Cyber Crime, Legal, And Ethical Aspects

2333 Words Jun 28th, 2015 10 Pages
Cyber Crime, Legal, and Ethical Aspects
An educational institution, such as this preschool, should take the security of both systems and networks seriously. Modern technology has so many benefits for helping educators teach young children, but also potentially harm so many individuals and families if good security protocols are not followed. A security breach has the potential of exposing sensitive data about students, their families and staff. With a wealth of information cyber defenses in academia is worse than healthcare because academia is not prepared to practice attentive and organized cyber intelligence (Polancich, 2015). Crimes such as identity theft, kidnapping, extortion, and sex assaults against children are only a few of
…show more content…
Families should be able to send their children to a school to learn and remain safe from outside intruders, physical or in the cyber world. The five sections will be:
- Current Security Protocol
- Risk Assessment
- Threats and Vulnerabilities
- Policies
- Ethics

Current Security Protocol Currently there are only minor defenses in place to combat any potential system or network threats. The current setting to the network is a user/password requirement which is provided to staff. This is good to require both user and password to access the system, however passwords should be renewed every quarter and to assist with remembering this could be turned over to the user to create a password. A user defined password should require a combination of capitalized/lowercase letters, special characters and/or numbers; as well as requiring a different password from the last five passwords used.
The current system does have a firewall, anti-virus/malware software and a secure Wi-Fi. This too is a good security measure as long as the definitions are updated on a regular basis and software may require upgrades. Email is provided to all staff to get updates, however this is not done in a timely manner. This leaves some staff unable to send or receive information vital to their work performance.
Sensitive data files are not encrypted and are accessible by some staff. However, hard copies are kept and
Open Document