University Of The Cumberlands Fall 2017 Assignment Executive

University Of The Cumberlandsfall 2017assignmentexecutive Summary O

University Of The Cumberlands fall 2017 assignment: Executive Summary on Risk Analysis In partial fulfillment of the requirements for Legal Regulations, Compliance and Investigation Submitted to Mr. Brian Strunk By Snehith Deshpande Student ID: , Email: [email protected] Date: Premier Collegiate School, a private school, has total strength of 300 students and 30 faculties. We can clearly observe that 2 servers are functioning within the school premises i.e. one for the administrative activities and other for student’s needs. In this, 35 desktops are shared by students as well as the faculties whereas 1 laptop is allotted for the principal. Only enrolled students are required to provide privately owned laptops for their school work. Hence, an asset list is required so that priorities can be listed on this based on their importance to the function of the school and the level of protection required for each and every asset. So, asset list for Premier Collegiate School is: IT asset Description IT Infrastructure Domain Privacy Data Impact Assessment (Critical-Major-Minor) Quantitative Value ($) Administration Server LAN Domain Accesses Customer Privacy Data Critical $3500 Student Server LAN Domain Accesses Customer Privacy Data Critical $3500 Storage System Application Domain Contains Customer Privacy Data Critical $2000 Wireless Access WAN Domain Accesses Customer Privacy Data Major $1500 Student Application System Application Domain Contains Customer Privacy Data Major $1200 Administrative Computers LAN to WAN Domain Accesses Customer Privacy Data Minor $1000 Staff Computers LAN to WAN Domain Accesses Customer Privacy Data Minor $1000 Principal Laptop Remote Access Domain Accesses Customer Privacy Data Minor $350 Computer Lab Workstation Domain Accesses Customer Privacy Data Major $10000

Paper For Above instruction

This report provides a comprehensive risk analysis for Premier Collegiate School, emphasizing the identification and prioritization of IT assets critical to the school's operations, along with corresponding protection levels and potential impacts. In today's digital age, educational institutions increasingly rely on technology infrastructure, making them vulnerable to various cybersecurity threats that can compromise sensitive data and disrupt operations. The primary purpose of this analysis is to determine each asset's significance, assess associated risks, and recommend appropriate security measures to safeguard the school's information systems.

Asset identification is the foundational step in risk management. In the context of Premier Collegiate School, several IT assets have been identified, each differing in their function, sensitivity, and impact on school operations. Among these, the servers and storage systems are critical to managing administrative and academic data, while devices such as workstations and laptops support daily activities. To systematically prioritize these assets, they are evaluated based on their privacy data content, importance to the school's operations, and their impact if compromised.

Classification and Prioritization of Assets

The assets are classified according to their privacy data sensitivity—containing customer privacy data or not—and their criticality to school functions, categorized as Critical, Major, or Minor. Servers holding customer privacy data—the administration server and the student server—are deemed Critical assets. Their compromise could severely disrupt administrative functions and student data confidentiality, leading to significant operational and legal repercussions, thus warranting a high protection level. The storage system, which contains customer privacy data, similarly earns a Critical classification due to its role in data storage and retrieval.

Workstations and applications, while vital for day-to-day activities, are classified as Major or Minor, depending on their level of influence on school operations. For example, the computer lab workstation and student application system are classified as Major assets, as their malfunction impacts a significant portion of educational activities. Administrative and staff computers are classified as Minor assets, given their support role in administrative efficiency but less critical to core operations.

Impact Assessment and Quantitative Valuation

Assigning impact levels—Critical, Major, Minor—helps in understanding potential consequences of asset compromise. The financial valuation reflects the cost associated with potential data breaches, system downtime, or other security incidents. For example, the principal's laptop receives a lower valuation and impact assessment (Minor, $350), reflecting its limited role in sensitive data handling. Conversely, the computer lab workstation's high valuation ($10,000) underscores its importance in the educational environment and the significant repercussions its loss or compromise could entail.

Risk Management Recommendations

Given this asset prioritization, the school should implement layered security controls, including access controls, encryption, regular backups, and intrusion detection systems, especially for Critical assets like servers and storage systems. Ensuring physical security, user authentication, and data encryption will mitigate risks related to unauthorized access and data breaches. Additionally, ongoing staff training on cybersecurity best practices can reduce the likelihood of social engineering attacks and accidental data leaks.

For Critical assets, rigorous monitoring, timely patch management, and incident response plans should be established. For Major and Minor assets, standardized security protocols and routine assessments will help maintain resilience against threats. Recognizing the interconnected nature of these assets, a comprehensive security architecture that addresses vulnerabilities across all levels is crucial.

Conclusion

In conclusion, effective risk management within Premier Collegiate School hinges on accurately identifying assets, evaluating their importance, and implementing appropriate protective measures. By prioritizing servers, storage, and key applications, the school can allocate resources more efficiently and strengthen its cybersecurity posture, ensuring continued operational integrity and protection of sensitive data. This proactive approach will help mitigate potential risks and align security practices with the school's operational needs and legal obligations.

References

  • Conti, M., & Dinha, R. (2019). Data Security in Educational Institutions: Strategies and Best Practices. Journal of Cybersecurity Education, 15(3), 233-245.
  • Johnson, T., & Smith, L. (2020). Risk Management Frameworks for Educational Institutions. Cybersecurity Review, 8(1), 45-59.
  • National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity. NIST Publication.
  • Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice. Pearson.
  • ISO/IEC 27001:2013. Information Security Management Systems Standard.
  • Riggins, F. J., & Mukhopadhyay, T. (2017). Managing Information Security Risks in the Education Sector. International Journal of Information Management, 37(6), 589-599.
  • U.S. Department of Education. (2019). Best Practices for Securing Educational Data. Office of Educational Technology.
  • Verizon. (2021). Data Breach Investigations Report. Verizon Enterprise.
  • Cybersecurity and Infrastructure Security Agency. (2020). Cybersecurity in Schools: Protecting Your School's Data. CISA Publication.
  • Wallace, M., & Webber, L. (2018). Building an Effective Cybersecurity Program in Education. Journal of Information Systems Education, 29(2), 123-132.