• 沒有找到結果。

Security VS Convenience

N/A
N/A
Protected

Academic year: 2022

Share "Security VS Convenience"

Copied!
22
0
0

加載中.... (立即查看全文)

全文

(1)

KAM WAI MING Principal of HKSKH Bishop Hall Secondary School Chairman of Hong Kong Association for Computer Education

The roles of school management and technical

support staff on implementing information and

network security measures

(2)

Security VS Convenience

(3)
(4)
(5)
(6)

Building a Cyber-Secure Culture

• Mindset

Given the prevalence of cyber attacks, we need to stay alert and prepared.

• Leadership

Set overall direction, establish priorities, maintain influence, and mitigate risks

School IT Team should model good personal security habits based on guidelines

• Training and Awareness

Awareness training programs build an

understanding of risks and provide specific steps for mitigating them.

(7)

Managing and Maintaining Cyber-security in School

• Policies and Procedures

• Infrastructure and Technology

• Education and Training

• Standards and Inspection

(8)

Policies and Procedures

• Include cyber risks in the school risk management process

• Nominate right person responsible for cyber security issues

• Systematic and regular review of cyber security policies, at least on an annual basis

• Ensure policies and procedures that incorporate cyber security concerns are in place

• Establish a routine reporting process for cyber risks within the school _

• Maintenance, Monitoring, and Analysis of audit logs

• Record cyber security incidents and actions taken

(9)

Infrastructure and Technology

• Secure configurations for hardware and software on mobile devices, laptops, workstations, and servers

• Ensure that appropriate filtering and monitoring is in place.

• Inventory of Authorized and Unauthorized Devices

• Managing user privileges

• Malware prevention

• Patch system software and application software

• Data Recovery Capability _

• Limitation and Control of Network Ports, Protocols, and Services

• Data Protection

(10)

ISP LINE A ISP LINE B ISP LINE C

Firewall Outbound Bandwidth Management

Wi-Fi Network and Existing School Network (Model 1)

Teacher

Wifi Network School existing Network

VLAN 2 VLAN 1

Student Wifi Network Guest

Wifi Network

VLAN 3

(11)

ISP LINE A

Wifi Network

ISP LINE B

School existing Network

Wi-Fi Network and Existing

School Network (Model 2)

(12)

ISP LINE A ISP LINE B ISP LINE C

Firewall Outbound Bandwidth Management

Wi-Fi Network and Existing School Network (Model 3)

Wifi Network School existing Network

VLAN 1 VLAN 2

(13)

Wifi Access Control

• Password login and password change regularly

• Bandwidth15Mbps/15Mbps

• Disconnect after 2hours

SSID :

BHSS_GUEST

• Student account login

• Bandwidth15Mbps/20Mbps

• Need to relogin after 3 days disconnect

SSID :

BHSS_STUDENT

• Teacher account login

• Bandwidth 40Mbps/40Mbps

• Need to relogin after 3 days disconnect

SSID :

BHSS_TEACHER

• MAC-based authentication

• Bandwidth20Mbps/30Mbps

SSID : elearning

(14)

Mobile device management

Device Enrollment Program (IOS) / Zero Touch Enrollment (Android)

• Force the device to enroll with SimpleMDM

• Select which SimpleMDM group devices should initially join

• Disable users ability to un-enroll from SimpleMDM manually

• Place device in supervised mode

Skip passcode setup, location services, restoring from

backup, signing in to Apple ID and iCloud, Apple Pay setup

(15)

Education and Training

Ensure the whole school community is aware of what is

appropriate online behaviour and understand the sanctions for misuse.

For teachers :

Implement regular training for all members of staff

For TSS :

Refresh knowledge and skill at regular intervals to enable them to keep up-to-date with current research,

legislation and trends

(16)

Education and Training

For students :

- Ensure that appropriate cyber security education is embedded throughout the curriculum; promoting the

responsible use of technology and empowering students to keep themselves and others safe online

- Actively engage with events to promote positive online behavior

For parents :

Ensure that online safety is promoted to parents through a variety of channels and approaches

(17)

http://medialiteracy.hk/

(18)

https://www.hkace.org.hk/

(19)

Standards and Inspection

• Evaluate the delivery and impact of the settings security policy and practice

• Review any reported online safety incidents to inform and improve future areas of teaching, training and

policy development

• Regular Vulnerability Assessment and Remediation

(20)
(21)

Further resources

School e-Security Checklist –

• 20 e-security controls

https://www.tripwire.com/state-of-security/secur ity-data-protection/20-critical-security-controls- control-1-inventory-of-authorized-and-unautho rized-devices/

• 10 steps to protect your school’s network

http://www.nen.gov.uk/advice/10-steps-to-prot

ect-your-school-s-network-a-guide-for-school-l

eaders

(22)

THANK YOU

參考文獻

相關文件

Teacher / HR Data Payroll School email system Exam papers Exam Grades /.

Classifying sensitive data (personal data, mailbox, exam papers etc.) Managing file storage, backup and cloud services, IT Assets (keys) Security in IT Procurement and

 Service Level Agreement – ensure at least 99.7% availability of the WiFi service, support four-hour response time and four-hour service recovery with active monitoring,

• A formal usage policy and procedures should be in place, and appropriate security measures should be adopted to protect against the risks of using mobile computing and

Skype provide better security than most VoIP system and PSTN. – Just because most VoIP system and PSTN do not provide any

Certified Information Systems Security Professional (CISSP). Certified Information Systems Security

Security and privacy related literatures [19] focused on methods of preserving and protecting privacy of RFID tags; the RFID reader collision avoidance and hidden terminal

Through the help of this study, the inconvenient of insufficient information of biological pilot plant can be improved, the manufacture security can be promoted, and the