Security and Support in IT
Security and Support in IT8
Security and Support in IT
Yes, I would implement a system which is fully automatic for OS and applications updating or installation. It is because, automation increases the speed, efficiency and easiness of performance processes of the desktops and also mistakes resulting from manual installation process are reduced or completely avoided (Charles 2003).Customers are also happy since less time is taken to debug their mistakes. Workstations of desktops are durable and are deployed in massive quantities. Making a change to all the desktops becomes complicated due to its criticality. Complete automation of installation enables new hosts to start out identically to one another before their degradation starts.
Automatic installation is also error-free, unlike manual installation which is prone to errors since the mistakes done during automatic installation makes the host begin life in the cycle of decay with the head start (Charles 2003).The automatic installation makes it easy to carry out reinstallation eventually retiring machines; machines cannot last forever since there are various tasks which are associated with device retirement. Automatic reinstallation, therefore, facilitates forward carriage of some applications and data to replacement tools. Applications and data can also be stored for later reference on tapes to avoid losing them. I would, therefore, implement full automation in installation and be updating for applications and operating system due to the above reasons.
Data backup is one technology that can be used on servers to improve computers’ reliability, performance, and availability. Servers have unique configurations and critical data hence backing up of these data, and settings are necessary. Data backup gives clients assurance that their data and configurations are available, reliable and secure in case their disks fail (Charles 2003). This is because the drive of the customer fails; automatic installation procedure can be used to recreate the data and configuration lost. Data backup uses roaming profiles to store the settings of the user in the server whenever they sign out although they cannot protect software installed locally and machine’s registry settings.
Icing also helps in going further in server’s serviceability and reliability. Icing involves a variety of technologies such as the use of server appliances, power supplies which are redundant, n+1 and full redundancy, hot-swap components, administrative functions’ separate networks. Designation of server machine is not easy since it brings together into one box experience’s years (Charles 2003). Server appliances software involves assemblage of various packages, gluing the packages together and provision of a unified single administration system. The power supply is the most system’s component which is prone to failure hence redundancy in the power supply helps in improving the serviceability and the reliability of the server. Redundancy in power supply implies that, if there s malfunction of a power supply, your system can still be operational. In other cases it refers to having three sources of power (Charles 2003).
Redundancy in power supply is a technology which requires possession of a separate cord of power of each supply of power so as to ensure operational speaking, to permit tricks and to enable drawing of power by each supply of power from different sources. N+1 redundancy is a technology that makes it possible for one machine to work even when one component of the system has failed (Charles 2003). Full redundancy occurs when hardware’s two sets which are complete are first set up and configuration which is kind of some “failover” is done. Icing technology also helps to hot-swamp the redundant components. By hot-swamping, we mean the ability to remove and replacing an element in a running system. This technology enables new components to be installed in a running system since it is not a must to reboot a schedule to install a new part to the system. Icing technology also applies administrative functions’ separate networks. Additional servers’ network interfaces permit the user to establish administrative networks that are independent (Charles 2003).
Helpdesk operations are known for their great importance of providing a single contact’s point for the users so as to deliver services to customers and confirm that the various services provided to customers meet the expectations of the users by providing solutions, actions, response and feedback. Helpdesk coordinator provides email and telephone support to computer users only by the act of logging in, each and every service request. He or she can also provide support by assigning the customers’ requests to a computer specialist. The computer specialist, in this case, will undertake the required task or in some circumstances assign it to any other appropriate personnel (Schwartz 2014).
It is the role of the helpdesk coordinator to notify each customer through an email assignment information or requested number. Helpdesk requests are divided into six priority levels that are emergency, immediate, high, moderate, request and suggestion. Under emergency priority level, there are at least two people who are down or who are in danger (Charles 2003). Under immediate priority level, only one person is down or the one person is in the danger of down going. Requests for high priority levels have to be, as a mandatory, considered first so as to avoid problems. Requests under moderate priority level do not lead to development of harm even if they are not done but indeed they need to be also done. All applications are not considered equal but they should be escalated immediately if possible. Suggestions are addressed according to permission of time and they are not considered equal. It is a must that all the requests go through coordinator’s help desk (Schwartz 2014).
Use a university server which is able to receive and send from and to the new students, Kim included. Allow access to Kim only and use a simple password mechanism since this is a small project. Since you can’t sent the password from the university server to Kim on a plain HTTP since anyone with installed tcpdump/wire shark can read it, u should use the mechanism whose procedures are as follows: set up HTTP server as an HTTPS server since the server has a password database (Charles 2003). If Kim opens the connection, the server will be authenticated. After the master key I exchanged, encryption of the connection is important. Kim then sends his password clearly to the university server. The university server then runs password encryption and compares it with the old password stored in its database.
Compress each student’s academic transcript into files. Compress the files into an encrypted or a password-protected file (Charles 2003).The files should be zip archived before being emailed to the students. Advice the students to have an AES supporting zip program since this file carrying with it any program can not open the students’ academic transcripts. Then, email the academic transcripts inform of files to the students.
Verify my announcements by listing explicitly the factual information of the university. Involve different university identities so that every viewer can believe the information contained in your site. Download and print all my planned pages so that I can use them in the post to improve the accuracy and completeness of my bibliography.
Charles, P.P. & Shari, L.P., 2003. Security in computing. www.books.google.com/books?security-in-computng retrieved on 21st September, 2106
Schwartz, E.S., 2014. Research and market: global desktop outsourcing market research report. Yahoo finance. Business wire. Retrieved on 30th October, 2014.