Part+5+-+Safeguarding+Technology

=PART 5 - Safeguarding Technology =

media type="custom" key="6383047" align="center" width="40" height="50"

 **A. Risk Assessment**

 Software: SMART Technologies Software ||  Software: SMART Technologies Software , Computer Programming Software, ||  Human Threats (Intentional): Improper Usage,Vandalism, Computer Viruses, Theft  Human Threats (Unintentional): Power Failure, Equipment Malfunctions, Computer Viruses, Beverages and Food spillage ||  Hardware/Software Issues: Physical Damage to Computers or SMART Boards  Human Concerns: Improper usage or damage by other than the primary teacher ||  Vulnerabilities or Prevention for human threats: Password protect computers and SMART Boards against unauthorized users, properly train teachers and students to use equipment, enable system to lock down after 15 minutes of inactivity  Vulnerabilities or Prevention for software and hardware threats: Install anti-virus and firewall programs on computers, monitor and review activities of users ||  Altered Productivity: Continue to use password protected log-ins for teachers and students  Countermeasures already available: Continue to use computer management software ||  Implement policy regarding no beverages and food near SMART Boards and computers for teachers and students  Make sure teachers use password protected log-ins for SMART Boards, System will force password to be changed every 120 days  Head custodian will be in charge of monitoring power outages and maintain consistent temperate control in classrooms with SMART Boards ||
 * = <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 1: Identify Critical Systems &**
 * Sensitive Information** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Hardware: Computers, Monitors, Projectors, Cables, SMART Board Screens
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 2: Estimate the Value**
 * of System Components** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Hardware: Computers, Monitors, Projectors, Cables, SMART Board Screens
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 3: Identify Threats** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Natural Threats: Room Temperatures, Lightning, Humidity, Water Damage from Rain or Leaking Roof
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 4: Identify Vulnerabilities** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Physical Concerns: Climate Control of Classrooms, Unauthorized Access to Classrooms
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 5: Estimate the Likelihood of Potential Penetration Becoming Actual Penetration** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Human Threats have the greatest possibility to occur than physical threats (accidental or intentional) ||
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 6: Identify Countermeasures**
 * Against**
 * Perceived Threats & Vulnerabilities** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Vulnerabilities or Prevention for physical threats: School security system, proper locks on classroom doors and windows, consistent temperature control, post no food or drink allowed signs
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 7: Estimate Costs of Implementing Countermeasures** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Time and Money Needed: Planning and implementation of SMART Board initiative, Cost to install locks on classrooms doors, Updating school security system
 * < <span style="color: #96491d; display: block; font-family: Georgia,serif; font-size: 110%; text-align: center;">**Step 8: Overview of Risk Assessment & Selected Suitable Countermeasures**
 * for Implementation** || <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">Properly train teachers on updated security procedures

<span style="color: #96491d; font-family: Georgia,serif; font-size: 120%;"> **B. Policy Plan** <span style="color: #96491d; font-family: Georgia,serif; font-size: 121%;">i. Security Policy <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;"> & ii. Acceptable Use Policy <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">*use school policy

<span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">ii. Copyright/Fair Use Policy <span style="color: #96491d; font-family: Georgia,serif; font-size: 110%;">