Information Security in Education

From Wikibooks, open books for an open world
Jump to: navigation, search
Credit card theft.jpg
This wikibook is an introduction to information security aimed primarily at K-12 administrators, educators, and (to a lesser extent) technology staff. Security is an important issue for many reasons, but security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.[1]
While many products and marketing representatives may be found to provide information to school leaders on information security, it may be difficult to find unbiased information that addresses many of the issues. Two books used in the research for this wikibook stand out for their authority and point-of-view. The first is Secrets and Lies by Bruce Schneier, one of the world's best know security experts (see ref list below). The second is Little Brother by Cory Doctorow, a respected authority on Internet privacy and policy issues (especially those related to young people)(Doctorow, 2008).[2].
Secrets and Lies provides a broad overview of how to think about and plan for security issues. It includes countless information security examples from the real world. This is the book to provide a contextual framework on information security to educational leaders. Little Brother has been acclaimed as a modern-day version of George Orwell's Nineteen Eighty-Four Like Orwell's work, it provides a vivid warning about ways that excessive security may have long-reaching unanticipated undesirable effects. Little Brother takes place partly in an American high school, and it is written from the perspective of today's youth culture. This is the book to provide the human side of information security for educational leaders. (note: Little Brother is also available for free download from the author's website.[3])

Table of Contents[edit]

  1. School Hacking 100% developed  as of June 18, 2009
  2. Legal Issues 100% developed  as of June 18, 2009
  3. Security Awareness 100% developed  as of June 18, 2009
  4. Administrator Awareness 100% developed  as of June 18, 2009
  5. Cryptography 100% developed  as of June 18, 2009
  6. Security Regulations 100% developed  as of April 12, 2010
  7. Authentication: Safeguarding Passwords 100% developed  as of April 17, 2010
  8. Professional Development 100% developed  as of April 17, 2010
  9. Network Defenses 100% developed  as of April 13, 2010
  10. Case Studies 100% developed  as of April 17, 2010
  11. Security Policies for Mobile Devices 100% developed  as of April 13, 2010
  12. Malicious Software 100% developed  as of April 17, 2010

References[edit]

  1. Schneier, B. (2004). Secrets and Lies. Indianapolis, Indiana: Wiley Publishing, Inc.
  2. http://craphound.com/littlebrother/
  3. http://craphound.com/littlebrother/download/