logo

Student Grading System Security

   

Added on  2023-06-09

12 Pages2145 Words385 Views
Running head: STUDENT GRADING SYSTEM SECURITY
Student grading system security
Name of the Student
Name of the University
Author note

1
STUDENT GRADING SYSTEM SECURITY
Table of Contents
Introduction................................................................................................................................2
Scope..........................................................................................................................................2
Risk assessment..........................................................................................................................3
User Authentication and Access Controls..............................................................................3
Server security........................................................................................................................4
Software security....................................................................................................................4
Network security....................................................................................................................4
Risk register...........................................................................................................................5
Security strategies and actions...................................................................................................6
User Authentication and Access Control...............................................................................6
Server security........................................................................................................................7
Software security....................................................................................................................7
Network security....................................................................................................................7
Other risks..............................................................................................................................7
Implementation plan...............................................................................................................8
Residual risks.............................................................................................................................8
Resources...................................................................................................................................9
Maintenance and training...........................................................................................................9
References................................................................................................................................10

2
STUDENT GRADING SYSTEM SECURITY
Introduction:
The report emphasizes on the grading system of the students that is planned to be
implemented by the Remarkable University. The grading system that is planned by the
university ensures that it fit for the purpose of the system and will be capable of providing
security from the various threats that may take place. The core components of the student
grading system are a front-end web or application server that students, administrative staff
and academics staff use and a database for holding the grades of the students. The report
identifies the several types of threats that may arise due to the implementation of the grading
system. The measures and strategies that can be adopted in order to prevent these threats have
been discussed in the report. The following paragraphs describe the IT assets and identifie the
risks to the key assets by considering the various security domains. The report outlines the
security strategies and actions and provides recommendations by developing a security
implementation plan. The resources that would be required for the implementations of the
recommendations provided in the report are also described in the following paragraphs.
Scope:
The Remarkable University is planning to implement a new grading system for the
students. The University is required to ensure that this new system will remain prevented
from the simple manual and common automated attacks. The system needs to remain
protected from several risks that may arise by implementing some appropriate access control.
The main components of the new grading system are a front-end web or application server
and database for holding the grades of the students. The university needs to develop the
grading system application in a secure manner by ensuring the information transferred
through the system is protected and the database is secure from common automated attacks.
There are several types of risk issues that may arise due to the implementation of the grading

3
STUDENT GRADING SYSTEM SECURITY
system including unauthorized access, attempts by the students to modify the data,
modifications by the external users, attempts to exploit the file or the system and many other
risks. The IT assets that can be identified in the system implemented by the university
discussed in the following paragraphs.
A proper software that restricts students from modifying the grades as the students
may attempt to modify their grades.
Authorised login system for the prevention from modification of data and personal
information by any external user.
Proper applications or software in order to protect the system from malicious codes.
The password protected file or system for storing the information as students or
external users may attempt to exploit the file.
Firewall to prevent unauthorized users from accessing the data or information that are
stored in the system.
Risk assessment:
User Authentication and Access Controls:
The unauthorised access is a major risk that may take place with the application of
student grading system by Remarkable University. It can be prevented by implementing
several IT software or hardware assets.
Authorised login system:
There is a risk of unauthorized access to data and information stored in the system,
therefore the university may implement a system or software that would be prevented the
system from being accessed by any unauthorized user. The students may try to steal the login
password in order to access the system.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Grading System Security
|11
|2603
|96

Information and Security Management
|22
|5365
|80

Network Security Tools Report
|7
|1141
|38

Advanced Network Security: Wireshark Analysis, Web Application Attacks, Cryptography Concepts, Trojan Download Research
|12
|1957
|154

Information Security Management for CloudXYZ: Risk Assessment and Mitigation
|18
|3419
|275

System Design Document
|8
|965
|350