Security and Privacy

##AUTHORSPLIT##<--->

Concerns over information security have increased since the Sept. 11 terrorist attacks, which emphasized the need for government-wide planning, collaboration and security. This tragedy revealed how federal and local governments had thousands of incompatible information systems, not only to capture and share information about terrorists, but to aid the police officers, fire fighters and rescue crews. The recently established Department of Homeland Security will serve as a central clearinghouse to collect and analyze data related to terrorism. At least eight major agencies and a number of smaller ones will funnel information to this new department. However, in a recent column in The New York Times, William Safire expressed concern that “every purchase you make with a credit card, every magazine subscription you buy, every medicine prescription, every Web site visited and e-mail sent or received, every trip and event attended will go into what the Defense Department describes as a virtual centralized general database.”

Security Steps Up

A variety of security problems was expressed by a group of IT managers and school administrators at the National School Boards Association’s Technology+Learning Conference held last month in Dallas. Concern was expressed regarding both inside and outside security, including network security, proper use of ID cards, spam e-mail, content filtering of information, student disregard of privacy, and protection against hackers. Anti-virus protection is a particular problem, because students bring in disks that contain viruses from home computers that can crash the network.

Plano Independent School District in Texas uses an anti-virus solution that allows the district to manage its approximately 23,000 workstations from a single point of management. All updates are pushed from a centralized location to local servers and configured to work with the desktop so that security is completely transparent to the end user.

Copyright protection and its misuse by students is also a continuing problem. Illegal distribution and piracy of copyrighted material is costing media corporations, the entertainment software industry and publishers billions of dollars. So, content providers have begun to incorporate Digital Rights Management technologies into their products, making CDs using DRM that cannot be played on a computer. But, the interests of consumers as well as those of industries need to be addressed.

Assessment and Technology

At the Technology+Learning Conference, the major emphasis was on the implementation of the No Child Left Behind Act, and the role of technology in assessment and accountability. The assessment requirements hold schools accountable for the achievement of all students. NCLB has major implementations in the areas of assessment and technology. It permits greater flexibility in the delivery of instruction, but mandates extensive accountability and evaluation of the effectiveness of programs, resources and products.

Many conference exhibitors addressed the stringent testing and technology demands, and how their products could assist in gathering, managing and implementing assessment results. Other noteworthy issues at the conference included the growing number of collaborations, the increasing use of wireless and handhelds, as well as the ongoing interest of multimedia presentations in the classroom.

Conclusions

Educators at all levels are finding security issues growing, especially in managing network security. It is a complicated endeavor, and a need for network security specialists is evident. An average of $2 million is spent on security every year by large companies, as reported by respondents to a recent area survey by the FBI. Planning for security is an ongoing process, and prevention is just as important as response. Educational institutions have increased the number of bag and badge checks, and are attempting to create uniformity in their security efforts. However, security is mostly a people issue, not a technology issue, and educating the user is of great importance.

Featured

  • students using digital devices, surrounded by abstract AI motifs and soft geometric design

    Ed Tech Startup Kira Launches AI-Native Learning Platform

    A new K-12 learning platform aims to bring personalized education to every student. Kira, one of the latest ed tech ventures from Andrew Ng, former director of Stanford's AI Lab and co-founder of Coursera and DeepLearning.AI, "integrates artificial intelligence directly into every educational workflow — from lesson planning and instruction to grading, intervention, and reporting," according to a news announcement.

  • toolbox featuring a circuit-like AI symbol and containing a screwdriver, wrench, and hammer

    Microsoft Launches AI Tools for Educators

    Microsoft has introduced a variety of AI tools aimed at helping educators develop personalized learning experiences for their students, create content more efficiently, and increase student engagement.

  • laptop displaying a red padlock icon sits on a wooden desk with a digital network interface background

    Reports Point to Domain Controllers as Prime Ransomware Targets

    A recent report from Microsoft reinforces warns of the critical role Active Directory (AD) domain controllers play in large-scale ransomware attacks, aligning with U.S. government advisories on the persistent threat of AD compromise.

  • Two hands shaking in the center with subtle technology icons, graphs, binary code, and a padlock in the dark blue background

    Two Areas for K-12 Schools to Assess for When to Work with a Managed Services Provider

    The complexity of today’s IT network infrastructure and increased cybersecurity risk are quickly moving beyond many school districts’ ability to manage on their own. But a new technology model, a partnership with a managed services provider, offers a way forward for schools to overcome these challenges.