Assignment Requirements
You are the new system support technician at ABC School. This private school has students from grade 7 to grade 12, with 200 students and 30 staff members and teachers. Each of the 10 administrative staff has a dedicated desktop computer. The school principal has a notebook computer that she takes home and when traveling to conduct both school business and personal tasks. She maintains social media accounts to be able to monitor the activities of the students who also have such accounts.
The teachers each have a laptop computer (15 total) that they use to record grades and do all work associated with conducting their assigned classes (daily lesson plans, research, handouts, tests, quizzes, final exams, demonstrations, and remote learning).
There are two servers functioning in the school, one for the administration business and one to serve student needs. The administration server has dedicated storage for each of the teachers, with hard wired access and wireless access throughout the school as well as remote access. The student server has applications the students might need for their schoolwork. In addition, the student server provides wireless access for student-owned and school-required laptop computers, and remote access. All students are required to have laptop computers with wireless access. There is also a dedicated computer lab with 25 desktop computers for the students to use in computer science classes.
The principal has requested that you prepare an asset list and prioritize the assets based on their importance to the function of the school and the level of protection required for each asset. A simple table similar to the following can be used to create the asset list.
IT Asset Description
Accesses/Contains Privacy Data?
Assessment
[Critical-Major-Minor]
Quantitative Value
For this assignment:
Create a table and populate it with assets mentioned in the scenario.
Indicate if each asset accesses customer privacy data or contains customer privacy data.
Classify the IT asset as Critical, Major, or Minor.
Critical: Generates revenues or represents intellectual property asset of organization
Major: Contains customer privacy data
Minor: Required for normal business functions and operations
Assign a quantitative value to each asset. This requires researching typical costs of each asset. Consider the measurable characteristics of each asset, such as the original cost and cost of replacement.
Prioritize the order of the assets in the table based on their importance to the school. When prioritizing assets, consider why one asset should be protected more than another.
Use the information in the table to create an executive summary that explains your list. This executive summary will be presented to the school’s board of directors.