Course Hero Logo

Administrative access to schoolnet due to the

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 10 - 13 out of 20 pages.

Administrative Access to SchoolNetDue to the necessity of administrative needs arising outside the typical workday hours,the need to access information systems is higher.Administrators will have to login with both auser-generated password and phone number.Therefore, administration and district officeemployees will access the necessary data not unlike the students and faculty, but in addition,administrators and district employees will have access to an offline mode.This offline mode willinclude tracking of activity and access points in addition to location.This information is used,when necessary, to track information system security issues to a specific user and/or system.
We have textbook solutions for you!
/Enhanced-Discovering-Computers-1st-Edition-9781305657465-233/
The document you are viewing contains questions related to this textbook.
Chapter 9 / Exercise 09
Enhanced Discovering Computers
Sebok/Vermaat
Expert Verified
Common Information Security Threats11Preventative MeasuresA healthy level of paranoia is necessary in order to outline the necessary preventativemeasures to ensure security of all data when accessing information systems, such as StudentNet,SchoolNet, and the like.Using preventative measures led to the decision to use a virtualdesktop.According to "Virtual Desktop Software Pros And Cons" (2009), “Another notablebenefit of virtual desktop software is superior administration. Virtual desktop managementhappens almost entirely at the server level. When a new desktop is needed, an administrator canprovision a pre-established virtual image and deploy a thin-client PC with a minimum of timeand effort. The admin can also allocate additional server resources to virtual desktops that requiremore processing power or scale them back for incidental and non-essential users. Deployment ofnew software patches and upgrades for all virtual desktops can happen at the server level, ratherthan on each individual PC.” (Desktop virtualization pros).As conventional PCs store data locally, which leaves the system open to attacks fromoutside sources and inside system failures, virtual desktop software will increase security, as thedata is stored off site, in a secure location.The "Virtual Desktop Software Pros AndCons" (2009) website explains, “Virtual desktop machines use storage in the data center (truethin clients don't even have local storage), so there is no data to lose on the endpoint device. Thisdesign also centralizes antivirus, antispyware and other security products. Virtual desktops canallow some software installation flexibility for the user, but admins can also lock them down toprevent the installation of new or unauthorized applications.” (2009)Finally, in the advent of a security breach or data loss incident, using the current systemsallows a total loss of data to be catastrophic.Where as using a virtual desktop would increasesecurity as back up procedures are left out of the hands of the user.According to "Virtual
Common Information Security Threats12Desktop Software Pros And Cons" (2009), “disaster recovery planning is simplified with virtualdesktop software. Conventional environments rely on PC users to back up their own data, butend users are notoriously inconsistent or infrequent with their backups, which usually lead todata loss in a disaster. Servers, on the other hand, are backed up routinely and consistently. A

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 20 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
LEE
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Enhanced Discovering Computers
The document you are viewing contains questions related to this textbook.
Chapter 9 / Exercise 09
Enhanced Discovering Computers
Sebok/Vermaat
Expert Verified

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture