Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

You are the new System Support Technician at Premier Collegiate School. This private school has students from grade 7 to grade 12 with 300 students,

image text in transcribedimage text in transcribed

You are the new System Support Technician at Premier Collegiate School. This private school has students from grade 7 to grade 12 with 300 students, and 30 staff members and teachers. Each of the 10 administrative staff has a dedicated desktop computer. The school principal, Ashton Symonds, has a notebook computer which she takes home and when traveling to conduct both school business, and personal tasks. She maintains a Facebook and MySpace account to be able to monitor the activities of the students who also have such accounts.

The teachers have ten computers that they share in the teachers lounge to record grades and do all work associated with conducting their assigned classes (daily lesson plans, research, handouts, tests, quizzes, and final exams). There are two servers functioning in the school, one for the administration business, and one to serve student needs. The administration server has dedicated storage for each of the teachers and both hard wired access and wireless access throughout the school. The student server has applications the students might need for their schoolwork. In addition, the student server provides wireless access for student-owned and school-required laptop computers. All students are required to have laptop computers with wireless access. There is also one dedicated computer lab with 25 desktop computers for the students to use in computer science classes.

Principal Symonds has requested that you prepare an asset list and prioritize the assets based on their importance to the function of the school and the level of protection required for each asset.

image text in transcribed

Assignment: Executive Summary on Risk Analysis Attached Files: legal_ts_casepremiercollegiate.docx A (24.371 KB) Assignment Overview Refer to the Case Scenario: Premiere Collegiate School" text sheet provided. Use the scenario and the table discussed below to create an asset list with quantitative values to be used in the analysis. Quantitative values are arrived at by examining numerical, measurable characteristics such as original cost and cost of replacement. Students should rank the importance of each asset, based on the importance to the school, and justify their ranking. Learning Objectives and Outcomes - Describe how to justify risk analysis for assets in an organizational setting. - Relate those findings to the basic security principles of confidentiality, integrity, and availability. Assignment Requirements Refer to the "Case Scenario: Premiere Collegiate School" handout. Based on your review and consideration of the chapter readings and labs, create an asset list in order of importance of each asset and then write an executive summary report: 1. Identify all IT assets and enter a description of each into an asset identification and classification table, similar to the following. 1. Indicate in which of the seven domains of a typical IT infrastructure the asset resides. 2. Indicate if the asset accesses customer privacy data or contains customer privacy data. 3. Classify the IT asset as Critical, Major, or Minor. - Critical: Generates revenues or represents intellectual property asset of organization - Major: Contains customer privacy data. - Minor: Required for normal business functions and operations. 1. Assign a quantitative value to each asset. Consider the measurable characteristics of each asset, such as the original cost and cost of replacement. 2. Prioritize the order of the assets in the table based on their importance to the school. When prioritizing assets, consider why one asset should be protected more than another. 3. Use the information in the table to create an executive summary that explains your list. This executive summary will be presented to the school's board of directors. nammary repon: Prepiriti finseytien

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions