MyAssignmentServices uses cookies to deliver the best experience possible. Read more

Design An ICT Security Framework - Task 1

Green Public Schools (GPS) ICT Network Security Requirements and Its Impact on The Existing ICT System

Green Public Schools (GPS) ICT network securities required a system to an efficient security control system

  • To prevent the infiltration of unauthorized devices – With the growth in number of users over time, current system has become more ineffective to implement system management and control to curb the access to unauthorized devices which are infiltrating the system, and creating risk of situation like data breach or data theft.
  • A way of separating student and public access on network from the private faculty/staff wireless network – Network system need to segregate the access to student and public with the access given to private faculty and staff, to avoid improper (non academic) use of network by public and students ( Collis & Jung,203).

 Due to this securities issue started with growing number of users IT staffs had to spend a big time doing hand on maintenance and trouble shooting of individual component throughout every school building. Then they have to find a way to allow multiple new devices such as laptops, mobile phones and other hand held devices used by student as well as faculty and staffs. This issue related with security and system management has become a burden on resources of IT department, which is creating unacceptable amount of financial burden for school system.

Design An ICT Security Framework - Task 2

 Risk Analysis to Identify Security Threats to Determine Security Specifications

  • Identifying threats – Unauthorized access of network by unauthorized devices can lead to misconfiguration of weak security control, which can compromise the network defense. Growth in numbers of devices accessing GPS’s wireless network have increased the risk of intruders and rough devices into network. Intruders are constantly probing the network’s vulnerability for access point with malicious intention ( Kaplan and Norton,2001).
  • At risk – Students and teachers who are using wireless network by their devices are at risk of data theft and unauthorized access to their private information stored in device to an intruder or a system. Data breach is a huge concern and can cause serious damage to any institution, in this case GPS.
  • Risk assessment – Data breach is a serious privacy concern for students as well as teachers, which had become possible due to lack of proper implementation of security and control management on GPS legacy wireless network system. This has put 2800 students at risk of data theft. Also unauthorized access can lead to use of network for any anti-social and criminal purpose that can dame the institution reputation.
  • Security specification
  • Wireless network system must be configured in such way that it enables system to automatically enforce restriction on unauthorized devices. But GPS’s wireless network system was unable to put restriction when large number of devices gets connected to the network.
  • A network must be capable enough to segregate network access given to multiple sections of users. To enforce this GPS’s IT department were not able to implement proper security and management control of the system. Due to increase in number of devices using the network.

Design An ICT Security Framework - Task 3

Controls and Contingencies to Alleviate Security Threats and Costs Associated with It

The rise in cyber crime, it’s important for an organization to protect their network and data. As it is impossible to predict data breach to the system, but an organization like GPS can be prepare to alleviate the impact of such data breach into its system. Its main purpose is to protect data and provide assistance after a data breach into the system.

A contingency plan mainly is a combination of three sets of plan i.e, Disaster Recovery, Emergency mode operation and Data backup Plan.

  • Disaster Recovery plan – It is written procedure to recover and protect the system after a data breach is occurred. In this process main focus remain on restoring the operation of network system and securing the private database of students and teachers. School can implement encrypted system to ensure safety of each data as in case of a breach into network no can access the private data of system ( Pearson2003).
  • Emergency Mode Operation – Even when a data breach occurs it is not possible for schools to shut the network use, as schools are dependent on network for academic activity. So school needs a plan for emergency operation in such case. A centralized system of network can help with this by allowing network to operate with restriction of access to each user.
  • Data backup plan – GPS can make a centralized data base for every school of its group where data can be backup in case of network failure or a breach, from where data can be accessed again after the normalcy return to the network.
  • Cost associated with it – cost associated with it is the cost of centralized system for network operation and database storage system. But it will reduce the burden on IT department resources that have to go to each school for trouble shooting and hand on maintenance. It will also reduce the overall financial burden over the school.

Design An ICT Security Framework - Task 4

Green Public Schools (GPS) ICT Security Policy and Operational Procedures

For disaster recovery plan

  • Highest authority must be notified at earliest in case of network failure.
  • Rough device or user must be identified and must be restricted from the network as early as possible ( Dickson and Desanctis,2000).
  • Breached system must be isolated to keep other devices and system out of risk.

For emergency mode operation

  • Network access must be restricted to all private users.
  • All remote connection must be disconnected.
  • Network speed must be limited.
  • All private data must be locked from accessing by any user.

For data backup plan

  • At tome of network failure or breach all data of that system must be uploaded to remote database storage.
  • All the private information must be encrypted with proper encryption.
  • Unless system return to normalcy data access must be denied to each private user.
  • After system return to normalcy, data must be restored to the system for user to access.

Design An ICT Security Framework - Task 5

Procedures Based on The Security Policies


Chairmen Green Public Schools (GPS)

Subject – work procedure based security policy for wireless network


After studying network vulnerability, we have come with following procedure based policies for the wireless network system. This is must to be implemented to secure network from threat. Following are the policies listed below-

  • Network device must be configured properly to segregate access to private student and teacher/staff.
  • Any user of network must sign NDA to not disclose devices or any detail of the system outside the organization ( Collis & Jung,2003).
  • Access to the private user or student must be time bound.
  • Inappropriate websites and social media access must be curbed.
  • All access to network must be routed through VPN with a valid approval.
  • Off network access to the network must be restricted.
  • Proper identification of user must be ensured for wireless network access.
  • Security measure 802.11i such as CCMP and TKIP must be employed for encryption.
  • A proxy firewall must be there between remote user and server.

 We need your approval on this for implementation.


IT department

References for Design An ICT Security Framework

Collis, B., & Jung, I. S. (2003). Uses of information and communication technologies in teacher education. In B.

Dickson, G, DeSanctis, G. (2000) Information Technology and the Future Enterprise: New Models for Managers, Prentice Hall New Jersey

Kaplan, R. S. and Norton, D. P. (2001). The Strategy Focused Organization, Harvard Business School Press.

Pearson, J. (2003). Information and Communications Technologies and Teacher Education in Australia. Technology, Pedagogy and Education, 12(1), 39-58.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Not Specific >5000
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts


  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

  • Total

  • Let's Start

500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

Request Callback

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help

Hire Certified Experts
Ask your Question
Need Assistance on your
existing assignment order?