You are the new director for information technology at premier


Case Study: Premier Collegiate School

You are the new director for Information Technology at PremierCollegiateSchool. The school teaches grade 7 through grade 12 with 300 students and 30 staff members and faculty. Each of the 10 administrative staff members has a dedicated desktop computer. The school’s principal has a notebook computer that she takes home and when traveling to conduct both school business and personal tasks. She maintains a Facebook account and has opened a MySpace account to monitor the activities of the students who also have such accounts. The teachers have 10 computers that they share in the teacher’s lounge to record grades and do all work associated with conducting their assigned classes (daily lesson plans, research, handouts, tests, quizzes, and final exams).

The school has two file servers. One is for administration business and the other serves student computing needs. The administration server has dedicated storage for each of the teachers and both hardwired access and wireless Local Area Network (LAN) access throughout the school. The student server has applications the students might need for their schoolwork, and provides wireless access for student-owned laptop computers. All students are required to have a laptop computer with wireless access. In addition, the school has a dedicated computer lab with 25 desktop computers for the students to use in computer science classes.


In your Lab Report file, list the risk elements at the school.

The following risk elements are apparent at the school:

Principal conducting business and personal tasks on same computer

Shared teacher computers – what levels of control/access are applied?

File Servers – levels of control/access are applied?

Network – can any systems be connected or is approval needed?

Wireless – can be an insecure connection method. Is authentication and transmission of information encrypted?

The school’s principal has requested that you prepare an IT asset list and a high-level prioritization or ranking of the IT assets given the function and purpose for administrative or student computing requirements. Fill in the table as follows:

Family Educational Rights and Privacy Act (FERPA)

Based on your experience and knowledge of schools, create a comprehensive asset list. Keep in mind that assets include more than just physical objects you can hold. Do not forget that assets include electronic information, such as student records, lesson plans, test banks, and so on. Assets also include key personnel, such as knowledgeable instructors and important administrators.

Determine the importance of each asset to the school function by ranking its placement on the list (starting with 1 as the most important, 2 as the second most important, and so on).

Using Figure 1 that follows the table, identify which of the seven domains of a typical IT infrastructure each asset resides in. The data, systems, or applications may have student privacy data elements.

Perform a high-level FERPA compliance assessment identifying where student privacy data resides and assessing the security controls protecting that data.

Prioritize each asset by assigning it a Critical, Major, or Minor classification

List three recommendations for IT security policies to help mitigate the risk exposures in the school’s IT infrastructure

Which IT assets did you prioritize as critical to administrative or student computing?

List your top five (5) risk exposures for which you believe this school should have specific risk-mitigation strategies.

Given the potential risks that you identified, what IT security policies would you recommend that the school create to help mitigate each of the identified risk exposures you listed in question #2?

True or false: FERPA compliance law is about protecting students’ privacy data, including personal information, grades, and transcripts. The law itself defines a privacy requirement but it does not specifically address security controls and security countermeasures.

Given that student privacy data is typically housed within administrative computers, systems, and databases, what can you do to mitigate the risk exposure that a student or someone on the student or school’s network can access these systems?

For a school under FERPA compliance law, do you think the administrative computing or student computing network infrastructure is more important from a business and delivery of education perspective?

The school monitors the use of student social networking on Facebook™, MySpace™, and Twitter™. What should the school define and implement if it wants to define acceptable and unacceptable use of school IT assets, Internet, e-mail, and use of personal laptop computers on the school’s network?



Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Australia Assessments
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Excellent work.
Customer 459155, June 7th, 2022
good job
Customer 456821, June 11th, 2022
Excellent. Thank you!
Customer 462787, August 23rd, 2022
I'm beyond grateful for this paper to be completed on time. I recently had a major surgery on my chest and sternum and was in so much pain and didn't want to fail from one paper. The work is awesome!!!! Very knowledgeable and informative, just excellent.
Customer 454165, March 17th, 2020
Absolutely wonderful speech! Thank you so much!
Customer 462815, April 20th, 2022
Excellent work
Customer 456821, March 28th, 2022
Customer 452441, April 6th, 2022
Best of the Best
Customer 453285, January 22nd, 2020
Thank you for your promptness
Customer 453627, January 23rd, 2020
Great job.
Customer 463301, November 14th, 2022
looks great
Customer 463501, October 16th, 2022
Human Resources Management (HRM)
Good work.
Customer 463125, July 4th, 2022
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat