1 / 21

Information Security in K-12 Education

Explore current trends impacting K-12 education, such as constrained budgets and increasing internet use, and discover how to ensure information security while empowering teachers, engaging parents, and meeting educational standards.

mwestling
Download Presentation

Information Security in K-12 Education

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

  2. Current Trends That ImpactOur Conversation • Constrained budgets • Increasing use of Internet • Parent communications • Online assignment/announcementboards • Curriculum delivery • School and district Web sites w/ links • Increased need/adoption of high-speed connections • Support for student computer labs/usage • Increased regulation of electronic information-handling

  3. The Net Net High-speed Internet usage has becomea “given”among students andtheir families. But there’s no give in the system…

  4. Serving Multiple Constituencies • Helping students excel with best infrastructure possible • Empowering teachersto do their best work • Meeting mandatedachievement standards • Doing everything possibleto engage parents • Operating inside budget • Satisfying regulatory requirements for information safety

  5. More Reliance on The Internet • School e-mail to communicate withparents and students • Delivery of curriculum videosor structured tutorials • Inter-connection of campusesvia VPN • Increasing reliance onsupport services delivered by third-parties • Hosted assignment and activity boards • School Web sites as transactional environments • Fundraising and scheduling

  6. Countering the Cost of IT • Protecting the systems you have • Preventing hacking/intrusions • Blocking viruses and other malware • Preventing bandwidth “piracy” forwired and wireless networks • Maximizing return on your investmentin new systems • Getting full value of your high-speed connections • Guarding against the liabilities of misuse or shortfall vs. regulations • Securing personal information • Assuring smooth, successful audits for regulatory compliance

  7. IT Challenges • Resources – tight budgets…doing more with less • Compliance – satisfying the letterand spirit of information protectionregulations • Management – dealing with disparate systems, a “perimeterless” organization and the ability to scale

  8. Information Security Considerations • Intrusion prevention and detectionfor wired and wireless networks • Content filtering to preventunacceptable Internet usage • Anti-virus and anti-malware • Backup and recovery;file retention and protection • Minimal latency to assure full use of available bandwidth • Centralized security management and reporting to assure regulatory compliance and completeness of audits

  9. Information Security Considerations • Clever student hackers • Make sport of beating the system • Trying to hijack school systems forpersonal use • Peer-to-peer file sharing;networked gaming; etc. • May try to alter or destroy schoolrecords; vandalize school Web site • Inadvertent or deliberate access tounacceptable online content • General purpose threats: viruses; spyware; spam; phishing

  10. An Integrated, Layered Approach Comprehensive security addresses all your needs and enables rapid response to new opportunities Auditing Reporting Enforced Protection Centralized Management Content Filtering Intrusion Prevention Anti-virus Firewalls Backup Connectivity Distributed Wireless Virtual Private Networking (VPN)

  11. Expanded Network Security Requirements As threats move up, network safeguard requirements increase Threats Move to Application Layer Protection/Performance Increases 2008? Multi-tiered High-Speed Protection Unknown/Malicious Application Traffic 2007 Application Layer Access Controls Growth in Real-time Traffic File & Content Inspection 2005 More-Evasive Attacks Application Layer Support Protection Requirements Network Borne AVThreats Deep Packet Inspection & IPS 2003 DoS, High Speed Worms Stateful inspection Source: Gartner

  12. Application Layer Filtering • Does more than just watch/block ports • More robust security with easiermanagement and better user experience • Prevents access to proxy-basedapplications (YouTube, etc.) • Can be dialed-down to producepainfully slow access • Frustrated users blame connectionand don’t try work-arounds • SonicWALL NSA Series delivers highest throughput in the industry; minimal latency • Maximizes value of your high-speed connection • Reduces/eliminates the need for increased bandwidth

  13. SonicWALL Today • Market Leader: Secure Networking, Secure Content Management and Business Continuity • Technology:Rich portfolio of innovative and interoperable solutions that outperform others in their range and that are easy to install, use and manage • Support: Significant investment in support to in-source and improve technical competency. Great attention to customer satisfaction, first day resolution and response time Our industry footprint has expanded to anticipate the changing market requirements

  14. Industry Recognition SSL VPN Best in Class

  15. Strong Compliance Support Policy and Management Enforcement • Centralized Management (Encrypted and Authenticated) • Strong Access Control (Read, Write, etc.) • Comprehensive Audit Trails (Monitoring, Reporting, Logging) • Dynamic Vulnerability Management (UTM Subscriptions) FISMA E-Rate CIPA NCLB

  16. SonicWALL Solutions Provide • Application-layer perimeter security, inc. wireless access • Control of third-party points of access • Service providers • Contractors • Content filtering • Control of “casual contact” like email communications and outbound Web access • Data backup and recovery • Centralized security management and reporting to assure regulatory compliance

  17. Basic Secure Network:Distributed Multi-Campus Staff Admin UTM UTM SSL VPN CDP CDP Secure Wireless DISTRICT Service Providers Home Users/ Parents SecureWireless Network Mgt. Mobile Staff Student / Guest Campus

  18. Make Your Budget Go Farther

  19. Biblionet Groningen DePaul University Goucher College Kansas City, Missouri School District Rush Croft Sports College South Dakota School District Southwestern Law School SonicWALL Education ReferenceCustomers

  20. Summary • The quality of your programs is increasingly tied to your Internet-based activities • Your high-speed Internet connection is a precious asset • Misuse of your connection leaves you vulnerable to liability and threatens your programs and your budget • SonicWALL has proven network security solutionsthat can do the most for your budget andyour high-speed Internet connection

  21. Thank You!

More Related