Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Information Technology | 3 |
School Districts | 3 |
Technology Planning | 3 |
Computer Networks | 2 |
Computer Software | 2 |
Computer System Design | 2 |
Computer Uses in Education | 2 |
Data | 2 |
Elementary Secondary Education | 2 |
Internet | 2 |
More ▼ |
Author
Smith, Gary | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 2 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Canada | 1 |
New Mexico | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Technology & Learning, 2005
In recent years, the widespread availability of networks and the flexibility of Web browsers have shifted the industry from a client-server model to a Web-based one. In the client-server model of computing, clients run applications locally, with the servers managing storage, printing functions, and network traffic. Because every client is…
Descriptors: Computers, Computer System Design, Internet, Computer Uses in Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software