NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,201 to 1,215 of 1,592 results Save | Export
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Vandegrift, Kay E. – School Library Journal, 1996
Describes procedures for librarians interested in building a World Wide Web site. Highlights include hypertext markup language; home pages; determining audiences and purposes; promoting safety; the planning process, including text length and density, links to external sites, and maintenance; and copyright concerns. (LRW)
Descriptors: Audiences, Computer Security, Copyrights, Planning
Wodarz, Nan – School Business Affairs, 2001
A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)
Descriptors: Computer Security, Computer Software, Electronic Mail, Elementary Secondary Education
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management
Peer reviewed Peer reviewed
Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Black, Thomas C.; Mohr, John – College and University, 2004
In this electronic age, where information is digital and service is virtual, the registrar profession is changing rapidly to keep up with increasing standards and expectations. EDI and now XML standards enable system-to-system exchanges of academic records information. While many of the registrar's profession display student academic records under…
Descriptors: Academic Records, Technological Advancement, Computer Security, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Cordes, Christofer Sean – EDUCAUSE Quarterly, 2005
Spyware is the general term that describes a collection of technologies that help external parties in "gathering information about a person or organization without their knowledge." In addition to the minor annoyances spyware generates, such as redirected pages, redirected searches, and pop-up ads, a spyware infection can have more malicious…
Descriptors: Internet, Prevention, Computer Security, Information Technology
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua – ETS Research Report Series, 2006
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
Descriptors: Computer Assisted Testing, Adaptive Testing, Test Items, Computer Security
Peer reviewed Peer reviewed
Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Descriptors: Computer Networks, Computer Security, Computer Software, Corporations
Peer reviewed Peer reviewed
Lester, Dan – Library Computing, 1999
An experienced library technology manager relates what happened in the wake of a serious library computer virus attack, which he accidentally unleashed. The narrative describes the combination of coincidences, mistakes, assumptions, and delays that caused the incident, and outlines the 10 key lessons learned. (AEF)
Descriptors: Computer Security, Electronic Mail, Library Equipment, Library Networks
Pages: 1  |  ...  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85  |  ...  |  107