Implementation of a print server under a security and technological sustainability approach
Main Article Content
Abstract
Due to the need for physical documents in academic and professional environments, printing services are of great importance on a daily basis; however, they often present problems with disconnections and unauthorized access. Therefore, it was decided to implement a regulated print server to address these issues.
This implementation included a hardware upgrade, as well as preventive maintenance of a repurposed computer to serve as the print server. The installation of the operating system, an office suite, and security tools was also carried out, including the installation and configuration of a firewall and access control lists to restrict the use of unauthorized equipment. Client devices were connected to the server using Universal Naming Convention paths under a client-server architecture. This incorporated authentication mechanisms and network segmentation to strengthen security.
The results showed a reduction in reports or requests related to printing failures and device reconfiguration, which optimized the workload of the Technical Support area. Similarly, the reuse of computers that were going to be discarded contributed to a decrease in electronic waste, thus promoting technological sustainability. This strategy demonstrated that centralizing services, using open-source software, and implementing security controls increases operational efficiency, strengthens information security, and fosters sustainable practices within the department.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Este trabajo tiene la licencia CC BY-NC-ND 4.0
References
Andrews, J. (2019). CompTIA A+ guide to IT technical support (10th ed.). Cengage Learning.
International Organization for Standardization. (2022). Information security, cybersecurity and privacy protection — Information security management systems — Requirements (ISO/IEC 27001:2022). ISO.
Kurose, J. F., & Ross, K. W. (2021). Computer networking: A top-down approach (8th ed.). Pearson.
Patterson, D. A., & Hennessy, J. L. (2017). Computer organization and design: The hardware/software interface (5th ed.). Morgan Kaufmann.
Vermaat, M.E., Sebok, S., Freund, S.M., Campbell, J., & Frydenberg, M. (2018). Discovering computers (16ª ed.). Cengage.
Silberschatz, A., Galvin, P. B., & Gagne, G. (2022). Operating system concepts (10th ed.). Wiley.
Stallings, W., & Brown, L. (2018). Computer security: Principles and practice (4th ed.). Pearson.
Stallings, W., & Brown, L. (2022). Computer security: Principles and practice (5th ed.). Pearson.
Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.