Running head: Case study 3 ZITO 1
Make Your Schools Computers More Secure or Else!
Isaac A Zito, Student of Pittsburgh Technical College, Information Technology
Author Note
Case study project for Client Application Support, Mr. Mutale
Case study 3 2
Abstract
The purpose of this paper is to give the readers of this paper, specifically IT security employees
for schools, facts as to why you should be careful about when students have access to your
computers. The generations of kids born in this age of technology that we are going through now
are becoming more and more tech savvy with each generation, meaning that a lot of them
probably know how to get past your security that you have setup, either they know through their
own experience with messing around with security and group policy settings, or they just did a
simple google search to get instructions on how to get past group policies because they thought it
would be fun to go to an inappropriate site in school. The thing is though that just because they
know how to get past your security, that does not mean that they know the risks and danger of
doing so, and in just about every case of this happening they infect your computers with a virus
and you have to clean it up and get yelled at for it, and maybe even lose your job because of it.
So I hope that by reading this that you can get some tips or ideas on how to better secure your
schools computers and not only keep yourselves safe, but also your students.
Keywords: Security, Students, Computer, School(s)
Case study 3 3
Make Your Schools Computers More Secure or Else!
Never Under Estimate Your Enemy
You may think that just because they are kids that they cannot find a way around the
security that you setup, you are very wrong, they will find a way past your security whether it’s
because you underestimated them or because you did not even think to treat them as a security
risk. An example of this would be a case from a little more than three years ago, what happened
was that schools in Indiana and California decided to upgrade their tech and gave each of their
students and IPad for school work as a part of program to make the school technologically
advanced and also giving students a more modern learning experience. It did not take the
students long to figure out how to jail break the IPads some students just needed to delete a file
made by their schools IT group, other students had found a way to prevent the IPads from
connecting to their schools network and therefore removing the restriction on what they could
download. The schools had spent hundreds of millions of dollars on the IPads for the students as
a part of an education plan that they had been working on for years, and it took their students just
a few minutes to turn each and every one of those IPads into a security threat. So when you think
about it kids are even more of a security threat than your everyday office worker due to their lack
of knowledge of scamming tricks and how unsafe the internet can really be.
Know Your Enemy
I think that the best approach to take in this case is to have a class dedicated to teaching students
how to use a computer along with how to deal with basic internet threats. It’s not so much a class
meant to teach them what not to do with the schools computers, but to also get to know them and
give them knowledge that they will have to know since, no matter what job they will have in the
Case study 3 4
future, they will use with a computer for the rest of their lives whether it be with home computer
or a work computer.
[Heading 3].
[Include a period at the end of a run-in heading. Note that you can include consecutive
paragraphs with their own headings, where appropriate.]
[Heading 4].
[When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text
following it before the next heading, just add a period at the end of the heading and then start a
new paragraph for the subheading and its text.] (Last Name, Year)
[Heading 5].
[Like all sections of your paper, references start on their own page. The references page
that follows is created using the Citations & Bibliography feature, available on the References
tab. This feature includes a style option that formats your references for APA 6th Edition. You
can also use this feature to add in-text citations that are linked to your source, such as those
shown at the end of this paragraph and the preceding paragraph. To customize a citation, right-
click it and then click Edit Citation.] (Last Name, Year)
Case study 3 5
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.
Last Name, F. M. (Year). Book Title. City Name: Publisher Name.
Case study 3 6
Footnotes
1[Add footnotes, if any, on their own page following references. For APA formatting
requirements, it’s easy to just type your own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote
Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If
you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the
end of the sample Heading 2 paragraph on the first page of body content in this template.)]