External Threat Protection

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3
Video Transcription
00:00
welcome back to student data privacy fundamentals. This lesson is external threat protection.
00:07
In this video, you will learn suggestions for filtering Internet,
00:11
how to protect against phishing and spam,
00:14
proper utilization of security patches and guidelines for user responsibilities.
00:21
Student learning, using online content and social collaboration continues to increase.
00:27
The district views Internet filtering as a way to balance safety with learning, letting good content re sources and connections in while blocking out the bad
00:38
to balance educational, Internet resource and application use with student safety and network security. The Internet traffic from all devices in the district network is routed through the district firewall and content filter.
00:54
All personal devices are required to authenticate prior to gaining access to the district network.
01:00
This process sets the filtering level appropriately based on the role of the guest user.
01:06
All sites that are known for malicious software fishing. Spira etcetera are blocked
01:12
quiz time. Consider content filtering and wet websites to block.
01:18
Is it possible to block all bad content for students?
01:26
While you can block all malicious software fishing's by where and other sites required by the FCC, it's impossible to block all bad content for students. Your best bet is to invest in a good content filter and educate staff and students on acceptable use.
01:45
Email is filtered for viruses, phishing, spam and spoofing using email services.
01:51
Again, the best practice here is to not only do your due diligence on the tech side, but to also educate users about such threats, teaching them to never click links in unexpected emails. Never submit personal information and emails, etcetera.
02:08
Here you will want to stay how often you will perform server and security patch management. For example, server patch management is performed weekly. Security patches are applied on an as needed basis, but at least weekly
02:25
here, you will want to state your user responsibilities for security processes.
02:30
An example in your policy could be, according to the district acceptable use policy. The district will make every effort to educate and guide all network users in the proper use of the Internet. However, it is impossible to control all materials on the global network. Therefore,
02:47
it is imperative the user be held accountable for the appropriate utilization of the technology.
02:55
In today's video, we discussed suggestions for filtering Internet toe, allow good content for students while blocking the bad
03:04
how to protect against phishing and spam through email filtering,
03:07
proper utilization of security patches weekly or more often if needed,
03:13
and guidelines for user responsibilities, including a statement explaining a user's responsibility in regards to Internet usage.
03:22
In our next lesson, we will discuss best practices with account management. See you soon.
Up Next