Course Hero Logo

individal CMGT400-week3 - CMGT/400 Week Three 1 CMGT/400...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 5 out of 14 pages.

CMGT/400 Week Three1CMGT/400 Individual Assignment: Week ThreeRachel SussmanCMGT400August 31, 2015Instructor: Jude Bowman
Common Information Security Threats2Table of ContentsTable of Contents.....................................................................................................................2Identification of Vulnerabilities and Threats............................................................................3Potential Risks.........................................................................................................................4Risk mitigation.............................................................................................................................6Legal Safeguards......................................................................................................................6Social Data and Protection.......................................................................................................7Security Considerations...........................................................................................................8Student Access.............................................................................................................................8Faculty Access..............................................................................................................................9Administrative Access..................................................................................................................9Preventative Measures............................................................................................................9Recommended Virtual Desktop Infrastructures......................................................................11References.............................................................................................................................13
Common Information Security Threats3Identification of Vulnerabilities and ThreatsIn choosing an organization to focus on for the duration of this class, I have determined the School District of Philadelphia (SDP) would suffice as a subject. It was decided that the focus of this investigation would be divided into what the students have access too, what the teachers have access too and finally the administration (including district officials). By categorizing the data into these three groups, potential risks will be identified sooner, and the specific software and hardware involved in the risk will be attended too. According to Olumoye,“The digital world we are presently leaving is posing some important and new ethical questions such as who owns information, particularly information about us. Who is responsible for making the information accurate? Should we set guidelines on how business organizations and business professionals should use information, computer systems and information? And if that is so, what should these guidelines be? What penalties should be accessed for unethical norms and abuses? This topic is becoming increasingly so important so as to successfully manage the use of information systems in our society” (Olumoye, 2013)The most important demographic represented by the SDP are the students, ranging in ages from day care programs to adult education. A majority of this group is considered minors by the United States and is governed by a specific set of laws regarding education nutrition and safety. When investigating the systems for security threats, I will take into account the specific laws regarding public school students and minors while comparing to security protocols and dataprocedures in the SDP.Second, I will investigate the teachers, specifically any educator with direct contact insidea classroom and the ability to enter data on individual students into the electronic online grade book. This demographic of individuals inside the SDP have a great legal impact on information
Common Information Security Threats4systems, as each individual must enter legally binding grades, has access to confidential medical,emotional and demographical information regarding students and minors. The major systems investigated are SchoolNet and StudentNet information systems. The third demographic that I will investigate is administration and district officials. This specific demographic of employee has access to all systems under the SDP umbrella.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
LEE
Tags
Computer Security, National security, SDP

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture