Now Accepting Apple Pay

Apple Pay is the easiest and most secure way to pay on StudyMoose in Safari.

Summary on Risk Analysis of School Security System

In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies.

The first portion that comes to mind is the access control security on the servers, sure they have 2 servers dedicated for separate values, but I would rather have the AD all on one computer with the permissions sorted out, and have the secondary computer to host the student information and patch management software since that will be a heavier load.

If the school is looking into how much money in saving, purchasing a stronger server with VMWare Workstation will give the school multiple servers in one build that can save them much money on one unit.

Get quality help now
Verified writer

Proficient in: Internet Privacy

4.7 (657)

“ Really polite, and a great writer! Task done as described and better, responded to all my questions promptly too! ”

+84 relevant experts are online
Hire writer

As for the wireless access given to anonymous laptops, the students should be placed on a separate domain or at least given access with limited access. Limited access in a school seems so small, but this is because the school should filter out what needs and does not need access while the students are in session. If there is a breach in the network, tracking the students may be a bit difficult, unless we can provide the wireless access like how ITT does their network.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Check writers' offers

You won’t be charged yet!

Even though the students can only log into the computers within school grounds using their ID, they can also use their ID to access the wireless network.

In another portion of a risk, the staff only has the given amount of computers for them to share. The security risk for this is that some teachers may leave their user ID logged in which may pose as a threat for privacy. Having some sort of rule for a timeout when the computer is not use would decrease the issue of invasion of privacy and would increase security to where another person should log in with a different identity.

Cite this page

Summary on Risk Analysis of School Security System. (2016, Mar 21). Retrieved from

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment