipa 20152
News stagione 2012/2013
28 Guia Turistica "Recorriendo Copahue-Caviahue. 2015"
Marketing and communications tools for historical societies and other history...
Portafolio de capacitaciones de sst
Ad

Similar to Network security ppt (20)

PPTX
Staff training session
PPTX
Staff Acceptable Use Policy
PDF
A practical guide to IT security-Up to University project
PDF
Information Security in Schools - Recommended Practice (January 2019)
PPTX
BSAD 372 SPRING 2017 CH 10
PPTX
Digital citizenship project[1]
PPTX
Et 508 week 3 faculty and staff training session
PPT
Internet Acceptable Use Policy
RTF
Lalala
PPTX
02 Educators Role
PPTX
NCSC-Cyber-security-training-for-school-staff.pptx
PPTX
Digital_Cyber-Literacy-Group-2 Reporting.pptx
PPTX
Acceptable use policy
PPTX
Cybersecurity_in_Education_System_Advanced.pptx
PPTX
Cyber Security and Safety in Schools and Educational Institution
PPT
Safety And Security on the Net Podcast
PPT
21st Century Learning Initiative Training Slideshow
PPTX
BYOD and Social Media in Education
PPTX
BYOD & Social Media: The Risks and Benefits for Education
PPTX
Security issues ethics in education chapter 8
Staff training session
Staff Acceptable Use Policy
A practical guide to IT security-Up to University project
Information Security in Schools - Recommended Practice (January 2019)
BSAD 372 SPRING 2017 CH 10
Digital citizenship project[1]
Et 508 week 3 faculty and staff training session
Internet Acceptable Use Policy
Lalala
02 Educators Role
NCSC-Cyber-security-training-for-school-staff.pptx
Digital_Cyber-Literacy-Group-2 Reporting.pptx
Acceptable use policy
Cybersecurity_in_Education_System_Advanced.pptx
Cyber Security and Safety in Schools and Educational Institution
Safety And Security on the Net Podcast
21st Century Learning Initiative Training Slideshow
BYOD and Social Media in Education
BYOD & Social Media: The Risks and Benefits for Education
Security issues ethics in education chapter 8

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PDF
advance database management system book.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Lesson notes of climatology university.
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
RMMM.pdf make it easy to upload and study
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
IGGE1 Understanding the Self1234567891011
advance database management system book.pdf
History, Philosophy and sociology of education (1).pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Weekly quiz Compilation Jan -July 25.pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Lesson notes of climatology university.
202450812 BayCHI UCSC-SV 20250812 v17.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Cell Types and Its function , kingdom of life
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
RMMM.pdf make it easy to upload and study
Chinmaya Tiranga quiz Grand Finale.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Network security ppt

  • 2. T heTHREAT wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VDisabling and hacking networks are a major threat to computers at school, home, businesses, or in public places. VAnother concern is keeping all data and software protected from corruptions. VKeeping email free from spam is also a part of network security.
  • 3. Common Misconceptions wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VOne major misconception is that only those that are computer illiterate are going to be attacked. Computer specialists are affected by network security as well. The Y2k was a big scare for those. VAnother misconception is those that believe the school districts can stop malicious attacks and theft of information. Districts have made technology unpleasant, nonflexible, and difficult for instruction to take place in the classroom.
  • 4. T he realities Of Network security wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VCost: Keeping the network secure is a high price to pay. VSensitive and Confidential Information: District networks usually contain personal information, grades, assessments of both students and teachers. Many legal implications can come about if confidentiality is breached. VStudent Safety: Administrators have to make certain that all students are protected from harmful content or situations VTeacher Access and Productivity: Some districts have provided an extremely secure firewall so teachers can have access to virtual private networks (BPNs) from school and home. VAccess and Functionality: This would entail teachers being provided with a server space for educational websites and Internet access. Teachers need the capability to be able to transport work from school and home computers.
  • 5. Common Responses wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww V Some common responses include: Restricting Permissions: Users are allowed to complete certain functions. This can be overridden with a password. V Blocking Instant Messaging (IM): Misuse of the network and the content that can be viewed through IM. Many districts have disable this feature. V Disabling of USB Drives: Illegal downloading and file sharing are the main reasons for USB drives to be disabled. V Firewalls, Antivirus, and Spam Filters: Schools are using antivirus software which are installed on the proxy server. V Policies and Procedures: The security policies include the roles and responsibilities of network users, regular maintenance, and implementation of security assessments. V Restricting Server Use: Some districts forbid the use of the server for classroom and teacher websites. “Teachers are simply not allowed to upload any files or create access points on the web.” (Robinson, Brown, & Green, 2010). These district are trying to prevent network security breaches from what teachers are posting that can accidentally or purposefully harm the network.
  • 6. A few Recommendations wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww V Network Rights Strategies: Acceptable Use Policies (AUPs)- contracts between the school and the students and teachers to keep the school’s network safe. V Balance Instructional Needs with Desktop Security: Teachers making sure software being installed is legal. V Server Space and Network Use: This will enhance teaching by allowing teachers to use the web to utilize Web 2.0 tools and create websites, etc. for student learning. V Monitor Student Use: Districts use software that monitor all the users’ activity while using the internet. V Firewalls: Districts need to invest in buying a good firewall that will have fast Internet access while still blocking the viruses and protecting that servers. V Security Assessments: District should have a security assessment plan that include knowledge of security measures, policies, and procedures, characteristics of the network and regular updates, and how the firewall works. V Secure Passwords: Teacher should create and memorize passwords.
  • 7. Sources USED wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access. International Society for Technology in Education