1 / 28

ICT

ICT. Laptops Passwords Encryption Back-ups Data Protection Email and the Internet Viruses Social Networking / Professional Conduct. Care of Laptops. No food or drink Do not hold heavy objects over the keys Use the carry case & zip it up! Close lid and support laptop by base

vwheeler
Télécharger la présentation

ICT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICT • Laptops • Passwords • Encryption • Back-ups • Data Protection • Email and the Internet • Viruses • Social Networking / Professional Conduct

  2. Care of Laptops • No food or drink • Do not hold heavy objects over the keys • Use the carry case & zip it up! • Close lid and support laptop by base • Beware of trailing cables • Take care to align pins when connecting to projector

  3. Projectors CONNECT all cabling first Power up the PROJECTOR Switch the LAPTOP on

  4. Passwords • Passwords should be at least eight characters long and contain at least one of each of the following characters: • Upper case letter • Lower case letter • Number • Symbol (!£$%^&*()_+@~#<>? etc.) • Best password length > 13 characters • Best to change at least every ninety days

  5. Avoid Using • Dictionary words in any language • Words spelled backwards, common misspellings, and abbreviations • Sequences or repeated characters • 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) • Personal information • Your name, birthday, driver's license, passport number, or similar information

  6. Memorising • Writing a password down is OK but: • Keep it safe and secure • Do not store it near or on the computer • No post it notes on monitors!

  7. Permutations • Based on an 8 character password

  8. Top 10000 Passwords • From an analysis from real server breaches on the Internet • Passwords in the list are used by 99.8% of all users • 40% of all passwords appear in the top 100 • 71% of all passwords appear in the top 500

  9. Encryption • Means of scrambling data so that it can only be accessed with a password / key • Protect the encryption password with extreme diligence • Only effective when the machine is off or device is removed

  10. Backup • Suitability from best to worst: • CD (700MB) / DVD (4.7GB) • External hard disc (500GB) • Web based backup service (2-5GB) • USB memory stick (32GB) • Doing nothing • There are potential security & data protection issues with web based services

  11. Backup Procedure • Always use COPY and not MOVE • Verify that you can open backed up files • Best to do regular full backups • A least termly • Backups will not be encrypted • Make it easy and save all files in one location e.g. C:\Data

  12. Data Protection • Data protection applies to printed documents as well as electronic data • Schedule 7 of the DPA: • Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

  13. Security Breach Examples • Imagine a potential security breach: • Leaving unencrypted data on a USB key • Leaving printed documents on public transport • Losing your phone • Losing your laptop • Disclosing your password

  14. Document Handling • Data or documents containing personal data must: • Be secured in a locked cabinet or area • Be protected by a strong password • Have access restricted to appropriate personnel only • Be encrypted before transfer • Not be left in plain view • Be destroyed securely

  15. Email • Never provide personal details in an email or in response to an email request • Check the sender – does the address look right? • Avoid links in emails • Does the email 'ring true'? • Look out for URLs ending in .tk .cc .info

  16. 'Reset' Email Example

  17. UPS Email Example

  18. Junk / Spam Folder

  19. Have You Been Hacked?

  20. Internet • Beware of pop-ups • Beware of obfuscated links • Inappropriate web sites • Virus scams

  21. Pop-up Blocker • Under Tools menu in IE9 • Make sure it is turned on • Close pop-ups with ALT+F4

  22. Obfuscated Links • Harmful addresses hidden behind innocuous looking links • Google image search • Link text can be anything Obfuscation

  23. Anti Virus Programs • Two programs are in general use: • Sophos • Microsoft Security Essentials

  24. Detection Results

  25. Social Networks • Do not use on school provided computers • Be mindful of your 'on-line reputation' • No-one under 13 should be using Facebook • Do not 'friend' students

  26. Professional Conduct • ...uphold public trust in the profession and maintain high standards of ethics and behaviour, within and outside school... https://www.education.gov.uk/publications/eOrderingDownload/teachers%20standards.pdf

  27. Esafety

  28. Advice and Support www.saferinternet.org.uk www.getsafeonline.org www.ico.gov.uk

More Related