Descriptor
Computer Networks | 3 |
Computer Security | 3 |
Policy Formation | 3 |
Computer Uses in Education | 2 |
Elementary Secondary Education | 2 |
Guidelines | 2 |
Higher Education | 2 |
Information Technology | 2 |
Internet | 2 |
Privacy | 2 |
Program Implementation | 2 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software