Tuesday, May 5, 2020

Case Study On IT Support And IT Policies

Questions: 1. How do you classify different types of IT support and IT policies within an organization? Please consider the local and global context of the policies. 2. What protection and safety measures should system administrators consider? 3. What are the basic troubleshooting strategies for solving system-related technical issues? Answers: 1. Introduction System administrators are responsible to install, maintain and support various servers and computer systems in an IT setup. The role of an administrator in a small scale organization is understood through this report. 2. Types of IT Support Desktop setup and end-user support Network Setup and Administration Data Recovery and back up Dealing with system crashes Password recovery issues Software Installation Hardware issues 3. IT policies The all below IT policies (but not restricted to) have to be adhered to ensure that no litigations arise Passwords should be kept secure(Liao, 2016) Portable equipment should not be connected to any of the companies systems Approved anti-virus software has to be installed and should be up-to-date All off campus work has to be done through secure VPN Downloading unauthorized software is prohibited No form of network monitoring should be executed by the employee Any form of junk, harassing, racist mails are is prohibited Access to work areas is restricted to authorized personal Confidential information should not be transmitted outside the company in no form of technology 4. Protection and Safety Measures Below are some of the protection and safety measures that can be implemented All emails have to be auto scanned to detect threats Password have to be changed every three months and their strength needs to be high USB ports should not allow installation of external storage devices Auto data backup should be taken every month Auto lock system after certain time 5. Trouble shooting strategies Retrace the steps to understand what went wrong (Davis, 2012) Check all physical connections Restart the computer Use task manager to shut down programs that dont respond Run virus scanner Search for a solution in the help documentation 6. References Davis, S., Malinowski, T., Davis, E., MacIver, D., Currado, T., Spagnolo, L. (2012). Who ya gonna call? Troubleshooting strategies for e-resources access problems. The Serials Librarian, 62(1-4), 24-32. Liao, Q., Yu, X. (2016). User password repetitive patterns analysis and visualization. Information Computer Security.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.