IT Asset Inventory List

Prepare an IT asset list and a high-level prioritization or ranking of the IT assets given the function and purpose for administrative or student computing requirements. Fill in the table as follows:
• Based on your experience and knowledge of schools, create a comprehensive asset list. Keep in mind that assets include more than just physical objects you can hold. Do not forget that assets include electronic information, such as student records, lesson plans, test banks, and so on. Assets also include key personnel, such as knowledgeable instructors and important administrators.
• Determine the importance of each asset to the school function by ranking its placement on the list (starting with 1 as the most important, 2 as the second most important, and so on).
• Using Figure 1 that follows the table, identify which of the seven domains of a typical IT infrastructure each asset resides in. The data, systems, or applications may have student privacy data elements.
• Perform a high-level FERPA compliance assessment identifying where student privacy data resides and assessing the security controls protecting that data.
• Prioritize each asset by assigning it a Critical, Major, or Minor classification.

IT Asset
Description Ranking of
IT Asset One of Seven Domains FERPA Privacy
Data Impact Assessment
[Critical-Major-Minor]

Figure 1 Seven domains of a typical IT infrastructure

Search the term Family Educational Rights and Privacy Act (FERPA) using your favorite search engine
Instructions:
In this lab, you will create a high-level IT asset inventory list, you will prioritize those assets, you will identify the risk exposures, and you will make recommendations for policies that can mitigate the risk exposures.
Security policies mitigate risks in a wide variety of environments. Some risks are unique to different environments, and some environments produce highly significant risks. To counter these special environments, such as a hospital, school, or financial institution, the government legislates special acts to provide guidance and countermeasures. This lab uses the environment of a school and the guidance of the Family Educational Rights and Privacy Act (FERPA).
Case Study: Premier Collegiate School
You are the new director for Information Technology at Premier Collegiate School. The private school teaches grade 7 through grade 12 with 300 students and 30 staff members and faculty. Each of the 10 administrative staff members has a dedicated desktop computer. The school’s principal has a notebook computer that she takes home and when traveling to conduct both school business and personal tasks. She maintains a Facebook™ account and has opened a MySpace™ account to monitor the activities of the students who also have such accounts. The teachers have 10 computers that they share in the teacher’s lounge to record grades and do all work associated with conducting their assigned classes (daily lesson plans, research, handouts, tests, quizzes, and final exams).
The school has two file servers. One is for administration business and the other serves student computing needs. The administration server has dedicated storage for each of the teachers and both hardwired access and wireless Local Area Network (LAN) access throughout the school. The student server has applications the students might need for their schoolwork, and provides wireless access for student-owned laptop computers. All students are required to have a laptop computer with wireless access. In addition, the school has a dedicated computer lab with 25 desktop computers for the students to use in computer science classes.
Deliverables:
Include the following in your Lab Report File:
1. Use the above document to create a high-level IT asset inventory list and prioritize the IT assets in terms of importance to a school’s operation and business.

Your analysis should be 1–2 pages (no more than 800 words) in length. Your work should be submitted in a Word document, typed in double space, in 10– or 12–point Arial or Times New Roman font. The page margins on the top, bottom, left side, and right side should be 1 inch each. Assignments completed in a narrative essay or composition format must follow APA guidelines. This course will require students to use the citation and reference style established by the American Psychological Association (APA), and students should follow the guidelines set forth in Publication Manual of the American Psychological Association (6th ed.). (2010). Washington, D.C.: American Psychological Association.
2. Identify the top five risk exposures found in the high-level IT asset assessment.
3. Recommend IT security policies that can help mitigate the identified risk exposures.

Sample Solution

needs and the importance of perception and cognition of space and place design. In order to obtain more profound theoretical research results and better design projects, designers still need further research and practice to get an accurate basis; however, as seen in the experience presented thesis, designers have a good start on the space, place meaning and design.
Rapoport, A. (1970). The study of spatial quality. Journal of Aesthetic Education, 4(4), 81-95.
Lidwell, W., Holden, K., & Butler, J. (2010). Universal principles of design: 125 ways to enhance usability, influence perception, increase appeal, make better design decisions, and teach through design. Beverly, Mass: Rockport Publishers.
Ganoe, C. J. (1999). Design as narrative: A theory of inhabiting interior space. Journal of Interior Design, 25(2), 1-15. doi:10.1111/j.1939-1668.1999.tb00340.x
Caplan, B. (2016). Buildings are for people: Human ecological design. Chicago: Libri Publishing.
INDS-706
Sylvia Han
Pro. Gray
Winter 2019
Argument Paper 2 In this argument paper, I would like to discuss that the social theory’s function of humans and society plays an essential role in the design of social theory in the direction of indoor space. The purpose of the design is to solve these seemingly simple questions – “Is this useful for these people?” and “Is this solution better than this?” Therefore, through simpler problems, it reflects the problems that interior design needs to solve and causes people to think. For example, Interior designers need to use critical thinking and design methods that combine user needs to design interior programs. Some theories fact are reflected in interior design, such as the way of thinking, understanding direction and critical logic. Based on designers’ thinking, it is essential that the art, design and gestalt theories support and

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.