1 / 75

ACSA Academy

ACSA Academy. Technology Seminar 01/24/2009. Technology for the CBO. Why I am here? What I want to see and learn. What will I learn today? Check list Is this going to be techie stuff? The Business of Technology, not the 0’s and 1’s of technology

vernon
Télécharger la présentation

ACSA Academy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACSAAcademy Technology Seminar 01/24/2009

  2. Technology for the CBO • Why I am here? What I want to see and learn. • What will I learn today? • Check list • Is this going to be techie stuff? • The Business of Technology, not the 0’s and 1’s of technology • There are 10 ways to do everything in computers and a 100 ways to build a network • Best practices

  3. Areas of IT • Personnel • Networks • Servers • Backups • Security • Power • AUP • Internet Asset or liability? • Tech Plan/Erate

  4. Areas of IT • Resources • Discuss the impact of technology in schools • Standards • CALPADS

  5. Technology for Business Managers • 6 things people love to say about IT…. • 6 - IT is nothing but a black hole • 5 - All IT wants is more money • 4 – All IT gets is more money • 3 – Do they eat anything but pizza and Coke? ** • 2 – @#$%^&* the network is down again! • 1 – I can’t understand a word they’re saying.

  6. Personnel

  7. Personnel • Yearly Evaluations • Calendar notes • Improvement Plans • Chain of Command • Training • New Tools • Priorities – Keep the techs focused • Admin, Accounting, Payroll • Servers, Backups • PC’s, Printers, Scanners, PDA • Involve IT in Modernization, New Construction

  8. Personnel • Parts – for troubling shooting • Hard drives, memory • Clothing, Shirts, Jackets • Can you tell the difference between your techs and students? • Same equipment as everyone else

  9. Network

  10. Network • LAN – Local Area Network • WAN – Wide Area Network • Switches – No hubs • Wiring – Cat5e or better • Fiber – Where needed • Multi-mode for short runs • Single-mode for long runs • Router – 5 years or newer

  11. Network Check list • Is the LAN an all switched network? • Is all wiring Cat5e or better? • Do we have fiber where needed? • Do we have network documentation? • Get the information out of their heads • Network, DNS, Timesync • WAN • Phones • IP Scheme – 10.xxx.xxx.xxx

  12. Servers

  13. Servers • Server is the main storage unit for all data • Have a server replacement plan every 4-6 years. • Plan on storage space for 3-5 years • Limit storage space or it will be used up in a week • OS Updates • Microsoft Critical updates, WSUS • Novell Service Packs (SP5, SP6, SP7….)

  14. Servers • Is the server in a physically safe place? • Is the room locked? • Is the room air-conditioned? • Who has access to the room? • Who really needs access? • Is the room alarmed? • If the server was missing how long would the list of suspects be?

  15. Virtualization Many to one

  16. Virtualization • One server acting and running as many

  17. Virtualization • Why Virtualization? • Less hardware • Less downtime • Less energy used • Less cooling • Much more efficient use of resources • Less overtime for Tech staff during change out of hardware.

  18. Backup

  19. Backup • How often are you backing up? • Once a week • Twice a week • Once a month • Everyday M-F • Are you doing full backups or differential • Full backup - every file every time • Differential - only modified files since last full backup • How many tapes would it take to recover a server?

  20. Backup • Where are your tapes stored? • All tapes should be stored in a fire proof safe • Are all backup jobs logged everyday? • Every backup job should be checked everyday by a tech and hand logged into a binder that is kept with the tapes • Who is responsible for this?

  21. Backup • BACKUP PROCEDURES • These procedures are for the backup and safe recovery of SUHSD data. These procedures are to be followed at all times. Under NO circumstance are these procedures to be overruled except by order of the Director of IT. • All backup tapes will be rotated every night except holidays and weekends. In the event the site technician will be gone, arrangements should be made by that technician to ensure tape rotation. • All backup jobs will be logged in the Log Book. • Any continuing failure of backups should be brought to the attention of the senior technician or the Director of IT. • All tapes will be kept in the fireproof safe at all times. • Previous week’s tapes will be moved to another building or safe on campus each Monday. • From each site backup system one tape each month will be placed in the District Office safe • Before any upgrade or other possible data-impacting event, a special backup will be done to ensure data safety.

  22. Backup • Are the backup tapes tested? • Tapes should be tested once a month • Note: test files at the end of the tape • Offsite storage • Are tapes stored offsite in a secure location • Note: employee’s home is not a secure location

  23. Security

  24. Security • Physical security of assets • Passwords • Firewall • Email/Spam • Anti Virus • Content Filtering

  25. Security • Physical Security • Are servers in a locked room? • Are video cameras used around lab areas • Memory, mouse, cards, CPU’s • Are PCs asset tagged and inventoried?

  26. Security • Passwords • How offend are passwords changed for users? • How offend are passwords changed for servers? • Are passwords complex? • food12 • Can passwords be repeated over and over? • Do switches, copiers, printers, phones systems, A/C systems have passwords assigned?

  27. Security • Passwords • Do you have a list of the passwords? • Routers, SNMP-RO, RW • Switches • Servers • Copiers, printers • Phone system, Voicemail • Applications • BIOS

  28. Security • Firewall • Who manages your firewall? • Are you restricting outbound traffic? • Can anyone send email from their PC out to the Internet? • Do you allow spamming from inside your network? • Do you have a DMZ on your network? • How quickly can you adapt? • Are you monitoring log files? • How old is your firewall? • Many older firewalls can not thaw new threats or adapt to new technology

  29. Security • Email/Spam • Are you winning the battle? • Do you even care anymore? • What products are being used? • Do you check every email for a virus before it gets to your PC? • Do you provide email to students? • Note your liability • Can students send any amount of email out? • Can students send emails to staff

  30. Security • Email/Spam • Do you allow IM (Instance Messenger)? • Note: IM is not track able • Retention of emails

  31. Security • Anti Virus • Do all servers have anti virus installed? • Do all computers have anti virus installed? • How often is your anti virus updated? • Every day • Every week • Every month • Every hour • Can you identify which computers have current anti virus software from a central command point? • Can you “push” new anti virus software/updates to your computers? • Can your computers get updates from a local server?

  32. Security • Content Filtering • How many connections to the Internet does your district have? • Note: If it is more than one, you might be in trouble • Who provides your content filtering? • How good is the filtering? • How often is the database updated? • Can you add sites to be blocked? • Can you block individual students? • You must have content filtering - CIPA

  33. Security • Content Filtering • Do you filter ? • IM • Chat rooms • Hate sites • Web email • Drug sites, Shopping sites • Sports sites - fantasy football… • Hacker sites • Gambling, Games • Argument – “But I need to get to all these web sites for my class!!!” • Rebuttal – “How does this web site correlate with the class curriculum?” • Note: There is no filter that can identify the difference between a picture of a naked woman or a Monet

  34. Video Monitoring • Camera System Demo • Board Policy

  35. Power

  36. Power/Electrical • Electricity – the life blood of computers • UPS – keeps the blood clean and safe • Do you have dedicated circuits for servers? • Do you have servers, routers, and phone systems on UPS? • How long can your UPS run? • 10 minutes? • 1 hour? • 5 hours? • What happens when you lose power?

  37. Power/Electrical • Do you have a small 3-6 Kw generator to keep the phones up for emergency communications? • Do you have a test schedule for UPS? • Test bi- annual • Batteries typically need to be replaced every 2-3 years • Most UPS have to much equipment plugged in to them • Are you using an IP phone system? • Do you have a UPS at every desk for emergency power? • Are your phones powered from the switch?

  38. Scenario #1 • You have been told that a teacher is “seeing a 16 year old student”. You start to check out the rumor and find that it is very credible. You are told that the two email each other all day long. You have IT read the emails in the teachers’ school email box and watch the emails from the students’ hotmail account. You find the teacher is “way over” the line and you confront the teacher. The teacher says you have violated his/her civil rights and broken federal wire tap laws, and he/she going to sue the district for everything it’s worth. • Q. Was the reading of both emails OK? • Q. Does the student have a right to privacy concerning their emails which is out of school control. • Same scenario, but the teacher uses the telephone to call the student which is VoIP. The district owns the phone. IT captures the VoIP data off the network and plays it back for you the Administrator. • Q. Was the capture of VoIP data OK?

  39. Scenario #2 • A teacher has been accused of viewing pornography in the classroom. The accusations come from a TA who the teacher released earlier in the semester. You ask IT to investigate. IT informs you that over 14 different students have logged on and used the computer in the last 8 months, in addition to the teacher and 2 subs. The pictures are stored in a common area of the local hard drive. Note: One of the 14 students is a board members daughter and another is a District employee’s son. • Q. What do you do?

  40. Scenario #3 • A man who claims to be from the Sacramento FBI branch office calls you up and demands that you give him the address, phone number and email of a girl that in enrolled in one of your schools. He explains that they are investigating a crime and he needs the information ASAP and the girls’ safety depends on it. • Q. What do you do?

  41. AUP

  42. AUP • Acceptable Use Policy – AUP • Do you have one? • Do you make everyone sign it every year? • Students • Teachers • Staff • Note: place the AUP in the Teacher and Student handbook and send it to staff every year.

  43. AUP • The main areas of the AUP • Define what Acceptable Use is • Its a privilege, not a right! • We will monitor, nothing is secret. • Be nice - Network Etiquette • Security • Prohibited Activities and Content • Controversial Materials • No Warranties - implied or otherwise • Posting of materials on District web sites

  44. AUP • Software Licensing… Make sure its legal • Local Area Network use • Sanctions… Put some ouch in to it!! • Note: EC 48900(f)(t) Expulsion for harming data • Unlawful access to school data is now a felony • Proprietary Information… • Its your information - protect it

  45. Internet • CIPA – Federal programs: CIPA compliance is required when using funds for particular purposes from three federal programs: E-rate, Title II D (Ed Tech), and LSTA. When a school or library receives discounts from the E-rate program, its CIPA requirements take precedence over the requirements in the II D or LSTA sections of CIPA. • Myspace • CGI Proxies www.getpast.us

  46. Tech Plan/Erate

  47. Tech Plan/Erate • Technology plans are required by EC51871.5, AB598 in order for schools to receive any technology grant money • EETT • Perkins • Microsoft settlement money • Note: to receive basic Telco Erate $$ only, you don’t need a tech plan • Only do a EETT tech plan, with an Erate addendum

More Related