SlideShare une entreprise Scribd logo
1  sur  6
Running head: CASE STUDY 3 ZITO 1
Make Your Schools Computers More Secure or Else!
Isaac A Zito, Student of Pittsburgh Technical College, Information Technology
Author Note
Case study project for Client Application Support, Mr. Mutale
CASE STUDY 3 2
Abstract
The purpose of this paper is to give the readers of this paper, specifically IT security employees
for schools, facts as to why you should be careful about when students have access to your
computers. The generations of kids born in this age of technology that we are going through now
are becoming more and more tech savvy with each generation, meaning that a lot of them
probably know how to get past your security that you have setup, either they know through their
own experience with messing around with security and group policy settings, or they just did a
simple google search to get instructions on how to get past group policies because they thought it
would be fun to go to an inappropriate site in school. The thing is though that just because they
know how to get past your security, that does not mean that they know the risks and danger of
doing so, and in just about every case of this happening they infect your computers with a virus
and you have to clean it up and get yelled at for it, and maybe even lose your job because of it.
So I hope that by reading this that you can get some tips or ideas on how to better secure your
schools computers and not only keep yourselves safe, but also your students.
Keywords: Security, Students, Computer, School(s)
CASE STUDY 3 3
Make Your Schools Computers More Secure or Else!
Never Under Estimate Your Enemy
You may think that just because they are kids that they cannot find a way around the
security that you setup, you are very wrong, they will find a way past your security whether it’s
because you underestimated them or because you did not even think to treat them as a security
risk. An example of this would be a case from a little more than three years ago, what happened
was that schools in Indiana and California decided to upgrade their tech and gave each of their
students and IPad for school work as a part of program to make the school technologically
advanced and also giving students a more modern learning experience. It did not take the
students long to figure out how to jail break the IPads some students just needed to delete a file
made by their schools IT group, other students had found a way to prevent the IPads from
connecting to their schools network and therefore removing the restriction on what they could
download. The schools had spent hundreds of millions of dollars on the IPads for the students as
a part of an education plan that they had been working on for years, and it took their students just
a few minutes to turn each and every one of those IPads into a security threat. So when you think
about it kids are even more of a security threat than your everyday office worker due to their lack
of knowledge of scamming tricks and how unsafe the internet can really be.
Know Your Enemy
I think that the best approach to take in this case is to have a class dedicated to teaching students
how to use a computer along with how to deal with basic internet threats. It’s not so much a class
meant to teach them what not to do with the schools computers, but to also get to know them and
give them knowledge that they will have to know since, no matter what job they will have in the
CASE STUDY 3 4
future, they will use with a computer for the rest of their lives whether it be with home computer
or a work computer.
[Heading 3].
[Include a period at the end of a run-in heading. Note that you can include consecutive
paragraphs with their own headings, where appropriate.]
[Heading 4].
[When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text
following it before the next heading, just add a period at the end of the heading and then start a
new paragraph for the subheading and its text.] (Last Name, Year)
[Heading 5].
[Like all sections of your paper, references start on their own page. The references page
that follows is created using the Citations & Bibliography feature, available on the References
tab. This feature includes a style option that formats your references for APA 6th Edition. You
can also use this feature to add in-text citations that are linked to your source, such as those
shown at the end of this paragraph and the preceding paragraph. To customize a citation, right-
click it and then click Edit Citation.] (Last Name, Year)
CASE STUDY 3 5
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.
Last Name, F. M. (Year). Book Title. City Name: Publisher Name.
CASE STUDY 3 6
Footnotes
1[Add footnotes, if any, on their own page following references. For APA formatting
requirements, it’s easy to just type your own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote
Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If
you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the
end of the sample Heading 2 paragraph on the first page of body content in this template.)]

Contenu connexe

En vedette (10)

Tipos de virus
Tipos de virusTipos de virus
Tipos de virus
 
Storyboardidea
StoryboardideaStoryboardidea
Storyboardidea
 
255 Catalog
255 Catalog255 Catalog
255 Catalog
 
بروفايل جديد
بروفايل جديدبروفايل جديد
بروفايل جديد
 
Noticia de impresion 3d gabriel
Noticia de impresion 3d gabrielNoticia de impresion 3d gabriel
Noticia de impresion 3d gabriel
 
rul
rulrul
rul
 
Conflict transformation - Chili - Por la razón o la fuerza -
Conflict transformation - Chili - Por la razón o la fuerza - Conflict transformation - Chili - Por la razón o la fuerza -
Conflict transformation - Chili - Por la razón o la fuerza -
 
elle
elleelle
elle
 
Торжественная ленейка на 1 сентября
Торжественная ленейка на 1 сентябряТоржественная ленейка на 1 сентября
Торжественная ленейка на 1 сентября
 
Sources of water supply
Sources of water supplySources of water supply
Sources of water supply
 

Similaire à Make Your Schools Computers More Secure or Else Mutale

Digital Security WebQuest
Digital Security WebQuestDigital Security WebQuest
Digital Security WebQuestdcrawford08
 
15 best practices for online teaching
15 best practices for online teaching15 best practices for online teaching
15 best practices for online teachingDavid Deubelbeiss
 
Technology and.pdf
Technology and.pdfTechnology and.pdf
Technology and.pdfsdfghj21
 
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docxWriters Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docxannetnash8266
 
Essay Writing Service
Essay Writing ServiceEssay Writing Service
Essay Writing ServiceAllen Butch
 
Webquest
Webquest Webquest
Webquest LS76
 
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxYour Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxdanielfoster65629
 
Phonemic Awareness TableTaskScriptingDescription and.docx
Phonemic Awareness TableTaskScriptingDescription and.docxPhonemic Awareness TableTaskScriptingDescription and.docx
Phonemic Awareness TableTaskScriptingDescription and.docxJUST36
 
Online education under the covid 19 pandemic
Online education  under the covid 19 pandemicOnline education  under the covid 19 pandemic
Online education under the covid 19 pandemicRaufur Rahman Akanda
 
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINETHE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINEcscpconf
 
7 Top class apps that every Grad student must use
7 Top class apps that every Grad student must use7 Top class apps that every Grad student must use
7 Top class apps that every Grad student must useDaisy Simpson
 
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxAssignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxbraycarissa250
 
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxAssignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxjosephinepaterson7611
 
INF 103 Exceptional Education - snaptutorial.com
INF 103  Exceptional Education - snaptutorial.comINF 103  Exceptional Education - snaptutorial.com
INF 103 Exceptional Education - snaptutorial.comDavisMurphyB9
 
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docx
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docxRunning head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docx
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docxcheryllwashburn
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEacijjournal
 

Similaire à Make Your Schools Computers More Secure or Else Mutale (20)

Digital Security WebQuest
Digital Security WebQuestDigital Security WebQuest
Digital Security WebQuest
 
15 best practices for online teaching
15 best practices for online teaching15 best practices for online teaching
15 best practices for online teaching
 
Unit 5 powerpoint
Unit 5 powerpointUnit 5 powerpoint
Unit 5 powerpoint
 
Technology and.pdf
Technology and.pdfTechnology and.pdf
Technology and.pdf
 
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docxWriters Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
 
Essay Writing Service
Essay Writing ServiceEssay Writing Service
Essay Writing Service
 
Webquest
Webquest Webquest
Webquest
 
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxYour Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
 
Digital security
Digital securityDigital security
Digital security
 
Phonemic Awareness TableTaskScriptingDescription and.docx
Phonemic Awareness TableTaskScriptingDescription and.docxPhonemic Awareness TableTaskScriptingDescription and.docx
Phonemic Awareness TableTaskScriptingDescription and.docx
 
Online education under the covid 19 pandemic
Online education  under the covid 19 pandemicOnline education  under the covid 19 pandemic
Online education under the covid 19 pandemic
 
Etech Q1 Module 3.pdf
Etech Q1 Module 3.pdfEtech Q1 Module 3.pdf
Etech Q1 Module 3.pdf
 
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINETHE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
 
7 Top class apps that every Grad student must use
7 Top class apps that every Grad student must use7 Top class apps that every Grad student must use
7 Top class apps that every Grad student must use
 
Tools for teaching
Tools for teachingTools for teaching
Tools for teaching
 
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxAssignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
 
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docxAssignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
Assignment 2 Project Paper (Template)cOVER pAGE On the cover page.docx
 
INF 103 Exceptional Education - snaptutorial.com
INF 103  Exceptional Education - snaptutorial.comINF 103  Exceptional Education - snaptutorial.com
INF 103 Exceptional Education - snaptutorial.com
 
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docx
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docxRunning head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docx
Running head DATABASE PERFORMANCE1DATABASE PERFORMANCE3.docx
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
 

Make Your Schools Computers More Secure or Else Mutale

  • 1. Running head: CASE STUDY 3 ZITO 1 Make Your Schools Computers More Secure or Else! Isaac A Zito, Student of Pittsburgh Technical College, Information Technology Author Note Case study project for Client Application Support, Mr. Mutale
  • 2. CASE STUDY 3 2 Abstract The purpose of this paper is to give the readers of this paper, specifically IT security employees for schools, facts as to why you should be careful about when students have access to your computers. The generations of kids born in this age of technology that we are going through now are becoming more and more tech savvy with each generation, meaning that a lot of them probably know how to get past your security that you have setup, either they know through their own experience with messing around with security and group policy settings, or they just did a simple google search to get instructions on how to get past group policies because they thought it would be fun to go to an inappropriate site in school. The thing is though that just because they know how to get past your security, that does not mean that they know the risks and danger of doing so, and in just about every case of this happening they infect your computers with a virus and you have to clean it up and get yelled at for it, and maybe even lose your job because of it. So I hope that by reading this that you can get some tips or ideas on how to better secure your schools computers and not only keep yourselves safe, but also your students. Keywords: Security, Students, Computer, School(s)
  • 3. CASE STUDY 3 3 Make Your Schools Computers More Secure or Else! Never Under Estimate Your Enemy You may think that just because they are kids that they cannot find a way around the security that you setup, you are very wrong, they will find a way past your security whether it’s because you underestimated them or because you did not even think to treat them as a security risk. An example of this would be a case from a little more than three years ago, what happened was that schools in Indiana and California decided to upgrade their tech and gave each of their students and IPad for school work as a part of program to make the school technologically advanced and also giving students a more modern learning experience. It did not take the students long to figure out how to jail break the IPads some students just needed to delete a file made by their schools IT group, other students had found a way to prevent the IPads from connecting to their schools network and therefore removing the restriction on what they could download. The schools had spent hundreds of millions of dollars on the IPads for the students as a part of an education plan that they had been working on for years, and it took their students just a few minutes to turn each and every one of those IPads into a security threat. So when you think about it kids are even more of a security threat than your everyday office worker due to their lack of knowledge of scamming tricks and how unsafe the internet can really be. Know Your Enemy I think that the best approach to take in this case is to have a class dedicated to teaching students how to use a computer along with how to deal with basic internet threats. It’s not so much a class meant to teach them what not to do with the schools computers, but to also get to know them and give them knowledge that they will have to know since, no matter what job they will have in the
  • 4. CASE STUDY 3 4 future, they will use with a computer for the rest of their lives whether it be with home computer or a work computer. [Heading 3]. [Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate.] [Heading 4]. [When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text.] (Last Name, Year) [Heading 5]. [Like all sections of your paper, references start on their own page. The references page that follows is created using the Citations & Bibliography feature, available on the References tab. This feature includes a style option that formats your references for APA 6th Edition. You can also use this feature to add in-text citations that are linked to your source, such as those shown at the end of this paragraph and the preceding paragraph. To customize a citation, right- click it and then click Edit Citation.] (Last Name, Year)
  • 5. CASE STUDY 3 5 References Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To. Last Name, F. M. (Year). Book Title. City Name: Publisher Name.
  • 6. CASE STUDY 3 6 Footnotes 1[Add footnotes, if any, on their own page following references. For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of the sample Heading 2 paragraph on the first page of body content in this template.)]