SlideShare a Scribd company logo
1 of 28
Staff and Schools
                                                                               Protecting Students,




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
The Big Three in Education Web Security
 Acceptable Usage Policy (AUP)
 A clear communicable policy of ‘Who, Where, What and When’ is acceptable
 Dynamic Web Content Filtering
 A systems that delivers the AUP and provides control, monitoring and reporting
 Malware Protection




                                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Constantly updated software that protects your users and your network at the web
 gateway (as opposed to individually at the PC) from malware threats
So what can possibly go wrong?
(In approximate order of likelihood);
 Malware Infection
 Student / Employee / Guest Misuse
 Data Loss / Damage




                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Data Protection Breach
 Operational Continuity Failures
 Criminal / Civil Law Infringement
Malware Infection
 Spamming, Denial of Service attacks, identity theft, email
  spoofing, storage of illegal data/images, damage/erasure/theft
  of data, ad serving, scareware (cryptovirology), SEO abuse, DNS
  poisoning, phishing, bypassing security and authentication,




                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  software licence theft …
Via >>>
 Botnets (‘zombie computers’), rootkits, trojans, worms,
  backdoors, droppers, keystroke loggers, spyware, adware,
  dialers …
Student Misuse
 Accessing inappropriate content
 Inappropriate behaviour and bullying
 Social Media abuse/misuse
 Illegal file sharing / copyright theft (music, video and software)




                                                                       Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Identity theft
 Excessive bandwidth consumption (media)
Employee Misuse
 Time Wasting (Social Networking/Shopping/Surfing)
 Harassment / bullying / inappropriate social behaviour
 Accessing and distributing inappropriate content
 Illegal file sharing / copyright theft (music, video and software)




                                                                       Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Excessive bandwidth consumption (media)
 Data loss / theft
 Breaches of Data Protection Act
 Breaches of Confidentiality and Trust
Network ‘Guest’ Misuse
 Responsibility for guests on-line Health & Safety lies with the
  host
 Inappropriate guest activity on a school’s network could become
  the responsibility of the host




                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Malware infection
 Excessive bandwidth consumption (media)
Data Loss
 Malware
  - Data Theft / Deletion
  - Cyptovirologic Extortion
     Data is encrypted by a virus then a payment is extorted for the decryption codes




                                                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Identity Theft
 Breaches of Data Protection Act
 Data and Information Theft by Employees/Contractors
Operational Continuity Failures
 Loss of earnings through ‘downtime’
 Time, energy and money wasted in restoring status quo
 Network disinfection post malware attack
 Human and emotional costs




                                                            Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Restoration of damaged reputation
 Servers and computers seized in criminal investigations
 Potentially huge legal bills
Criminal / Civil Law Infringement
 Health and Safety – the behaviour of your employees and students can
    impact on their mental and physical health
   Vicarious Liability – you can be liable for things your employees and
    students do on-line even though you haven’t sanctioned them
   Negligence – if you fail to take reasonable and appropriate steps to protect




                                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
    others you could be considered negligent
   Data Protection – you are required by law to conform to the DP Act
   Copyright Infringement – anybody sharing music/movies on your network?
   Paedophilic Material – it is a recognised fact that work place computers
    are used to store illegal material
What can you do about it?
 Remember that web security doesn’t only belong to the
    IT department
   Create a web security policy, implement it and constantly review it
   Have a robust, well communicated and effectively policed




                                                                          Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
    Acceptable Usage Policy
   Continuing education of all your users to the threats on the web
   Use effective control and reporting tools
Hot Topics




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
E-Safety Law in Independent Schools




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
E-Safety Law
 Usage of the web should risk assessed in the same way
  as any other school environment e.g. gym or science lab
 The law makes clear distinctions as to who is responsible for
  delivering e-safety at work (and in the school environment)




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  The Head Teacher and Board of Trustees/Governors cannot
  delegate it
 Using appropriate processes and technology can significantly
  reduce the threshold of legal liability and most importantly
  protect students and staff
Web Access Policies
                                                                           Building Flexible Filtering and




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Designing Flexible Policies
 For students:
   - age, year, subject and location specific
   - differentiate work time and personal time
 For staff:




                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
   - work time, personal time and role specific
   - teacher control of web content in the classroom
 For guests:
   - what is acceptable under your ethos and culture?
Mobile Device Integration &
                                                                           Bring Your Own Device Schemes




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Mobile Device Integration
 iOS (iPad) and Android devices present new challenges –
  especially multi-flavoured Android
 ‘Locked down’ browsers are currently the most effective method
  of ensuring content is controlled




                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
BYOD Schemes
 The use of personal mobile tech in schools is inevitable
 Easy access to fast school filtered Wi-Fi will help reduce 3G
  network use
 Protecting from malware at the gateway is currently the most




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  effective strategy
 Continuous education to students, staff and parents about on-
  line threats is the best approach
Devolved Content Management




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Helping Teachers to Teach
 Each web page should be dynamically scanned for inappropriate
  content based on the policy set for the user or group
 Uncategorised web content can be unblocked by teachers in the
  classroom (not IT) without overriding ‘red-line’ policies




                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Resources like YouTube and Google search can be safely used in
  the classroom
 Full visibility of on-line activity and accountability can be
  maintained without constant IT interaction
Managing Social Media & Content




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
YouTube.com/education
 A hugely valuable resource of ‘safe’ educational material
 Schools can add their own approved content to their ‘channel’
  and restrict access to the rest of YouTube




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Managing Social Media
 ‘Read Only’ Facebook – a policy driven ‘look but don’t touch’
  approach allows Facebook to be integrated positively into the
  school environment
 Instant Messaging Management and Censoring – enables useful




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  communication tools to be properly managed and users fully
  accountable
What’s Next?




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Our Crystal Ball …
 Integration with social media and content platforms
 Mobile device filtering to include 3G
 Improved sharing of approved / whitelisted content
  between teachers and schools




                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Contacts
Carly Lynsdale – Independent Education Executive
carly.lynsdale@smoothwall.net
0113 3874178




                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Sean Lazenby – Education Sales Manager
sean.lazenby@smoothwall.net
0113 3874183
Smoothwall presentation feb open day

More Related Content

What's hot

Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 
Trinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortTrinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortCarmella Doty
 
Copyright and Distance Education
Copyright and Distance EducationCopyright and Distance Education
Copyright and Distance EducationHVCClibrary
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impactsBeing Aabis
 
Elearning New Trends
Elearning New TrendsElearning New Trends
Elearning New TrendsHeba Farghaly
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issuestuttitat
 
Online assignment pdf
Online assignment pdfOnline assignment pdf
Online assignment pdfAfiya Nazeer
 
Edc3100 – ict and pedagogy
Edc3100 – ict and pedagogyEdc3100 – ict and pedagogy
Edc3100 – ict and pedagogykaity101
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETBoni
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)David Lamas
 
Copyright crash course revision 2
Copyright crash course revision 2Copyright crash course revision 2
Copyright crash course revision 2smendiola77
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 

What's hot (19)

Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Ethics in ict
Ethics in ictEthics in ict
Ethics in ict
 
M Learning2009 Fsi
M Learning2009 FsiM Learning2009 Fsi
M Learning2009 Fsi
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
Trinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortTrinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 short
 
Copyright and Distance Education
Copyright and Distance EducationCopyright and Distance Education
Copyright and Distance Education
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
Elearning New Trends
Elearning New TrendsElearning New Trends
Elearning New Trends
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Online assignment pdf
Online assignment pdfOnline assignment pdf
Online assignment pdf
 
Edc3100 – ict and pedagogy
Edc3100 – ict and pedagogyEdc3100 – ict and pedagogy
Edc3100 – ict and pedagogy
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNET
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
UPAEP V4CS[4]
UPAEP V4CS[4]UPAEP V4CS[4]
UPAEP V4CS[4]
 
Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)
 
Ict topic 1
Ict topic 1Ict topic 1
Ict topic 1
 
Copyright crash course revision 2
Copyright crash course revision 2Copyright crash course revision 2
Copyright crash course revision 2
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 

Viewers also liked

【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動park101
 
Ch 15 1 Atmosphere Andie
Ch 15   1 Atmosphere AndieCh 15   1 Atmosphere Andie
Ch 15 1 Atmosphere Andiecharsh
 
Why Telehealth
Why TelehealthWhy Telehealth
Why TelehealthweBranding
 
innoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusinnoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusJurjen Helmus
 
Deposition Andie
Deposition AndieDeposition Andie
Deposition Andiecharsh
 
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Cahyo Darujati
 
200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head OfficeWout Visser
 
Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01onnel_91
 
Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)Muhammad Jusuf
 
Chi Wai Lima – Brand Strategist
Chi Wai Lima – Brand StrategistChi Wai Lima – Brand Strategist
Chi Wai Lima – Brand StrategistChi Wai Lima
 
Eric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsEric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsAjax Experience 2009
 
張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院park101
 

Viewers also liked (20)

Artha Graha Peduli
Artha Graha PeduliArtha Graha Peduli
Artha Graha Peduli
 
Movenpick
MovenpickMovenpick
Movenpick
 
【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動
 
Going to 2º ESO
Going to 2º ESOGoing to 2º ESO
Going to 2º ESO
 
Ch 15 1 Atmosphere Andie
Ch 15   1 Atmosphere AndieCh 15   1 Atmosphere Andie
Ch 15 1 Atmosphere Andie
 
Why Telehealth
Why TelehealthWhy Telehealth
Why Telehealth
 
innoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusinnoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmus
 
Deposition Andie
Deposition AndieDeposition Andie
Deposition Andie
 
1st Conditional
1st Conditional1st Conditional
1st Conditional
 
4.2 voorlichting
4.2 voorlichting4.2 voorlichting
4.2 voorlichting
 
Havegot1 eso
Havegot1 esoHavegot1 eso
Havegot1 eso
 
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05
 
200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office
 
Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01
 
Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)
 
Graduate Project Portfolio
Graduate Project PortfolioGraduate Project Portfolio
Graduate Project Portfolio
 
Chi Wai Lima – Brand Strategist
Chi Wai Lima – Brand StrategistChi Wai Lima – Brand Strategist
Chi Wai Lima – Brand Strategist
 
Eric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsEric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing Considerations
 
張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院
 
Love poem
Love poemLove poem
Love poem
 

Similar to Smoothwall presentation feb open day

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of EverythingConnected Futures
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman Security
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revidrissss dddd
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinalAmeya Parab
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCsiansadler
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 

Similar to Smoothwall presentation feb open day (20)

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of Everything
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_rev
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

More from Victoria College

Network First Open Day presentation
Network First Open Day presentationNetwork First Open Day presentation
Network First Open Day presentationVictoria College
 
eLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technologyeLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technologyVictoria College
 
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)Victoria College
 
Heads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving SeatHeads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving SeatVictoria College
 
Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011 Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011 Victoria College
 
The learning platform: digital literacy
The learning platform: digital literacyThe learning platform: digital literacy
The learning platform: digital literacyVictoria College
 

More from Victoria College (7)

Network First Open Day presentation
Network First Open Day presentationNetwork First Open Day presentation
Network First Open Day presentation
 
Saving money with MFDs
Saving money with MFDsSaving money with MFDs
Saving money with MFDs
 
eLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technologyeLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technology
 
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
 
Heads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving SeatHeads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving Seat
 
Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011 Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011
 
The learning platform: digital literacy
The learning platform: digital literacyThe learning platform: digital literacy
The learning platform: digital literacy
 

Recently uploaded

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Recently uploaded (20)

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Smoothwall presentation feb open day

  • 1. Staff and Schools Protecting Students, Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 2. The Big Three in Education Web Security  Acceptable Usage Policy (AUP) A clear communicable policy of ‘Who, Where, What and When’ is acceptable  Dynamic Web Content Filtering A systems that delivers the AUP and provides control, monitoring and reporting  Malware Protection Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Constantly updated software that protects your users and your network at the web gateway (as opposed to individually at the PC) from malware threats
  • 3. So what can possibly go wrong? (In approximate order of likelihood);  Malware Infection  Student / Employee / Guest Misuse  Data Loss / Damage Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Data Protection Breach  Operational Continuity Failures  Criminal / Civil Law Infringement
  • 4. Malware Infection  Spamming, Denial of Service attacks, identity theft, email spoofing, storage of illegal data/images, damage/erasure/theft of data, ad serving, scareware (cryptovirology), SEO abuse, DNS poisoning, phishing, bypassing security and authentication, Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. software licence theft … Via >>>  Botnets (‘zombie computers’), rootkits, trojans, worms, backdoors, droppers, keystroke loggers, spyware, adware, dialers …
  • 5. Student Misuse  Accessing inappropriate content  Inappropriate behaviour and bullying  Social Media abuse/misuse  Illegal file sharing / copyright theft (music, video and software) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Identity theft  Excessive bandwidth consumption (media)
  • 6. Employee Misuse  Time Wasting (Social Networking/Shopping/Surfing)  Harassment / bullying / inappropriate social behaviour  Accessing and distributing inappropriate content  Illegal file sharing / copyright theft (music, video and software) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Excessive bandwidth consumption (media)  Data loss / theft  Breaches of Data Protection Act  Breaches of Confidentiality and Trust
  • 7. Network ‘Guest’ Misuse  Responsibility for guests on-line Health & Safety lies with the host  Inappropriate guest activity on a school’s network could become the responsibility of the host Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Malware infection  Excessive bandwidth consumption (media)
  • 8. Data Loss  Malware - Data Theft / Deletion - Cyptovirologic Extortion Data is encrypted by a virus then a payment is extorted for the decryption codes Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Identity Theft  Breaches of Data Protection Act  Data and Information Theft by Employees/Contractors
  • 9. Operational Continuity Failures  Loss of earnings through ‘downtime’  Time, energy and money wasted in restoring status quo  Network disinfection post malware attack  Human and emotional costs Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Restoration of damaged reputation  Servers and computers seized in criminal investigations  Potentially huge legal bills
  • 10. Criminal / Civil Law Infringement  Health and Safety – the behaviour of your employees and students can impact on their mental and physical health  Vicarious Liability – you can be liable for things your employees and students do on-line even though you haven’t sanctioned them  Negligence – if you fail to take reasonable and appropriate steps to protect Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. others you could be considered negligent  Data Protection – you are required by law to conform to the DP Act  Copyright Infringement – anybody sharing music/movies on your network?  Paedophilic Material – it is a recognised fact that work place computers are used to store illegal material
  • 11. What can you do about it?  Remember that web security doesn’t only belong to the IT department  Create a web security policy, implement it and constantly review it  Have a robust, well communicated and effectively policed Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Acceptable Usage Policy  Continuing education of all your users to the threats on the web  Use effective control and reporting tools
  • 12. Hot Topics Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 13. E-Safety Law in Independent Schools Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 14. E-Safety Law  Usage of the web should risk assessed in the same way as any other school environment e.g. gym or science lab  The law makes clear distinctions as to who is responsible for delivering e-safety at work (and in the school environment) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. The Head Teacher and Board of Trustees/Governors cannot delegate it  Using appropriate processes and technology can significantly reduce the threshold of legal liability and most importantly protect students and staff
  • 15. Web Access Policies Building Flexible Filtering and Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 16. Designing Flexible Policies  For students: - age, year, subject and location specific - differentiate work time and personal time  For staff: Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. - work time, personal time and role specific - teacher control of web content in the classroom  For guests: - what is acceptable under your ethos and culture?
  • 17. Mobile Device Integration & Bring Your Own Device Schemes Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 18. Mobile Device Integration  iOS (iPad) and Android devices present new challenges – especially multi-flavoured Android  ‘Locked down’ browsers are currently the most effective method of ensuring content is controlled Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 19. BYOD Schemes  The use of personal mobile tech in schools is inevitable  Easy access to fast school filtered Wi-Fi will help reduce 3G network use  Protecting from malware at the gateway is currently the most Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. effective strategy  Continuous education to students, staff and parents about on- line threats is the best approach
  • 20. Devolved Content Management Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 21. Helping Teachers to Teach  Each web page should be dynamically scanned for inappropriate content based on the policy set for the user or group  Uncategorised web content can be unblocked by teachers in the classroom (not IT) without overriding ‘red-line’ policies Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Resources like YouTube and Google search can be safely used in the classroom  Full visibility of on-line activity and accountability can be maintained without constant IT interaction
  • 22. Managing Social Media & Content Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 23. YouTube.com/education  A hugely valuable resource of ‘safe’ educational material  Schools can add their own approved content to their ‘channel’ and restrict access to the rest of YouTube Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 24. Managing Social Media  ‘Read Only’ Facebook – a policy driven ‘look but don’t touch’ approach allows Facebook to be integrated positively into the school environment  Instant Messaging Management and Censoring – enables useful Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. communication tools to be properly managed and users fully accountable
  • 25. What’s Next? Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 26. Our Crystal Ball …  Integration with social media and content platforms  Mobile device filtering to include 3G  Improved sharing of approved / whitelisted content between teachers and schools Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 27. Contacts Carly Lynsdale – Independent Education Executive carly.lynsdale@smoothwall.net 0113 3874178 Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Sean Lazenby – Education Sales Manager sean.lazenby@smoothwall.net 0113 3874183

Editor's Notes

  1.  "Mariposa" botnet, which infected more than 12.7 million computers, including half of the companies in the Fortune 1,000 list.'Coreflood Botnet': 'Zombie' Army May Have Infected 2 Million Computers, Stolen Hundreds of Millions of Dollarshttp://abcnews.go.com/Technology/feds-crush-coreflood-botnet-infected-million-computers-stole/story?id=13369529&page=2Serious crime unit flags Virgin botnet infectionshttp://www.pcpro.co.uk/news/security/368125/serious-crime-unit-flags-virgin-botnet-infectionsMicrosoft’s Rustock botnet takedown has reduced infections by over 50%The Rustock botnet was the largest source of spam in the world, consisting of around 150,000 machines sending around 30 billion spam messages a day. http://www.winrumors.com/microsofts-rustock-botnet-takedown-has-reduced-infections-by-over-50/
  2. Responsibility for guests on-line Health & Safety lies with the hostLaw relating to Occupiers’ Liability – network providers have a duty to protect their usersInappropriate guest activity on a school’s network could become the responsibility of the hostIP trackingAccess to inappropriate content and services
  3.