SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Walking the CyberHalls
                       By Ken M. Shaurette, CISSP, CISA, CISM

                                              How important has it become in your
                                              school to have the ability to monitor
                                              student, teacher and administrator
                                              activity while using computer systems?

                                           In the past knowing that there were
                                           problems brewing in school was as
                                           simple as walking the halls to notice
                                           students fighting, bullying or simply
                                           planning mischief. In today’s
                                           technology driven world that has
                                           dramatically changed. Computers are
                                           available to nearly every student, at
                                           home as well as in the school library or
                                           computer labs. Computers are
                                           necessary to prepare our youth for the
real world, which uses computer systems in nearly every aspect of industry, from
diagnosing problems in our automobiles to managing our bank accounts.

Students use computers while in school in a variety of ways. They research their
term papers, write stories for English, or look up that illness discussed in Health
Class. They even use web sites on the internet to translate words for their foreign
language class.

With the wide spread availability of computers also comes concerns of misuse even
abuse. Schools have created a policy for acceptable use of computer resources.
Even legislation, CIPA, the Children’s Internet Protection Act, was created in an
attempt to encourage schools to prevent student access to “harmful” and
“dangerous” resources. How does a school monitor student, teacher and employee
cyber activity? There is more to it than just watching access to the Internet. As a
Teacher or Principal, have you ever walked past a student on a school computer, and
notice that he or she quickly minimizes or closes the window or program they were
looking at? What was the student doing to cause this quick action as you
approached? How can a school proactively monitor undesirable activities such as
child enticement, access to pornography, or simply abuse of the school acceptable
use policy? What about students communicating about bombs, or students changing
grades using an administrative or teacher password? What about discussions
regarding bringing guns to school using email, instant messenger or some other
computer based means? How does a school walk these Cyber Halls?

As I noted in the pre-computer days, you could walk the halls to see problem activity
and often know when inappropriate activity was occurring. Now that a lot of student
activity has moved to the Computer, how do you “walk the CyberHalls?” Is there a
way to track activity of inappropriate student cyber behavior in order to support
sanctions or capture the illegal activity by a school official (principal, superintendent
or teacher) to provide forensic proof to support immediate actions? Actions might be
a warning or a termination and could even lead to criminal action. The potential
liability associated with letting activities continue without taking action can be


        © 2006 Sergeant Laboratories, Inc.    http://www.provecompliance.com/
significant. Even beyond the liability, some activities themselves could be
disastrous. (bombs, guns, or child pornography)

A company in Lacrosse, Wisconsin called Sergeant Laboratories has created a
solution for “Walking the CyberHalls” named Aristotle. Aristotle allows a school to
teach appropriate computer use. It frees technicians or school administration from
being the “thought police”. It provides no more guessing about the usage of lab
computers and software. Aristotle can provide notification of planning activities
before the bomb threat, track teacher or student email/chat room harassment, even
suicide discussions or plans to run away from home. It can do this all with real-time
notification. Custom tailored “security events” when triggered, can be routed to the
personnel responsible such as: lab monitors, district administration, or technical
school coordinators. The comprehensive reporting allows school board members to
understand district computer use and demonstrate computer usage costs during
budgeting cycles. Aristotle also gives you the ability to see everything that is done
on your computers, down to the keystroke. Through the use of custom security
events based on key words which you define, you will be alerted when an incident
occurs. If you suspect past inappropriate behavior, simply search for keywords or
events and you will have the forensic quality data you need at your fingertips thanks
to Aristotle’s DataVault™.

I’d like to study briefly a couple real life cases where Aristotle helped a school in very
powerful ways. The following Case Studies are based on real incidents, but the
specific details described have been modified to protect the privacy of the actual
event.

Case Study #1: In my first case study there was a car accident in an upper
Midwestern State resulting in the death of two young high school students and
serious injuries to two others. Let’s examine at how Aristotle had a major impact
potentially saving a student’s life.

Using Aristotle’s feature to track use of words and phrases on computer systems, the
Technology Coordinator, tracked “kill myself” and “suicide” for a few weeks after the
accident. Within a few days Aristotle alerted the Coordinator that two students had
used these words and phrases. In one situation Aristotle identified the user account
of a student using WordPerfect to update their personal journal with the message; “I
really miss my friend Billy, I don’t know what I’m going to do, I miss him so much. I
think I’d be better off if I just kill myself.”

The entry in the journal of the phrase “kill myself” triggered Aristotle’s policy created
by the Technology Coordinator to automatically alert him on the use of that phrase.
It identified who this student was by their personal school login and even identified
the computer lab that they were using to write their journal. Immediate intervention
was taken to get this student help. That help may have saved this young man’s life.

The other alert was the use of the word “suicide” by a young girl on a school library
computer. It turned out that her Health Class was studying Teen Suicide and she
was in the process of doing research for the class assignment. She was using the
Internet to find more information and statistics, her Google Search included the word
suicide. No further action was necessary.




        © 2006 Sergeant Laboratories, Inc.     http://www.provecompliance.com/
Case Study #2: In our second case students were using a form of Instant
Messenger to communicate with each other. This was even after System and
Network Administrators thought they had Instant Messenger locked down so that it
could not be used.

In a communication between two students, one of the students noted, “I’m ready
today, I brought in my gun.” When this alert occurred on the word “gun”, the
Technology Coordinator immediate began drilling down on any other recent
communications for this student, using the drilldown by user facility to find any other
communications.

What was pieced together was a plot between several students to take revenge on
several students that had recently picked on them by shooting up the athletic awards
case.

Case Study #3: Our third case reveals Aristotle providing a surprise benefit to
school administration. A small Midwestern K-12 School District for several weeks
had been researching products that could provide a window into their network.
They needed a solution that could help them better understand computer utilization
in the district and would help them correct recent computer problems and answer
questions from the school board regarding use of technology in the district.

Using the simple installation procedures, the Aristotle agent was installed on over
1000 workstations across the district in less than 2 hours. As soon as the agent was
deployed the DataVault™ began gathering information on the applications and
activities of all computer usage across the district. It didn’t take long to identify a
normal usage pattern for most systems and begin to build a profile of how the
districts computers were getting used.

One of the first things noticed was a lab that was not getting much use, yet teachers
were constantly complaining that they did not have sufficient lab space for their
classes. After a little research if was found that class sizes were generally 18-20
students and this lab only had 15 computer systems. After adding five workstations
to this lab, Teachers again began scheduling classes in this lab.

The value of Aristotle did not end there. A few days passed before abnormal activity
was noticed on the principal at the middle school’s computer. It appeared that the
principal was using several unusual applications. In addition it was noticed that the
principal had visited some rather unique web sites and his use of the instant
messenger application increased significantly. Alerts were set off access to file
transfer and following a few minutes of researching the data gathered by Aristotle it
was found that images were being downloaded from an ftp server located outside the
United States.

This sudden increase in unusual activity resulted in the need to begin looking a little
further only to find that this principal was downloading child pornography images and
was using his instant messenger to communicate with other young children. It
appeared that he may have been attempting to entice them to meet with him after
school. At this point law enforcement was called and evidence turned over to legal
authorities. It is believed that the activity was caught early and a major undesirable
situation for the school district avoided.




       © 2006 Sergeant Laboratories, Inc.    http://www.provecompliance.com/
Summary: These cases are but a few examples of the situations that Aristotle has
been involved in. From saving lives and preventing school tragedies to helping
manage the computing environment and ensure that acceptable use policy is being
followed. More and more schools are finding a need to have the ability to track the
use of computer systems. This ability can help you answer questions from the
community on how the limited budget is being spent and how much educational
value is being gained from the proper use of new technology and applications.

If you wish to get more information on Sergeant Laboratories or request a
demonstration visit the web site provecompliance.com.




       © 2006 Sergeant Laboratories, Inc.   http://www.provecompliance.com/

Más contenido relacionado

La actualidad más candente

Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essayivanzampedri
 
I love free – transforming your classroom with Web 2.0
I love free – transforming your classroom with Web 2.0I love free – transforming your classroom with Web 2.0
I love free – transforming your classroom with Web 2.0Jan Coley
 
Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Luffy Kun
 
Advantages and disadvantages of computer in teaching and copy
Advantages and disadvantages of computer in teaching and   copyAdvantages and disadvantages of computer in teaching and   copy
Advantages and disadvantages of computer in teaching and copyJessa Mores Macalunod
 
Teaching with Technology: Social Media Tools and Mobile Apps for Primary Sch...
Teaching with Technology:  Social Media Tools and Mobile Apps for Primary Sch...Teaching with Technology:  Social Media Tools and Mobile Apps for Primary Sch...
Teaching with Technology: Social Media Tools and Mobile Apps for Primary Sch...Cheryl Peltier-Davis
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Agesrebeccajmckee
 
Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Janet Martin
 
Impact of Computers in Education
Impact of Computers in EducationImpact of Computers in Education
Impact of Computers in EducationMohammadSamiUllah15
 
online assignment
online assignmentonline assignment
online assignmentirenedicken
 
Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?johannaazis
 
The Touch-Screen Generation
The Touch-Screen GenerationThe Touch-Screen Generation
The Touch-Screen Generationsehannay
 

La actualidad más candente (20)

Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essay
 
I love free – transforming your classroom with Web 2.0
I love free – transforming your classroom with Web 2.0I love free – transforming your classroom with Web 2.0
I love free – transforming your classroom with Web 2.0
 
Too Young?
Too Young?Too Young?
Too Young?
 
Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11
 
Advantages and disadvantages of computer in teaching and copy
Advantages and disadvantages of computer in teaching and   copyAdvantages and disadvantages of computer in teaching and   copy
Advantages and disadvantages of computer in teaching and copy
 
Teaching with Technology: Social Media Tools and Mobile Apps for Primary Sch...
Teaching with Technology:  Social Media Tools and Mobile Apps for Primary Sch...Teaching with Technology:  Social Media Tools and Mobile Apps for Primary Sch...
Teaching with Technology: Social Media Tools and Mobile Apps for Primary Sch...
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Week 13 Issues
Week 13 IssuesWeek 13 Issues
Week 13 Issues
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Ages
 
Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Learning 2.0 workshop 2009
Learning 2.0 workshop 2009
 
cellphones in class
cellphones in classcellphones in class
cellphones in class
 
Impact of Computers in Education
Impact of Computers in EducationImpact of Computers in Education
Impact of Computers in Education
 
online assignment
online assignmentonline assignment
online assignment
 
Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?
 
The Touch-Screen Generation
The Touch-Screen GenerationThe Touch-Screen Generation
The Touch-Screen Generation
 

Destacado

Durabilidad del hormigón estructural ing klimczuk ing pizzutti
Durabilidad del hormigón estructural ing klimczuk ing pizzuttiDurabilidad del hormigón estructural ing klimczuk ing pizzutti
Durabilidad del hormigón estructural ing klimczuk ing pizzuttiEduardo Soracco
 
Small Claims Handbook A Guide For Non Lawyers September Revision
Small Claims Handbook A Guide For Non Lawyers September RevisionSmall Claims Handbook A Guide For Non Lawyers September Revision
Small Claims Handbook A Guide For Non Lawyers September RevisionF Blanco
 
Coche del año en Europa 1964 al 2012
Coche del año en Europa 1964 al 2012 Coche del año en Europa 1964 al 2012
Coche del año en Europa 1964 al 2012 Arturo Iglesias Castro
 
Seguridad en instalaciones eléctricas(ing cuevas posadas)
Seguridad en instalaciones eléctricas(ing cuevas posadas)Seguridad en instalaciones eléctricas(ing cuevas posadas)
Seguridad en instalaciones eléctricas(ing cuevas posadas)Eduardo Soracco
 
Matriz energia electrica nacional febap dachary abril 2008
Matriz  energia electrica nacional  febap dachary  abril 2008Matriz  energia electrica nacional  febap dachary  abril 2008
Matriz energia electrica nacional febap dachary abril 2008Eduardo Soracco
 
Canalizaciones
CanalizacionesCanalizaciones
CanalizacionesF Blanco
 
Mantenimiento Preventivo (LubricacióN)
Mantenimiento Preventivo (LubricacióN)Mantenimiento Preventivo (LubricacióN)
Mantenimiento Preventivo (LubricacióN)F Blanco
 
Durabilidad del hormigon parte 1: Ing M Klimczuk e Ing J L Golemba
Durabilidad del  hormigon parte 1:  Ing M Klimczuk e Ing J L GolembaDurabilidad del  hormigon parte 1:  Ing M Klimczuk e Ing J L Golemba
Durabilidad del hormigon parte 1: Ing M Klimczuk e Ing J L GolembaEduardo Soracco
 
Uso Racional y Eficiente de la Energia
Uso Racional y Eficiente  de la EnergiaUso Racional y Eficiente  de la Energia
Uso Racional y Eficiente de la EnergiaEduardo Soracco
 
Analise De Circuitos Electricos Ist
Analise De Circuitos Electricos   IstAnalise De Circuitos Electricos   Ist
Analise De Circuitos Electricos IstF Blanco
 
06 Analisis Sistemas Discretos
06 Analisis Sistemas Discretos06 Analisis Sistemas Discretos
06 Analisis Sistemas DiscretosF Blanco
 
Cap1 Conceptos BáSicos Sist Pot
Cap1 Conceptos BáSicos Sist PotCap1 Conceptos BáSicos Sist Pot
Cap1 Conceptos BáSicos Sist PotF Blanco
 
Anon Practicas Electronica Circuitos Electricos
Anon  Practicas Electronica   Circuitos ElectricosAnon  Practicas Electronica   Circuitos Electricos
Anon Practicas Electronica Circuitos ElectricosF Blanco
 
Google Earth User Guide
Google Earth User GuideGoogle Earth User Guide
Google Earth User GuideF Blanco
 
Libro 3 Final Editado
Libro 3 Final EditadoLibro 3 Final Editado
Libro 3 Final EditadoF Blanco
 
Capacidad E Corriente De Cables De Media Tension
Capacidad E Corriente De Cables De Media TensionCapacidad E Corriente De Cables De Media Tension
Capacidad E Corriente De Cables De Media TensionF Blanco
 
Y Sus Zm5 S
Y Sus Zm5 SY Sus Zm5 S
Y Sus Zm5 SF Blanco
 
061509 White Paper Deployment Strategy For The Smart Grid
061509 White Paper Deployment Strategy For The Smart Grid061509 White Paper Deployment Strategy For The Smart Grid
061509 White Paper Deployment Strategy For The Smart GridF Blanco
 

Destacado (20)

Durabilidad del hormigón estructural ing klimczuk ing pizzutti
Durabilidad del hormigón estructural ing klimczuk ing pizzuttiDurabilidad del hormigón estructural ing klimczuk ing pizzutti
Durabilidad del hormigón estructural ing klimczuk ing pizzutti
 
Small Claims Handbook A Guide For Non Lawyers September Revision
Small Claims Handbook A Guide For Non Lawyers September RevisionSmall Claims Handbook A Guide For Non Lawyers September Revision
Small Claims Handbook A Guide For Non Lawyers September Revision
 
Coche del año en Europa 1964 al 2012
Coche del año en Europa 1964 al 2012 Coche del año en Europa 1964 al 2012
Coche del año en Europa 1964 al 2012
 
Seguridad en instalaciones eléctricas(ing cuevas posadas)
Seguridad en instalaciones eléctricas(ing cuevas posadas)Seguridad en instalaciones eléctricas(ing cuevas posadas)
Seguridad en instalaciones eléctricas(ing cuevas posadas)
 
Matriz energia electrica nacional febap dachary abril 2008
Matriz  energia electrica nacional  febap dachary  abril 2008Matriz  energia electrica nacional  febap dachary  abril 2008
Matriz energia electrica nacional febap dachary abril 2008
 
Canalizaciones
CanalizacionesCanalizaciones
Canalizaciones
 
Mantenimiento Preventivo (LubricacióN)
Mantenimiento Preventivo (LubricacióN)Mantenimiento Preventivo (LubricacióN)
Mantenimiento Preventivo (LubricacióN)
 
Durabilidad del hormigon parte 1: Ing M Klimczuk e Ing J L Golemba
Durabilidad del  hormigon parte 1:  Ing M Klimczuk e Ing J L GolembaDurabilidad del  hormigon parte 1:  Ing M Klimczuk e Ing J L Golemba
Durabilidad del hormigon parte 1: Ing M Klimczuk e Ing J L Golemba
 
Uso Racional y Eficiente de la Energia
Uso Racional y Eficiente  de la EnergiaUso Racional y Eficiente  de la Energia
Uso Racional y Eficiente de la Energia
 
Analise De Circuitos Electricos Ist
Analise De Circuitos Electricos   IstAnalise De Circuitos Electricos   Ist
Analise De Circuitos Electricos Ist
 
06 Analisis Sistemas Discretos
06 Analisis Sistemas Discretos06 Analisis Sistemas Discretos
06 Analisis Sistemas Discretos
 
Ing cardinali
Ing cardinaliIng cardinali
Ing cardinali
 
Cap1 Conceptos BáSicos Sist Pot
Cap1 Conceptos BáSicos Sist PotCap1 Conceptos BáSicos Sist Pot
Cap1 Conceptos BáSicos Sist Pot
 
Cad
CadCad
Cad
 
Anon Practicas Electronica Circuitos Electricos
Anon  Practicas Electronica   Circuitos ElectricosAnon  Practicas Electronica   Circuitos Electricos
Anon Practicas Electronica Circuitos Electricos
 
Google Earth User Guide
Google Earth User GuideGoogle Earth User Guide
Google Earth User Guide
 
Libro 3 Final Editado
Libro 3 Final EditadoLibro 3 Final Editado
Libro 3 Final Editado
 
Capacidad E Corriente De Cables De Media Tension
Capacidad E Corriente De Cables De Media TensionCapacidad E Corriente De Cables De Media Tension
Capacidad E Corriente De Cables De Media Tension
 
Y Sus Zm5 S
Y Sus Zm5 SY Sus Zm5 S
Y Sus Zm5 S
 
061509 White Paper Deployment Strategy For The Smart Grid
061509 White Paper Deployment Strategy For The Smart Grid061509 White Paper Deployment Strategy For The Smart Grid
061509 White Paper Deployment Strategy For The Smart Grid
 

Similar a Walking Cyberhalls

Classroom technology pp
Classroom technology ppClassroom technology pp
Classroom technology ppScott_Gibbs
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Professional Writing Presentation
Professional Writing PresentationProfessional Writing Presentation
Professional Writing PresentationKwilliams23
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Internet publication
Internet publicationInternet publication
Internet publicationlinamccoach
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final YearKapil Jangid - BCA Final Year
Kapil Jangid - BCA Final YearDezyneecole
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 

Similar a Walking Cyberhalls (20)

Classroom technology pp
Classroom technology ppClassroom technology pp
Classroom technology pp
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Ethics
EthicsEthics
Ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Professional Writing Presentation
Professional Writing PresentationProfessional Writing Presentation
Professional Writing Presentation
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
An Essay On Technology
An Essay On TechnologyAn Essay On Technology
An Essay On Technology
 
An Essay On Technology
An Essay On TechnologyAn Essay On Technology
An Essay On Technology
 
Essays On Information Technology
Essays On Information TechnologyEssays On Information Technology
Essays On Information Technology
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Internet publication
Internet publicationInternet publication
Internet publication
 
SISTER
SISTERSISTER
SISTER
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final YearKapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 

Más de F Blanco

Curso ingles 1000 palabras mas utilizadas
Curso ingles 1000 palabras mas utilizadasCurso ingles 1000 palabras mas utilizadas
Curso ingles 1000 palabras mas utilizadasF Blanco
 
Ct 018 Analisis De Redes Con Componentes SiméTricas
Ct 018 Analisis De Redes Con Componentes SiméTricasCt 018 Analisis De Redes Con Componentes SiméTricas
Ct 018 Analisis De Redes Con Componentes SiméTricasF Blanco
 
Control Secuencial
Control SecuencialControl Secuencial
Control SecuencialF Blanco
 
Cont Cables Para Instrumentacion Y Control Centelsa
Cont Cables Para Instrumentacion Y Control CentelsaCont Cables Para Instrumentacion Y Control Centelsa
Cont Cables Para Instrumentacion Y Control CentelsaF Blanco
 
Consejo Del Mes 2
Consejo Del Mes 2Consejo Del Mes 2
Consejo Del Mes 2F Blanco
 
Conexion Interna De Motores
Conexion Interna De MotoresConexion Interna De Motores
Conexion Interna De MotoresF Blanco
 
Comunidad Emagister 63424 63424
Comunidad Emagister 63424 63424Comunidad Emagister 63424 63424
Comunidad Emagister 63424 63424F Blanco
 
Compuertas Logicasy
Compuertas LogicasyCompuertas Logicasy
Compuertas LogicasyF Blanco
 
Compuertas Logicas
Compuertas LogicasCompuertas Logicas
Compuertas LogicasF Blanco
 
Codificacion E Identificacion Pares Telefonicos
Codificacion E Identificacion Pares TelefonicosCodificacion E Identificacion Pares Telefonicos
Codificacion E Identificacion Pares TelefonicosF Blanco
 
Cobre Desnudo Cable
Cobre Desnudo CableCobre Desnudo Cable
Cobre Desnudo CableF Blanco
 
Circuitos Operacionales
Circuitos OperacionalesCircuitos Operacionales
Circuitos OperacionalesF Blanco
 
Circuitos Electricos
Circuitos ElectricosCircuitos Electricos
Circuitos ElectricosF Blanco
 
Circuitos Integrados
Circuitos IntegradosCircuitos Integrados
Circuitos IntegradosF Blanco
 
Circuitos Electronicos 5
Circuitos Electronicos 5Circuitos Electronicos 5
Circuitos Electronicos 5F Blanco
 
Circuitos Electronicos 4
Circuitos Electronicos 4Circuitos Electronicos 4
Circuitos Electronicos 4F Blanco
 
Circuitos Electronicos 3
Circuitos Electronicos 3Circuitos Electronicos 3
Circuitos Electronicos 3F Blanco
 
Cebic08 Sistema 4 Hilosñ
Cebic08 Sistema 4 HilosñCebic08 Sistema 4 Hilosñ
Cebic08 Sistema 4 HilosñF Blanco
 
Cebic08 Sistema 4 Hilos
Cebic08 Sistema 4 HilosCebic08 Sistema 4 Hilos
Cebic08 Sistema 4 HilosF Blanco
 

Más de F Blanco (20)

Curso ingles 1000 palabras mas utilizadas
Curso ingles 1000 palabras mas utilizadasCurso ingles 1000 palabras mas utilizadas
Curso ingles 1000 palabras mas utilizadas
 
Ct 018 Analisis De Redes Con Componentes SiméTricas
Ct 018 Analisis De Redes Con Componentes SiméTricasCt 018 Analisis De Redes Con Componentes SiméTricas
Ct 018 Analisis De Redes Con Componentes SiméTricas
 
Control Secuencial
Control SecuencialControl Secuencial
Control Secuencial
 
Cont Cables Para Instrumentacion Y Control Centelsa
Cont Cables Para Instrumentacion Y Control CentelsaCont Cables Para Instrumentacion Y Control Centelsa
Cont Cables Para Instrumentacion Y Control Centelsa
 
Consejo Del Mes 2
Consejo Del Mes 2Consejo Del Mes 2
Consejo Del Mes 2
 
Conexion Interna De Motores
Conexion Interna De MotoresConexion Interna De Motores
Conexion Interna De Motores
 
Comunidad Emagister 63424 63424
Comunidad Emagister 63424 63424Comunidad Emagister 63424 63424
Comunidad Emagister 63424 63424
 
Compuertas Logicasy
Compuertas LogicasyCompuertas Logicasy
Compuertas Logicasy
 
Compuertas Logicas
Compuertas LogicasCompuertas Logicas
Compuertas Logicas
 
Codificacion E Identificacion Pares Telefonicos
Codificacion E Identificacion Pares TelefonicosCodificacion E Identificacion Pares Telefonicos
Codificacion E Identificacion Pares Telefonicos
 
Cobre Desnudo Cable
Cobre Desnudo CableCobre Desnudo Cable
Cobre Desnudo Cable
 
Circuitos Operacionales
Circuitos OperacionalesCircuitos Operacionales
Circuitos Operacionales
 
Circuitos Electricos
Circuitos ElectricosCircuitos Electricos
Circuitos Electricos
 
Circuitos Integrados
Circuitos IntegradosCircuitos Integrados
Circuitos Integrados
 
Circuitos Electronicos 5
Circuitos Electronicos 5Circuitos Electronicos 5
Circuitos Electronicos 5
 
Circuitos Electronicos 4
Circuitos Electronicos 4Circuitos Electronicos 4
Circuitos Electronicos 4
 
Circuitos Electronicos 3
Circuitos Electronicos 3Circuitos Electronicos 3
Circuitos Electronicos 3
 
Ce Soi
Ce SoiCe Soi
Ce Soi
 
Cebic08 Sistema 4 Hilosñ
Cebic08 Sistema 4 HilosñCebic08 Sistema 4 Hilosñ
Cebic08 Sistema 4 Hilosñ
 
Cebic08 Sistema 4 Hilos
Cebic08 Sistema 4 HilosCebic08 Sistema 4 Hilos
Cebic08 Sistema 4 Hilos
 

Último

Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...CALL GIRLS
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...narwatsonia7
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...indiancallgirl4rent
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...Garima Khatri
 
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...Dipal Arora
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...chandars293
 
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Último (20)

Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
 
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
 
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
 

Walking Cyberhalls

  • 1. Walking the CyberHalls By Ken M. Shaurette, CISSP, CISA, CISM How important has it become in your school to have the ability to monitor student, teacher and administrator activity while using computer systems? In the past knowing that there were problems brewing in school was as simple as walking the halls to notice students fighting, bullying or simply planning mischief. In today’s technology driven world that has dramatically changed. Computers are available to nearly every student, at home as well as in the school library or computer labs. Computers are necessary to prepare our youth for the real world, which uses computer systems in nearly every aspect of industry, from diagnosing problems in our automobiles to managing our bank accounts. Students use computers while in school in a variety of ways. They research their term papers, write stories for English, or look up that illness discussed in Health Class. They even use web sites on the internet to translate words for their foreign language class. With the wide spread availability of computers also comes concerns of misuse even abuse. Schools have created a policy for acceptable use of computer resources. Even legislation, CIPA, the Children’s Internet Protection Act, was created in an attempt to encourage schools to prevent student access to “harmful” and “dangerous” resources. How does a school monitor student, teacher and employee cyber activity? There is more to it than just watching access to the Internet. As a Teacher or Principal, have you ever walked past a student on a school computer, and notice that he or she quickly minimizes or closes the window or program they were looking at? What was the student doing to cause this quick action as you approached? How can a school proactively monitor undesirable activities such as child enticement, access to pornography, or simply abuse of the school acceptable use policy? What about students communicating about bombs, or students changing grades using an administrative or teacher password? What about discussions regarding bringing guns to school using email, instant messenger or some other computer based means? How does a school walk these Cyber Halls? As I noted in the pre-computer days, you could walk the halls to see problem activity and often know when inappropriate activity was occurring. Now that a lot of student activity has moved to the Computer, how do you “walk the CyberHalls?” Is there a way to track activity of inappropriate student cyber behavior in order to support sanctions or capture the illegal activity by a school official (principal, superintendent or teacher) to provide forensic proof to support immediate actions? Actions might be a warning or a termination and could even lead to criminal action. The potential liability associated with letting activities continue without taking action can be © 2006 Sergeant Laboratories, Inc. http://www.provecompliance.com/
  • 2. significant. Even beyond the liability, some activities themselves could be disastrous. (bombs, guns, or child pornography) A company in Lacrosse, Wisconsin called Sergeant Laboratories has created a solution for “Walking the CyberHalls” named Aristotle. Aristotle allows a school to teach appropriate computer use. It frees technicians or school administration from being the “thought police”. It provides no more guessing about the usage of lab computers and software. Aristotle can provide notification of planning activities before the bomb threat, track teacher or student email/chat room harassment, even suicide discussions or plans to run away from home. It can do this all with real-time notification. Custom tailored “security events” when triggered, can be routed to the personnel responsible such as: lab monitors, district administration, or technical school coordinators. The comprehensive reporting allows school board members to understand district computer use and demonstrate computer usage costs during budgeting cycles. Aristotle also gives you the ability to see everything that is done on your computers, down to the keystroke. Through the use of custom security events based on key words which you define, you will be alerted when an incident occurs. If you suspect past inappropriate behavior, simply search for keywords or events and you will have the forensic quality data you need at your fingertips thanks to Aristotle’s DataVault™. I’d like to study briefly a couple real life cases where Aristotle helped a school in very powerful ways. The following Case Studies are based on real incidents, but the specific details described have been modified to protect the privacy of the actual event. Case Study #1: In my first case study there was a car accident in an upper Midwestern State resulting in the death of two young high school students and serious injuries to two others. Let’s examine at how Aristotle had a major impact potentially saving a student’s life. Using Aristotle’s feature to track use of words and phrases on computer systems, the Technology Coordinator, tracked “kill myself” and “suicide” for a few weeks after the accident. Within a few days Aristotle alerted the Coordinator that two students had used these words and phrases. In one situation Aristotle identified the user account of a student using WordPerfect to update their personal journal with the message; “I really miss my friend Billy, I don’t know what I’m going to do, I miss him so much. I think I’d be better off if I just kill myself.” The entry in the journal of the phrase “kill myself” triggered Aristotle’s policy created by the Technology Coordinator to automatically alert him on the use of that phrase. It identified who this student was by their personal school login and even identified the computer lab that they were using to write their journal. Immediate intervention was taken to get this student help. That help may have saved this young man’s life. The other alert was the use of the word “suicide” by a young girl on a school library computer. It turned out that her Health Class was studying Teen Suicide and she was in the process of doing research for the class assignment. She was using the Internet to find more information and statistics, her Google Search included the word suicide. No further action was necessary. © 2006 Sergeant Laboratories, Inc. http://www.provecompliance.com/
  • 3. Case Study #2: In our second case students were using a form of Instant Messenger to communicate with each other. This was even after System and Network Administrators thought they had Instant Messenger locked down so that it could not be used. In a communication between two students, one of the students noted, “I’m ready today, I brought in my gun.” When this alert occurred on the word “gun”, the Technology Coordinator immediate began drilling down on any other recent communications for this student, using the drilldown by user facility to find any other communications. What was pieced together was a plot between several students to take revenge on several students that had recently picked on them by shooting up the athletic awards case. Case Study #3: Our third case reveals Aristotle providing a surprise benefit to school administration. A small Midwestern K-12 School District for several weeks had been researching products that could provide a window into their network. They needed a solution that could help them better understand computer utilization in the district and would help them correct recent computer problems and answer questions from the school board regarding use of technology in the district. Using the simple installation procedures, the Aristotle agent was installed on over 1000 workstations across the district in less than 2 hours. As soon as the agent was deployed the DataVault™ began gathering information on the applications and activities of all computer usage across the district. It didn’t take long to identify a normal usage pattern for most systems and begin to build a profile of how the districts computers were getting used. One of the first things noticed was a lab that was not getting much use, yet teachers were constantly complaining that they did not have sufficient lab space for their classes. After a little research if was found that class sizes were generally 18-20 students and this lab only had 15 computer systems. After adding five workstations to this lab, Teachers again began scheduling classes in this lab. The value of Aristotle did not end there. A few days passed before abnormal activity was noticed on the principal at the middle school’s computer. It appeared that the principal was using several unusual applications. In addition it was noticed that the principal had visited some rather unique web sites and his use of the instant messenger application increased significantly. Alerts were set off access to file transfer and following a few minutes of researching the data gathered by Aristotle it was found that images were being downloaded from an ftp server located outside the United States. This sudden increase in unusual activity resulted in the need to begin looking a little further only to find that this principal was downloading child pornography images and was using his instant messenger to communicate with other young children. It appeared that he may have been attempting to entice them to meet with him after school. At this point law enforcement was called and evidence turned over to legal authorities. It is believed that the activity was caught early and a major undesirable situation for the school district avoided. © 2006 Sergeant Laboratories, Inc. http://www.provecompliance.com/
  • 4. Summary: These cases are but a few examples of the situations that Aristotle has been involved in. From saving lives and preventing school tragedies to helping manage the computing environment and ensure that acceptable use policy is being followed. More and more schools are finding a need to have the ability to track the use of computer systems. This ability can help you answer questions from the community on how the limited budget is being spent and how much educational value is being gained from the proper use of new technology and applications. If you wish to get more information on Sergeant Laboratories or request a demonstration visit the web site provecompliance.com. © 2006 Sergeant Laboratories, Inc. http://www.provecompliance.com/