C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 2 Total Cost of Ownership © Routledge.

Slides:



Advertisements
Similar presentations
SHOW ME THE MONEY BUDGETING 101.
Advertisements

Chapter 3: Planning a Network Upgrade
Library/Media Center Presentation Room - Budget Proposal By Jennifer LeMaster and Matt Dockery.
Tech Plan - Timeline 3 Year Cycle Required by OSPI and Title IID Federal funding year July 2010 Plan due to OSPI before April 5 th Board Approval at March.
Baltic High School Classroom Connections Presentation.
Chapter 14 Pricing General Expenses. Objectives Upon completion of this chapter, you will be able to: –Define general expenses –Use a checklist to identify.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Waterloo Local School District Technology Lab Presentation 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 9 Pricing Construction Equipment. Objectives Upon completion of this chapter, you will be able to: –Identify the three main equipment categories.
Managing a computerised PO Operating environment 1.
CHAPTER 6 ACCOUNTING FOR AND PRESENTATION OF PROPERTY, PLANT, AND EQUIPMENT, AND OTHER NONCURRENT ASSETS McGraw-Hill/Irwin©The McGraw-Hill Companies, Inc.,
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Comprehensive IT Consulting Services an innovative approach to business.
Installing Virtualisation Software and Virtual Servers.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Chapter Three OPERATING SYSTEMS.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Managing Computerised Offices Operating environment
Information Systems Security Computer System Life Cycle Security.
4.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 4 Chapter IT Infrastructure: Hardware and Software.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Dr.Backup Online Backup Service (888) (toll free)
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 13 Electronic Sexual Harassment.
The rush for Xirrus and our many partners begins now. | WI-FI for K-12 ENVIRONMENTS E-Rate 2.0.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
C HAPTER 4 A UTHENTICATION POLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 7 Auditing Policy © Routledge Richard.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 9 Analysis Policy © Routledge Richard.
Adult Education and Literacy Budget Development and Cost Allocation.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 1: Introduction © Routledge Richard.
Management Plan Goran Smajlagic S English 2100.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard.
Budgeting Technology. Start with a Plan Learners Learning Environments Professional Competency System Capacity Community Connections Technology Capacity.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Is There a Proper Accounting for Indirect Costs?
Allocating Operating Expenses in Commercial Real Estate Leases: Negotiating Strategies for Landlords and Tenants Scott D. Brooks, Cox Castle & Nicholson.
Blackboard Security System
ICT II Unit 6 Networking.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
“Cost Driver” (the activity) Owning a car
Data Compromises: A Tax Practitioners “Nightmare”
Dresdner Bank & Wyndham International: The Business Case for Server Consolidation Chapter 3 Case 2.
Enterprise Systems Management – ESM821S
King Saud University- College OF Applied Studies
Bethesda Cybersecurity Club
King Saud University- College OF Applied Studies
PLANNING A SECURE BASELINE INSTALLATION
Investments: Property, Plant, and Equipment and Intangible Assets
Topics.
Presentation transcript:

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 2 Total Cost of Ownership © Routledge Richard Phillips and Rayton R. Sianjina

T OTAL C OST OF O WNERSHIP (TCO) The “real” cost of technology is a multitude of expenses. The electricity that runs the computer, the cables that connect the computers, the tables to set the technology upon, the Internet access to let the students explore the global nature of the Internet; all Total Cost of Ownership, or TCO. Costs are a mix of direct and indirect costs. © Routledge

T OTAL C OST OF O WNERSHIP (TCO) Indirect costs are administrative expenses not directly attributable to the technology purchase or technology operation. Referred to as “overhead costs.” Direct costs would include equipment acquired for and directly attributable to the execution of a project. Estimates of costs above and beyond the actual equipment purchase lie between 10–25 percent of total cost. © Routledge

T OTAL C OST OF O WNERSHIP (TCO) Four cost categories: equipment costs, operation and maintenance costs, equipment disposition costs, and non-operational costs. IT specialist has to decide between owning the equipment or leasing the equipment. Which is more cost effective to the organization? A 3–5 year effective life span that may be required to be in operation for 10 years? Or a 5-year upgrade that will have extra operational costs every 5 years? © Routledge

T OTAL C OST OF O WNERSHIP (TCO) Operational technology can include equipment racks, wired and wireless routers, servers for connectivity, and video, software and memory for system backup and protection, RAID and various memory technologies, and technology management/automation software. © Routledge

T OTAL C OST OF O WNERSHIP (TCO) Operation and maintenance costs include cost of wiring and interconnectivity, the cost of maintaining the technology warranty and possibly an extended warranty, the cost of software and software licensing, etc. Electrical = the per hour cost of running a typical computer and monitor $3 times (X) number of computers in the system 20, 50, 100 times (X) number of hours 40 hours, 50 hours or 24 hours system runs at full power for a week’s Times (x) 5 days = estimated electrical cost. Next, add the cost of running the system at reduced electrical usage in the overnight hours. © Routledge

T OTAL C OST OF O WNERSHIP (TCO) IT system security management requires maintaining an accurate inventory of technology, an accurate accounting of both potential system threats and incurred system threats, OS system patch management, consistent client and information cleanup and deletions, consistent monitoring for virus outbreaks, monitoring unauthorized access attempts, monitoring hacking-related and Malware attacks, and management of compliance with state and federal laws and standards. © Routledge

T OTAL C OST OF O WNERSHIP (TCO) Disposition costs would include the peripheral costs of operating the new technology. Computer tables and computer chairs would be considered disposition costs. The cost of appropriate lighting, the cost of lighting installation, the cost of installing electrical outlets for the area where the new technology will be housed, © Routledge the cost of the square footage for the new technology area, the cost of climate control for the new technology area, the cost of peripheral technology for the new technology area (projector, Smart board, whiteboard, LCD screens), the cost of physical computer lock-down, and the cost to install and maintain a security system for the new technology are all examples of the disposition costs that need to be calculated into the Total Cost of Ownership.

T OTAL C OST OF O WNERSHIP (TCO) Non-operational costs can be defined as all those costs that are necessary, but not directly connected, to the operation of the new technology. One of the major non- operational costs that educational systems tend to neglect when considering TCO is training. Insurance: state, federal, and granting agencies require insurance to protect against theft, damage, and catastrophic loss. Technology needs to be audited and inventoried on an annual basis requiring non-technical personnel to perform the accounting. © Routledge.

T OTAL C OST OF O WNERSHIP (TCO) IT specialists need to be able to calculate and predict the cost of unexpected down time in the case of electrical, technological, or other catastrophic failures and what would be the cost of temporarily renting or leasing technology to maintain operations. Calculating the cost of replacement is often ignored in TCO. Replacement will require man hours, transportation, and disposal costs that will need to be paid in order to make room for new technology. © Routledge

C ONCLUSION Together with best practices these are the foundations of sound technology integration in our schools: Effective leadership styles CAI,CMI, and CEI TCO © Routledge