Get help now

Writing a email assignment

  • Pages 2
  • Words 374
  • Views 553
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Assignment Executive Summary on Risk Analysis In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies.

    The first portion that comes to mind is the access control security on the servers, SUre they have 2 servers dedicated for separate values, but I would rather have the AD all on one computer with the permissions sorted out, and have the secondary computer to host the student information and patch management software since that will be a heavier load. If the school is looking into how much money in saving, purchasing a stronger server with Ovenware Workstation will give the school multiple servers in one build that can save them much money on one unit.

    As for the wireless access given to anonymous laptops, the students should be placed on a separate domain or at least given access with limited access. Limited access in a school seems so small, but this is because the school should filter out what needs and does not need access while the students are in session. If there is a breach in the network, tracking the students may be a bit difficult, unless we can provide the wireless access like how ITT does their network. Even though the students can only log into the computers within school grounds using their ID, hey can also use their ID to access the wireless network.

    In another portion of a risk, the staff only has the given amount of computers for them to share. The security risk for this is that some teachers may leave their user ID logged in which may pose as a threat for privacy. Having some sort of rule for a timeout when the computer is not use would decrease the issue of invasion of privacy and would increase security to where another person should log in with a different identity.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Writing a email assignment. (2018, Jun 19). Retrieved from

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy