[Year 12 IT Apps] Security measures

Kent Beveridge kbeveridge at stbc.vic.edu.au
Wed Sep 12 10:46:49 EST 2007


Ahh Antonia, the depths of your knowledge knows no bounds. 
KB.( I just took the short option- refer to the study design, less typing)
 
 
Kent Beveridge,
I.T. co-ordinator
St. Brigids Catholic Sec. College
Horsham
email.. kbeveridge at stbc.vic.edu.au
 
|<3|\|7  b3\/3r1D93 ?  ;-)

Wishes and Eggs, one you make and one you break!  A bit like promises.....
"This email and any attachments may be confidential.  You must not disclose or use the information in this email if you are not the intended recipient.  If you have received this email in error, please notify us immediately and delete the email and all copies.  The School does not guarantee that this email is virus or error free.  The attached files are provided and my only be used on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not.  The content and opinions in this email are not necessarily those of the School."

________________________________

From: itapps-bounces at edulists.com.au on behalf of Antonia Caridi
Sent: Wed 9/12/2007 10:14 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] Security measures



Having written U4 O2 in the Study Design and both on VITTA CD my understanding is that students need to know as much about storage, communication & disposal of data as they have in the past as this task is almost identical to U3 O3 of the last study design.

I don't think that students need to know detailed technical information about security hardware and software but they must have understanding/awareness of

the four main privacy acts - their gist and what laws organisations, governments, other are bound by
ethical considerations of technology in the workplace
common hardware that is used to protect data
common software (logical tools) that are used to protect data
strategies that can be implemented to minimise threats to data including storage procedures
disaster recovery strategies
evaluation of security strategies

I agree that the Potts text has a lot of info about surveillance technology but I don't think that students would be expected to know this much detail - however they should be expected to know that such technology exists.

I think knowledge of back up media, and commonly used physical and logical security measures is essential.

I think Potts text has good info on disaster recovery.

I also think that questions on these topics from past papers will be useful in determining the extent of knowledge required because the key knowledge of the past U3 O3 are:

the legal obligations of organisations and individuals to monitor and control the flow and access of information, including key provisions of several acts
ethical considerations relating to the use of information systems by organisations and individuals
threats to the security of data and information stored, communicated and disposed of by organisations * viruses, unauthorised access, tampering with files, failure to follow file management procedures (deliberate or accidental), equipment failure/damage
possible consequences of the violation of or failure to follow security measures (equipment and procedures)
procedures and equipment for protecting the integrity of data and the security of information
types, roles and functions of equipment used to assist in the protection of files produced and received by organisations * virus protection software, encryption software, biometrics, backup media, firewalls, surveillance technology to protect the security of information
criteria for evaluating the effectiveness of file management strategies * integrity of data, security, ease of retrieval, currency of files


Please let everyone know if I am wrong Paula!!

Antonia


Antonia Caridi
Sacre Coeur
172 Burke Road
Glen Iris 3146
(03) 9885 4501

èµ__________________________________________________________________________________
This email and any attachments may be confidential and, if you are not the intended recipient you must not disclose or use the information in this email. If received in error, please notify the sender immediately and delete the email and all copies. The school does not guarantee that this email is virus or error free. Any attached files are provided and may only be used on the basis that the recipient assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of this email and/or attached files, whether caused by the negligence of the sender or not. The content and opinions in this email are not necessarily those of Sacre Coeur.
____________________________________________________________________________________

_______________________________________________
http://www.edulists.com.au <http://www.edulists.com.au/>  - FAQ, resources, subscribe, unsubscribe
IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.auvce/studies/infotech/itapplications3-4.html - Victorian Curriculum and Assessment Authority and
http://www.vitta.org.au <http://www.vitta.org.au/>   - VITTA Victorian Information Technology Teachers Association Inc



-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/ms-tnef
Size: 7868 bytes
Desc: not available
Url : http://www.edulists.com.au/pipermail/itapps/attachments/20070912/b307c82f/attachment.bin


More information about the itapps mailing list