Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Check Lists | 3 |
Computer Networks | 3 |
Computer Security | 3 |
Information Technology | 3 |
School Districts | 2 |
Access to Information | 1 |
Certification | 1 |
Colleges | 1 |
Computer Software | 1 |
Computer Uses in Education | 1 |
Costs | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software