Case Study Of Risk Assessment: Pinellas County Schools

Brilliant Essays
Risk Assessment: Pinellas County Schools
Evelyn Davis
November 22, 2015
University of Maryland University College

EXECUTIVE SUMMARY

Pinellas County Schools is the seventh-largest in the state of Florida. The creation of Pinellas County Schools came to be after a split in 1912 from Hillsborough County. Pinellas County serves 150 schools including magnets schools, career academies, adult education centers and a virtual school program. Pinellas County Schools with the help of 7000 plus educators offers families a wealth of educational possibilities well-matched to students’ interests, talents, and abilities.

Pinellas County Schools collect and maintain data on students, faculty and staff who work within the school district.
…show more content…
Introduction

Purpose
The core reason for this risk assessment is to recognize hazards and liabilities in relation to Pinellas County Schools. The risk assessment will be applied to recognize the severity of risk in relation to Pinellas County Schools I.T. (information technology) systems.

Scope of this risk assessment
The scale of this risk assessment covers a web-based application developed and maintained by Schoolwires Inc. for the school district. The objective is to gain an inclusive view of the website and then choose core areas for assessment. The pcsb.org/ website provides members of the community with school district updates, as well as a place for faculty to log in and view proprietary information. However; this risk assessment is projected to be beneficial for the 150 school that make up the district. Even though this risk assessment is for Pinellas County Schools, it can be custom fitted for other school districts, colleges or universities in the state depending on the size of an institution. The emphasis will be on the tools and resources that support electronic data (i.e. student information, teacher information) and related tasks.

II. Risk Assessment Approach

The
…show more content…
(2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf

NIST - National Institute of Standards and Technology. (2012, September). Special Publication
800-30 REV 1: Guide for Conducting Risk Assessments. Retrieved October 26, 2015 from http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf

Lestch, C. (n.d.). CYBERSECURITY IN K-12 EDUCATION: Schools face increased risk of cyber attacks - StateScoop. Retrieved October 31, 2015 from http://statescoop.com/cybersecurity-k-12-education-schools-face-increased-risk-c

Information Assurance. (2015, Oct 20). Retrieved from Iowa State University: http://www.iac.iastate.edu/

Meier, J. (2010, July 8). Cloud Security Threats and Countermeasures at a Glance. Retrieved from J.D. Meier's Blog: http://blogs.msdn.com/b/jmeier/archive/2010/07/08/cloud-security-threats-and-countermeasures-at-a-glance.aspx
NIST 800-30 Risk Assessment Report Template | Georgia Technology Authority. (n.d.). Retrieved from https://gta.georgia.gov/documents/nist-800-30-risk-assessment-report-template

Note: All of the sources were used to help with research, but only on was required to be

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Aptly-named Lakeland, Florida is home to thirty-eight lakes, the largest, Lake Palmer, covers 2,550 acres. When you ask a Lakeland resident where they live, they will likely tell you which lake they live near, not what section of the city where they reside. With the swan-filed lakes and parks surrounding the larger lakes, Lakeland has a unique, charming character. Population and Getting Around…

    • 344 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Physical Environment- Based on the places I have travelled Tuscaloosa County, this area offers a wide variety of environments. The county has multiple lakes and parks along with urban and suburban areas as well. Out of 67 counties in Alabama , Tuscaloosa ranks 24th when comparing physical environment.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Calaveras County

    • 495 Words
    • 2 Pages

    Calaveras County is and always will be my home. Many high school students are eager to leave the county and go and explore the world. A large number of students will not return to Calaveras as it has a number of key issues that keep those from returning. One example is the ruralness of the county. Due to Calaveras feeling as if it is in the middle of nowhere, there is not much to do for a young aspiring adult to partake in.…

    • 495 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Tallahassee Crime

    • 433 Words
    • 2 Pages

    Tallahassee is not as safe as families may think. Recent Florida Department of Law Enforcement (FDLE) reports have shown that Tallahassee, Leon County has a shocking total crime index due to it’s rather small population compared to cities like Miami and Jacksonville. With a total population of 287,671 in 2016 there was a total number of 16,269 crimes accounted for during 2016. Many families, college students, and citizens did not realize how awful crime was in Tallahassee. “I’ve lived in this city all of my life, I have a family here.…

    • 433 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Authentication With the rapid growth of Web-based applications, the Internet is a perfect target for hackers. Attacking an individual person or a multi-billionaire company is achievable in a click of a button. Today, almost everything is done by means of using the Internet, from simple email access to paying bills online, managing online banking, filling out taxes, shopping, and so on. As a result, the Internet has become a feeding ground for hackers. These presents a great deal of concerns and challenges for the organization’s security.…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Any risks to safety are identified and rectified immediately or the area placed out of bounds until the risk is removed. Electrical items are safety tested on an annual basis, and fire extinguishers are also checked and the checks recorded on the fire extinguisher casing. Health and safety is a regular topic at staff meetings, with any new risks, changes to policies or legislation being communicated to staff at these meetings. Should the need to urgently inform staff of a new risk arise, the staff will be informed directly by the head teacher. 3.1 Outline the importance of taking a balanced approach to risk management Children need to learn to assess risk for themselves.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The future of digital crime and digital terrorism is important to consider how the landscape of cybercrime looks into the future. Computer technology shifts and changes within time. In this paper review and explore the trends, needs, and issues related to cyber crime and terror in the future through the use of forecast. As we gain the knowledge of cybercrime and cyber terrorism, there has been researching study on the evolution of cyber threats in security. The levels of awareness of cyber threats have increased.…

    • 930 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A Risk Analysis Essay

    • 1188 Words
    • 5 Pages

    SL.no Risks, Threats, ad Vulnerabilities Primary domain impacted Risk Impact/factor 1 Unauthorized access from public Internet WAN 2 2 User destroys data in application and deletes all files LAN 1 3 Hacker penetrates your IT infrastructure and gains access to your internal network System/Application 3 4 Intraoffice employee romance gone bad Workstation 3 5 Fire destroys primary data center System/Application 1 6 Service provider service level agreement (SLA) is not achieved User 2 7 Workstation operating system (OS) has a known software vulnerability Workstation 3 8 Unauthorized access to organization-owned workstations Workstation 2 9 Loss of production data server System/Application 1 10 Denial of service attack on organization Demilitarized zone (DMZ) and e-mail server System/Application 2 11 Remote communications from a home office WAN 3 12 LAN server OS has a known software vulnerability LAN 3 13 User downloads an unknown e-mail attachment Workstation 3 14 Workstation browser has software vulnerability Workstation 3 15 Mobile emplyoee needs secure browser access to sales-order entry system LAN-to-WAN 2 16 Service provider has a major network outage User 1 17 Weak ingress/egress traffic-filtering degrades performance User…

    • 1188 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The director of ITS/CSO has a great challenge, having been in charge of cyber security for two years and has not established the best cyber security measures. Investors demand to see the Annual Report to Investors every year and details of any risk that can impact the company’s financial economy changes is disclosed in the report. In this specific year, the cyber security concerns were scripted in the report (Red Clay Renovation Case Study, n.d.). Concerns include the fear of cyber attacks that…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction This paper describes seven threats to a network belonging to a fictitious marketing company in Kansas City, Missouri. These threats are based on different IT infrastructure domains. The detail of these threats explains the possible outcomes and endeavors to point out “what is the worst that can happen” from that threat. Threats…

    • 717 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Human Dimensional Impacts upon Information Security Infrastructure William Fisher University of Maryland University College CSEC610 Cyberspace and Cybersecurity Professor Hall Abstract Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor.…

    • 2361 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    As a large Fortune 500 company, it is extremely important that all measures against threats are managed properly. With the advancement in Information Technology, there are ways to manage security vulnerabilities and assess the level of risk to determine if the risk must be confronted or if it is an acceptable risk for the company. No matter how hard we try, risks will always be out there and that is why it is imperative that correct measures are taken to see the company’s vulnerabilities and to prevent exploitation. A Security Risk Assessment is the very first step of a full risk analysis and involves many different steps.…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    What the Military Can Teach the Private Sector About Cybersecurity Data breaches within the United States have hit an all-time high. The Identity Theft Resource Center estimates that the year-over-year increase for cyberattacks is 27.5%. Nowadays, it’s not a question of whether an attack will happen, but when. As a result, businesses should take a military-approach to cybersecurity.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    From the Kg Ayer field trip that I had on the last Saturday, I have learned the trip would be useful for students’ learning in the future, particularly for Social Studies and History students. Teachers play an important role in ensuring the field trip to run smoothly and meaningful for their learning experience, one by providing students with good reading materials and risk assessment beforehand. This reflective essay will talk about my experience and how Kg Ayer field trip would be useful for my students’ learning in the future. Risk assessment form is one of the important procedures that teachers have to consider before conducting field trip as it involves students’ safety.…

    • 1065 Words
    • 5 Pages
    Improved Essays