Table of Contents
Acknowledgments
Executive Summary
Preface
Chapter 1 - Why Information Security in Education?
Chapter 2 - Assessing Your Needs
Chapter 3 - Security Policy: Development and Implementation
Chapter 4 - Security Management
Chapter 5 - Protecting Your System: Physical Security
Chapter 6 - Protecting Your System: Information Security
Chapter 7 - Protecting Your System: Software Security
Chapter 8 - Protecting Your System: User Access Security
Chapter 9 - Protecting Your System: Network (Internet) Security
Chapter 10 - Training: A Necessary Investment in Staff
Appendices
A. Additional Resources about Computing
B. FERPA Fact Sheet
C. Related NCES Publications
D. Sample Acceptable Use Agreements
E. Bibliography and Selected Reference Materials
F. Citations
Glossary
|