SlideShare a Scribd company logo
1 of 23
Download to read offline
Information Security in Schools–
Recommended Practice
(January 2019)
IT in Education Section
Education Bureau
23 February 2019
Information Security in Schools – Recommended Practice
• Since 2002, the EDB has been providing recommended practice on IT
security to assist schools in formulating IT security policies and
promoting related good practices.
• The EDB updates the document from time to time.
Information Security in Schools –
Recommended Practice (January 2019)
https://www.edb.gov.hk/en/edu-system/primary-
secondary/applicable-to-primary-secondary/it-in-
edu/Information-Security/information-security-in-school.html
2016 Version
PART 1 ABOUT THIS DOCUMENT
PART 2 SECURITY MANAGEMENT
PART 3 SECURITY INCIDENT HANDLING
PART 4 PHYSICAL SECURITY
PART 5 ACCESS CONTROL
PART 6 DATA SECURITY
PART 7 APPLICATION SECURITY
PART 8 NETWORK AND COMMUNICATION SECURITY
PART 9 WEB APPLICATION SECURITY
PART 10 SECURITY ISSUES OF MOBILE APPLICATIONS
PART 11 COMPUTER VIRUS PROTECTION
PART 12 SECURITY REVIEW
PART 13 CLOUD SERVICE
PART 14 WI-FI SECURITY QUICK REFERENCE
PART 15 ADDITIONAL RESOURCES ON IT SECURITY
2019 Version
CHAPTER 1 ABOUT THIS DOCUMENT
CHAPTER 2 SECURITY MANAGEMENT
CHAPTER 3 SECURITY INCIDENT HANDLING
CHAPTER 4 PHYSICAL SECURITY
CHAPTER 5 ACCESS CONTROL
CHAPTER 6 DATA SECURITY
CHAPTER 7 APPLICATION SECURITY
CHAPTER 8 NETWORK AND COMMUNICATION SECURITY
CHAPTER 9 WEBSITE & WEB APPLICATION SECURITY
CHAPTER 10 MOBILE DEVICE AND MOBILE APPLICATION PROTECTION
CHAPTER 11 MALWARE PROTECTION
CHAPTER 12 SECURITY REVIEW
CHAPTER 13 CLOUD SERVICE
CHAPTER 14 ADDITIONAL RESOURCES ON IT SECURITY
Major Updates
2016 Version
• General Network Protection
• Building a Secure Network
• Communication with External Network
• Remote Access
• Virtual Private Network
• Wireless Network Protection
• Management Control
• Technical Control
• End-user Control
• Protection against Email Spam and
Malicious code
• System Prospective
• End-user Prospective
• Prevent Malicious Code (Merge to Chapter 11)
2019 Version
• Network Security Management (Revised)
• Recommendations for schools on building a secure network
• Remote Access
• Virtual Private Network
• Wireless Network Build Up Security Concerns (New)
• Security Risks
• Recommendations for schools on wireless network deployment
• Network Mode (Separate / Integrate)
• Security Controls to Protect WLAN (Revised)
• Management Control
• Technical Control
• End-user Control
• Mail Gateway Security and Email Handling
• Mail Server Protection (Revised)
• Tips for protecting schools from email bombing, spamming and
spoofing (New)
• Reduce the amount of incoming spam (Revised)
• Protection against Email Scam (New)
MajorUpdates– Chapter8
Network andCommunicationSecurity
Major Updates – Chapter 8
Network and Communication Security
• Security concerns on the communication with the external network and
access privilege.
• Protection against the system and end-user strengthened.
• Email Bombing, Spamming & Spoofing and Email Scam.
• Security concerns on the network modes (Separate / Integrate) adopted
by schools.
Separate or Integrate?
• It is recommended to build the WiFi network completely separated from
schools’ existing network with separate broadband line to reduce security
risk
• Due to the nature of wireless technology, wireless networks are relatively
hard to contain within a building and it is generally considered to be an
un-trusted network.
• As a best practice, wireless networks and wired networks should not be
directly connected to each other.
IT Security Measures to address
the Security Concerns on Integrating the Networks
• For schools adopting the integration mode of WiFi networks, schools’ IT
personnel needs to assess, understand and eliminate the security issues
and risks to school existing network when the WiFi network is integrated
or connected to schools’ existing network.
• Schools adopting the integration mode of WiFi networks are
recommended to apply the “Defence-in-Depth” approach.
• Possible measures that can be employed to build multiple layers of
defense:
 Separation of wireless and wired network segments
 Use of strong device and user authentication methods
 Application of network filtering based on addresses and protocols
 Deployment of intrusion detection systems on the wireless and wired networks
2016 Version
WEB APPLICATION SECURITY
• Adopt Web Application Security
Architecture
• Architecture
• Web Server Security
2019 Version
WEBSITE & WEB APPLICATION SECURITY
• Website & Web Application Security
Architecture
• Web Server Security (Revised)
• Web Server Monitoring and Incident
Handling (New)
• Web Application Security (New)
• Keep Your School’s Website Safe (New)
• Secure Website with HTTPS Protocol (New)
• Anti-DDoS Protection (New)
MajorUpdates– Chapter9
Website&WebApplicationSecurity
Major Updates – Chapter 9
Website & Web Application Security
• Important of web server security such as account management, web
server application management, ports management, patch management,
security monitoring, backup.
• Web application security and data protection.
• HTTPS issue.
• How to prevent DDoS / Botnet attack.
• For better security incidents handling, schools are recommended to:
• Follow the security incident handling procedure to handle the security incident
until it is mitigated; and
• Report the case to Hong Kong Computer Emergency Response Team Coordination
Centre (HKCERT) and Hong Kong Police Force (HKPF).
2016 Version
SECURITY ISSUES OF MOBILE APPLICTIONS
• Protecting Mobile Devices
• Configuration Mobile Device
• Precautions of Using Mobile Applications
2019 Version
MOBILE DEVICE AND MOBILE APPLICATION
PROTECTION (New)
• Security Concerns of Mobile Devices
• Information Security Policy for Mobile
Devices
• Data Communication and Storage for
Mobile Devices
• User and Device Authentication for Mobile
Devices
• Security Control for Mobile Device
Application
• Mobile Device Management (MDM)
Solution
Major Updates – Chapter 10
Mobile Device and Mobile Application Protection
Major Updates – Chapter 10
Mobile Device and Mobile Application Protection
• Schools should establish a mobile device security policy to specify the
operation and security requirements for mobile devices access.
• A formal usage policy and procedures should be in place, and
appropriate security measures should be adopted to protect against the
risks of using mobile computing and communication facilities.
• Schools are recommended to install security control tools such as MDM,
anti-malware software.
2016 Version
COMPUTER VIRUS PROTECTION
• Anti-Virus Software
• Legal and Authorised Use of Software
and Hardware
• Prevention from Doubtful File Resources
2019 Version
MALWARE PROTECTION (New)
• Protection against Malware by Schools
• Protection against Malware by Users
• Malware Incident Handling and Recovery
• Protection against Ransomware
• Ransomware Incident Handling and
Recovery
Major Updates – Chapter 11
Malware Protection
Major Updates – Chapter 11
Malware Protection
• Malware can cause different level of security risks to computer assets,
such as disrupt computer operations, gather sensitive information, etc.
• Schools are advised to adopt the precaution measures against
ransomware.
• Ransomware Incident Handling:
a) Disconnect the network cable of the computer to avoid affecting network drives
and other computers.
b) Power off the computer to stop the ransomware encrypting more files.
c) Jot down what have been accessed (such as programs, files, emails and websites)
before discovering the issue.
d) Report to the HKCERT and HKPF the criminal offence if necessary.
e) Recover the data from backup to a clean computing device.
2016 Version
CLOUD SERVICE
• Cloud computing security considerations
2019 Version
CLOUD SERVICE (New)
• Cloud Security Overview
• Cloud Service Security Consideration
• Checklist on selecting cloud service provider
• On using cloud services
Major Updates – Chapter 13
Cloud Service
Updates – Chapter 13
Cloud Service
• A checklist on selecting cloud service provider was provided to schools
for reference.
• Using encryption to protect stored data.
• Think twice when you want to store sensitive data in the cloud and
assess the impact if the data concerned is exposed.
• Perform a regular backup of the data stored in the cloud service and
maintain a local backup copy of important data so that this data can still
be available when the service provider is out of service.
Security Tips
• TSS or IT Head should harden the firewall regularly including update
firmware, review policy and check event log.
• Cyber attack are become more advance and unpredictable. Schools are
recommended to deploy security device with the latest technology to
secure the school’s network.
• Many schools were infected ransomware by opening attachments in
suspicious email. Schools are recommended to purchase the latest anti-
malware software with signature to filter the malicious attachment.
• There were security vulnerability in WPA2, schools are recommended to
deploy network device with WPA3 when upgrading the Wi-Fi network.
• Apply latest approved security patches to any software (especially the
operating system) and avoid using the end of supported components.
Related Promotion and Support by EDB
• Information Security in Schools webpage
• Email Message on IT Security Alert
• Information Security in Schools – Recommended Practice
• Co-organise with professional bodies to provide IT security related
seminars
• Promote IT security related events / activities through school circular
memorandum
• Grants
Overview of Various ITE Grants
Composite IT Grant (CITG)
$202,679 – 697,086 dependent on
school type and size
Operational needs for e-learning,
such as -
• IT-related consumables
• Digital resource materials
• Technical Support Staff (TSS)
• Maintenance of IT facilities, etc.
Funding for ITE4
$70,000 on average
• WiFi services fee
• Maintenance/
replacement of mobile
devices
ITSSG
Flat rate of $307,200
Recruitment of TSS
through contract or
services procurement
Recurrent
One-off
Extra One-off IT Grant ($200,000 on average)
• Mobile devices
• Recruitment of TSS
• E-resource/platform
ITE4 ($100,000 on average)
• Mobile devices
Information Security in Schools webpage
https://www.edb.gov.hk/ited/i-security
Information Literacy
https://www.edb.gov.hk/il/eng
Promote IT security related events / activities
through school circular memorandum
https://www.cybersecurity.hk/en/resources.php https://www.cybersecuritycampaign.com.hk/EDBCM No.164/2018 Cyber Security Campaign – Smart Devices Security
Thank you

More Related Content

What's hot

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
K-12 School Campus Safety and Security
K-12 School Campus Safety and SecurityK-12 School Campus Safety and Security
K-12 School Campus Safety and Securitypatricia franklin
 

What's hot (20)

Jason r mc kinney halfday
Jason r mc kinney halfdayJason r mc kinney halfday
Jason r mc kinney halfday
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
CyberSecurity - Linda Sharp
CyberSecurity - Linda SharpCyberSecurity - Linda Sharp
CyberSecurity - Linda Sharp
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Ch.8[1]
Ch.8[1]Ch.8[1]
Ch.8[1]
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
E-Safety
E-SafetyE-Safety
E-Safety
 
K-12 School Campus Safety and Security
K-12 School Campus Safety and SecurityK-12 School Campus Safety and Security
K-12 School Campus Safety and Security
 

Similar to Schools IT Security Guide Updated

UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014Tarek Nader
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...Internetwork Engineering (IE)
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Altinet_Education_Brochure
Altinet_Education_BrochureAltinet_Education_Brochure
Altinet_Education_BrochureHenry Doyle
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolJude Rainer
 

Similar to Schools IT Security Guide Updated (20)

Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Cloud strategy in fe final version
Cloud strategy in fe final versionCloud strategy in fe final version
Cloud strategy in fe final version
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Altinet_Education_Brochure
Altinet_Education_BrochureAltinet_Education_Brochure
Altinet_Education_Brochure
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 

More from eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and PrinterseLearning Consortium 電子學習聯盟
 

More from eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 
Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
 

Recently uploaded

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
physiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxphysiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxAneriPatwari
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...DrVipulVKapoor
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...Nguyen Thanh Tu Collection
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceDr Vijay Vishwakarma
 

Recently uploaded (20)

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
physiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxphysiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptx
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional Intelligence
 
CARNAVAL COM MAGIA E EUFORIA _
CARNAVAL COM MAGIA E EUFORIA            _CARNAVAL COM MAGIA E EUFORIA            _
CARNAVAL COM MAGIA E EUFORIA _
 

Schools IT Security Guide Updated

  • 1. Information Security in Schools– Recommended Practice (January 2019) IT in Education Section Education Bureau 23 February 2019
  • 2. Information Security in Schools – Recommended Practice • Since 2002, the EDB has been providing recommended practice on IT security to assist schools in formulating IT security policies and promoting related good practices. • The EDB updates the document from time to time.
  • 3. Information Security in Schools – Recommended Practice (January 2019) https://www.edb.gov.hk/en/edu-system/primary- secondary/applicable-to-primary-secondary/it-in- edu/Information-Security/information-security-in-school.html
  • 4. 2016 Version PART 1 ABOUT THIS DOCUMENT PART 2 SECURITY MANAGEMENT PART 3 SECURITY INCIDENT HANDLING PART 4 PHYSICAL SECURITY PART 5 ACCESS CONTROL PART 6 DATA SECURITY PART 7 APPLICATION SECURITY PART 8 NETWORK AND COMMUNICATION SECURITY PART 9 WEB APPLICATION SECURITY PART 10 SECURITY ISSUES OF MOBILE APPLICATIONS PART 11 COMPUTER VIRUS PROTECTION PART 12 SECURITY REVIEW PART 13 CLOUD SERVICE PART 14 WI-FI SECURITY QUICK REFERENCE PART 15 ADDITIONAL RESOURCES ON IT SECURITY 2019 Version CHAPTER 1 ABOUT THIS DOCUMENT CHAPTER 2 SECURITY MANAGEMENT CHAPTER 3 SECURITY INCIDENT HANDLING CHAPTER 4 PHYSICAL SECURITY CHAPTER 5 ACCESS CONTROL CHAPTER 6 DATA SECURITY CHAPTER 7 APPLICATION SECURITY CHAPTER 8 NETWORK AND COMMUNICATION SECURITY CHAPTER 9 WEBSITE & WEB APPLICATION SECURITY CHAPTER 10 MOBILE DEVICE AND MOBILE APPLICATION PROTECTION CHAPTER 11 MALWARE PROTECTION CHAPTER 12 SECURITY REVIEW CHAPTER 13 CLOUD SERVICE CHAPTER 14 ADDITIONAL RESOURCES ON IT SECURITY Major Updates
  • 5. 2016 Version • General Network Protection • Building a Secure Network • Communication with External Network • Remote Access • Virtual Private Network • Wireless Network Protection • Management Control • Technical Control • End-user Control • Protection against Email Spam and Malicious code • System Prospective • End-user Prospective • Prevent Malicious Code (Merge to Chapter 11) 2019 Version • Network Security Management (Revised) • Recommendations for schools on building a secure network • Remote Access • Virtual Private Network • Wireless Network Build Up Security Concerns (New) • Security Risks • Recommendations for schools on wireless network deployment • Network Mode (Separate / Integrate) • Security Controls to Protect WLAN (Revised) • Management Control • Technical Control • End-user Control • Mail Gateway Security and Email Handling • Mail Server Protection (Revised) • Tips for protecting schools from email bombing, spamming and spoofing (New) • Reduce the amount of incoming spam (Revised) • Protection against Email Scam (New) MajorUpdates– Chapter8 Network andCommunicationSecurity
  • 6. Major Updates – Chapter 8 Network and Communication Security • Security concerns on the communication with the external network and access privilege. • Protection against the system and end-user strengthened. • Email Bombing, Spamming & Spoofing and Email Scam. • Security concerns on the network modes (Separate / Integrate) adopted by schools.
  • 7. Separate or Integrate? • It is recommended to build the WiFi network completely separated from schools’ existing network with separate broadband line to reduce security risk • Due to the nature of wireless technology, wireless networks are relatively hard to contain within a building and it is generally considered to be an un-trusted network. • As a best practice, wireless networks and wired networks should not be directly connected to each other.
  • 8. IT Security Measures to address the Security Concerns on Integrating the Networks • For schools adopting the integration mode of WiFi networks, schools’ IT personnel needs to assess, understand and eliminate the security issues and risks to school existing network when the WiFi network is integrated or connected to schools’ existing network. • Schools adopting the integration mode of WiFi networks are recommended to apply the “Defence-in-Depth” approach. • Possible measures that can be employed to build multiple layers of defense:  Separation of wireless and wired network segments  Use of strong device and user authentication methods  Application of network filtering based on addresses and protocols  Deployment of intrusion detection systems on the wireless and wired networks
  • 9. 2016 Version WEB APPLICATION SECURITY • Adopt Web Application Security Architecture • Architecture • Web Server Security 2019 Version WEBSITE & WEB APPLICATION SECURITY • Website & Web Application Security Architecture • Web Server Security (Revised) • Web Server Monitoring and Incident Handling (New) • Web Application Security (New) • Keep Your School’s Website Safe (New) • Secure Website with HTTPS Protocol (New) • Anti-DDoS Protection (New) MajorUpdates– Chapter9 Website&WebApplicationSecurity
  • 10. Major Updates – Chapter 9 Website & Web Application Security • Important of web server security such as account management, web server application management, ports management, patch management, security monitoring, backup. • Web application security and data protection. • HTTPS issue. • How to prevent DDoS / Botnet attack. • For better security incidents handling, schools are recommended to: • Follow the security incident handling procedure to handle the security incident until it is mitigated; and • Report the case to Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) and Hong Kong Police Force (HKPF).
  • 11. 2016 Version SECURITY ISSUES OF MOBILE APPLICTIONS • Protecting Mobile Devices • Configuration Mobile Device • Precautions of Using Mobile Applications 2019 Version MOBILE DEVICE AND MOBILE APPLICATION PROTECTION (New) • Security Concerns of Mobile Devices • Information Security Policy for Mobile Devices • Data Communication and Storage for Mobile Devices • User and Device Authentication for Mobile Devices • Security Control for Mobile Device Application • Mobile Device Management (MDM) Solution Major Updates – Chapter 10 Mobile Device and Mobile Application Protection
  • 12. Major Updates – Chapter 10 Mobile Device and Mobile Application Protection • Schools should establish a mobile device security policy to specify the operation and security requirements for mobile devices access. • A formal usage policy and procedures should be in place, and appropriate security measures should be adopted to protect against the risks of using mobile computing and communication facilities. • Schools are recommended to install security control tools such as MDM, anti-malware software.
  • 13. 2016 Version COMPUTER VIRUS PROTECTION • Anti-Virus Software • Legal and Authorised Use of Software and Hardware • Prevention from Doubtful File Resources 2019 Version MALWARE PROTECTION (New) • Protection against Malware by Schools • Protection against Malware by Users • Malware Incident Handling and Recovery • Protection against Ransomware • Ransomware Incident Handling and Recovery Major Updates – Chapter 11 Malware Protection
  • 14. Major Updates – Chapter 11 Malware Protection • Malware can cause different level of security risks to computer assets, such as disrupt computer operations, gather sensitive information, etc. • Schools are advised to adopt the precaution measures against ransomware. • Ransomware Incident Handling: a) Disconnect the network cable of the computer to avoid affecting network drives and other computers. b) Power off the computer to stop the ransomware encrypting more files. c) Jot down what have been accessed (such as programs, files, emails and websites) before discovering the issue. d) Report to the HKCERT and HKPF the criminal offence if necessary. e) Recover the data from backup to a clean computing device.
  • 15. 2016 Version CLOUD SERVICE • Cloud computing security considerations 2019 Version CLOUD SERVICE (New) • Cloud Security Overview • Cloud Service Security Consideration • Checklist on selecting cloud service provider • On using cloud services Major Updates – Chapter 13 Cloud Service
  • 16. Updates – Chapter 13 Cloud Service • A checklist on selecting cloud service provider was provided to schools for reference. • Using encryption to protect stored data. • Think twice when you want to store sensitive data in the cloud and assess the impact if the data concerned is exposed. • Perform a regular backup of the data stored in the cloud service and maintain a local backup copy of important data so that this data can still be available when the service provider is out of service.
  • 17. Security Tips • TSS or IT Head should harden the firewall regularly including update firmware, review policy and check event log. • Cyber attack are become more advance and unpredictable. Schools are recommended to deploy security device with the latest technology to secure the school’s network. • Many schools were infected ransomware by opening attachments in suspicious email. Schools are recommended to purchase the latest anti- malware software with signature to filter the malicious attachment. • There were security vulnerability in WPA2, schools are recommended to deploy network device with WPA3 when upgrading the Wi-Fi network. • Apply latest approved security patches to any software (especially the operating system) and avoid using the end of supported components.
  • 18. Related Promotion and Support by EDB • Information Security in Schools webpage • Email Message on IT Security Alert • Information Security in Schools – Recommended Practice • Co-organise with professional bodies to provide IT security related seminars • Promote IT security related events / activities through school circular memorandum • Grants
  • 19. Overview of Various ITE Grants Composite IT Grant (CITG) $202,679 – 697,086 dependent on school type and size Operational needs for e-learning, such as - • IT-related consumables • Digital resource materials • Technical Support Staff (TSS) • Maintenance of IT facilities, etc. Funding for ITE4 $70,000 on average • WiFi services fee • Maintenance/ replacement of mobile devices ITSSG Flat rate of $307,200 Recruitment of TSS through contract or services procurement Recurrent One-off Extra One-off IT Grant ($200,000 on average) • Mobile devices • Recruitment of TSS • E-resource/platform ITE4 ($100,000 on average) • Mobile devices
  • 20. Information Security in Schools webpage https://www.edb.gov.hk/ited/i-security
  • 22. Promote IT security related events / activities through school circular memorandum https://www.cybersecurity.hk/en/resources.php https://www.cybersecuritycampaign.com.hk/EDBCM No.164/2018 Cyber Security Campaign – Smart Devices Security