Troy, doing as you suggest will make the script be owned by root, but it will still run with the permissions of your current user. You used to be able to set the setuid bit on the script so that it would run as root, but you can no longer do this.
(Quick aside to explain why: I create a script that contains the line "rm -fr /". I then set the setuid bit, and I run "chown root mybadscript". Run the script and wave goodbye to your files...)
If the program was a compiled binary, then setting the setuid bit would work. This being a shell script, though, it won't.
Using the "sudo" package will solve the problems. It lets you run scripts as the super-user by running "sudo /my/script". The default behaviour is for the user to be asked for a password. However, you can set things up so that the script is run as root without being prompted for a password.
If you do decide to do this, then you must be 100% certain that the sudoers file does not allow other scripts to be run in the same way. You also need to be 100% certain that the script you are running cannot be compromised. In other words, can I login as a normal user, create a script that will cause damage to the system, and then copy it over the top of the existing, safe, script? If the answer is no, then that's half the problem solved.
There are stacks of documentation provided with sudo, and it is very easy to set it up in a secure way. For that reason, that is the method I would suggest.
Hope this helps.