Harnessing Technology - A possible scenario
The Scenario (Fiction)
A Primary school student (Y6) is given a nice “EeePc” which they are allowed to take home to do “school work” on. The OS is Linux. No changes to the OS have been made (possible due to lack of knowledge). The (free) AV provided has been configured and is working. It has been configured for Internet access on the school LAN which is filtered.
The school has got the parents to sign the appropriate “AUP” provided by the school. When the student gets home, they connect the PC to their home network and proceed to surf the Internet to some inappropriate sites. They then make an anonymous threat against another student.
The other student eventually tells their parents that they have been threatened and the threat is eventually tracked back to the culprit after many weeks.
The annoyed parents of the threatened student want to know why it took so long to track down the culprit and why did they give a child something that could be used to threaten another child.
The parents of the offender state that this would not have happened on the home PC as they have appropriate software that stops this activity.
Was enough (from an ICT perspective) done to mitigate the risks and inappropriate Internet access by the student on the school PC.