The rest of the paper is organized as follow: Section II describes literature review, section III describes the proposed implementation methodology for educational institutes, section IV provides the suggestion of some basic controls of information security for them and section V discusses the conclusion of this paper.