We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Get Offer

Assignment Executive Summary on Risk Analysis Essay

Paper type: Analysis
Pages: 2 (369 words)
Downloads: 4
Views: 347

In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies.

The first portion that comes to mind is the access control security on the servers, sure they have 2 servers dedicated for separate values, but I would rather have the AD all on one computer with the permissions sorted out, and have the secondary computer to host the student information and patch management software since that will be a heavier load.

If the school is looking into how much money in saving, purchasing a stronger server with VMWare Workstation will give the school multiple servers in one build that can save them much money on one unit.

As for the wireless access given to anonymous laptops, the students should be placed on a separate domain or at least given access with limited access. Limited access in a school seems so small, but this is because the school should filter out what needs and does not need access while the students are in session. If there is a breach in the network, tracking the students may be a bit difficult, unless we can provide the wireless access like how ITT does their network. Even though the students can only log into the computers within school grounds using their ID, they can also use their ID to access the wireless network.

In another portion of a risk, the staff only has the given amount of computers for them to share. The security risk for this is that some teachers may leave their user ID logged in which may pose as a threat for privacy. Having some sort of rule for a timeout when the computer is not use would decrease the issue of invasion of privacy and would increase security to where another person should log in with a different identity.

Cite this page

Assignment Executive Summary on Risk Analysis. (2016, Mar 21). Retrieved from https://studymoose.com/assignment-executive-summary-on-risk-analysis-essay

How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Not Finding What You Need?

Search for essay samples now


Your Answer is very helpful for Us
Thank you a lot!