8
Running head: CASE STUDY 3 ZITO 1 Make Your Schools Computers More Secure or Else! Isaac A Zito, Student of Pittsburgh Technical College, Information Technology Author Note Case study project for Client Application Support, Mr. Mutale

Make Your Schools Computers More Secure or Else Mutale

Embed Size (px)

Citation preview

Page 1: Make Your Schools Computers More Secure or Else Mutale

Running head: Case study 3 ZITO 1

Make Your Schools Computers More Secure or Else!

Isaac A Zito, Student of Pittsburgh Technical College, Information Technology

Author Note

Case study project for Client Application Support, Mr. Mutale

Page 2: Make Your Schools Computers More Secure or Else Mutale

Case study 3 2

Abstract

The purpose of this paper is to give the readers of this paper, specifically IT security employees

for schools, facts as to why you should be careful about when students have access to your

computers. The generations of kids born in this age of technology that we are going through now

are becoming more and more tech savvy with each generation, meaning that a lot of them

probably know how to get past your security that you have setup, either they know through their

own experience with messing around with security and group policy settings, or they just did a

simple google search to get instructions on how to get past group policies because they thought it

would be fun to go to an inappropriate site in school. The thing is though that just because they

know how to get past your security, that does not mean that they know the risks and danger of

doing so, and in just about every case of this happening they infect your computers with a virus

and you have to clean it up and get yelled at for it, and maybe even lose your job because of it.

So I hope that by reading this that you can get some tips or ideas on how to better secure your

schools computers and not only keep yourselves safe, but also your students.

Keywords: Security, Students, Computer, School(s)

Page 3: Make Your Schools Computers More Secure or Else Mutale

Case study 3 3

Make Your Schools Computers More Secure or Else!

Never Under Estimate Your Enemy

You may think that just because they are kids that they cannot find a way around the

security that you setup, you are very wrong, they will find a way past your security whether it’s

because you underestimated them or because you did not even think to treat them as a security

risk. An example of this would be a case from a little more than three years ago, what happened

was that schools in Indiana and California decided to upgrade their tech and gave each of their

students and IPad for school work as a part of program to make the school technologically

advanced and also giving students a more modern learning experience. It did not take the

students long to figure out how to jail break the IPads some students just needed to delete a file

made by their schools IT group, other students had found a way to prevent the IPads from

connecting to their schools network and therefore removing the restriction on what they could

download. The schools had spent hundreds of millions of dollars on the IPads for the students as

a part of an education plan that they had been working on for years, and it took their students just

a few minutes to turn each and every one of those IPads into a security threat. So when you think

about it kids are even more of a security threat than your everyday office worker due to their lack

of knowledge of scamming tricks and how unsafe the internet can really be.

Know Your Enemy

I think that the best approach to take in this case is to have a class dedicated to teaching students

how to use a computer along with how to deal with basic internet threats. It’s not so much a class

meant to teach them what not to do with the schools computers, but to also get to know them and

give them knowledge that they will have to know since, no matter what job they will have in the

Page 4: Make Your Schools Computers More Secure or Else Mutale

Case study 3 4

future, they will use with a computer for the rest of their lives whether it be with home computer

or a work computer.

[Heading 3].

[Include a period at the end of a run-in heading. Note that you can include consecutive

paragraphs with their own headings, where appropriate.]

[Heading 4].

[When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text

following it before the next heading, just add a period at the end of the heading and then start a

new paragraph for the subheading and its text.] (Last Name, Year)

[Heading 5].

[Like all sections of your paper, references start on their own page. The references page

that follows is created using the Citations & Bibliography feature, available on the References

tab. This feature includes a style option that formats your references for APA 6th Edition. You

can also use this feature to add in-text citations that are linked to your source, such as those

shown at the end of this paragraph and the preceding paragraph. To customize a citation, right-

click it and then click Edit Citation.] (Last Name, Year)

Page 5: Make Your Schools Computers More Secure or Else Mutale

Case study 3 5

References

Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name.

Page 6: Make Your Schools Computers More Secure or Else Mutale

Case study 3 6

Footnotes

1[Add footnotes, if any, on their own page following references. For APA formatting

requirements, it’s easy to just type your own footnote references and notes. To format a footnote

reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote

Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If

you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the

end of the sample Heading 2 paragraph on the first page of body content in this template.)]