Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 | Chapter 9 | Chapter 10 |
Table of Contents | Glossary of Terms |
Preface
These guidelines are written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively
secure their organization's sensitive information, critical systems, and computer equipment.
This document is:
Formatting Conventions While all of the information in this guide is important to an educational administrator who is developing and implementing security policy in his or her organization, some points stand out in particular. To better emphasize these points, a few symbols are used throughout the document.
Notice, for example, that the "lightning bolts" in the left margin below alert readers that they are permitted to modify, customize, and reproduce any part of this document. Also included, where appropriate, are superscript numbers to denote resource citations as listed in Appendix F. Lastly, terms that are defined in the glossary are in bold the first time they appear in each chapter.
|