Managing a computerised PO Operating environment 1.

Slides:



Advertisements
Similar presentations
System Developed By Srijan Software Services, Dehradun Are you associated with Multiple Companies ? Are you facing problems ? Service industry is the largest.
Advertisements

General Safety Overview and Information
Technology implementation in PO 1. Overview of the training process Objective Method Brief introduction Group discussion Group exercises Syndicate presentations.
.3.1 Technology branch of CO/RO Overview of the functions.
Preparing for Power Outages Like any other part of the infrastructure, electrical power to the campus can fail, either as an isolated incident (e.g., tripped.
Powerpoint Templates Page 1 Powerpoint Templates Page 2 Something you own that has value There can be assets that gain value over time…. What is an Asset?
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Investigation in Computerised Environment. Causes for fraud in computerised environment Lack of technical knowledge at supervisory level Improper exercise.
9 - 1 Computer-Based Information Systems Control.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Information System Economics IT MAINTENANCE MANAGEMENT.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Policy & Procedure IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Concepts of Database Management Seventh Edition
This teaching material has been made freely available by the KEMRI-Wellcome Trust (Kilifi, Kenya). You can freely download, adapt, and distribute this.
Factors to be taken into account when designing ICT Security Policies
AMC and vendor Management. Why the need? Multiple vendor scenario. No single agency – Items under warranty (eg TVS printers, HCL nodes, HP servers, numeric.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Initial Findings  Secure all contracts with third party vendors immediately  Develop a strong understanding of the ‘Flow of PHI’ within and outside of.
Chapter 8Basic Computer Maintenance  8.1Preventive Maintenance 8.1Preventive Maintenance 8.1Preventive Maintenance  8.2Monitoring System Performance.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Vendor management. What is vendor management? Everything that happens after the vendor starts delivering the equipments and other high value items purchased.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
2008© COPYRIGHT 1 1 ATHN DATA SUMMIT DISASTER PREPAREDNESS JULY 31, 2008 PANEL MEMBER - JOY MAHURIN COMPREHENSIVE BLEEDING DISORDERS CENTER CONTINUITY.
General Purpose Packages
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
1 QUICK TECH HELP HARDWARE. 2 HARDWARE TROUBLE SHOOTING. S. no. PROBLEMSREMEDY 1Non start of Computer  Check whether Floppy is left in Floppy drive Check.
Managing Computerised Offices Operating environment
New roles in Technology Migration issues – Rule of PO 2.7(b)1.
Concepts of Database Management Sixth Edition
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Security and backups GCSE ICT.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Operating and maintenance of generator. Operating Generator If it is manually operated generator, whenever power goes off, before starting the generator,
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
Concepts of Database Management Eighth Edition
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
BSBCMN205A Use Business Technology Session 6 1 Maintain Technology.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
NETWORK ADMINISTRATOR. EXAMPLES OF SOME COMPUTING RELATED CAREERS Multimedia Artist / Graphics Artist Information System Manager Computer Scientist Network.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
FIT03.05 Explain features of network maintenance.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
When Bad Things Happen to Good Computers Presented by Stephen Skunta & Lindsey Karoly.
Business Continuity Planning for OPEN OPEN Development Conference September 18, 2008 Ravi Rajaram IT Development Manager.
2.0 PROJECT INITIATION AND PLANNING The initiating and planning are the phase where process or workflow to develop the system will identify and planning.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
1 Determining a client’s peripheral requirements  Determine current business practices  Determine peripheral requirements  Analyse and document existing.
UN Cares Webinar on Access to HIV PEP Kits in the United Nations System.
Network Management Chapter 8 Semester 3 By Roger Lewis.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
(Hardware & Infrastructure)
Managing the IT Function
Security of People, Property and Information
12 STEPS TO A GDPR AWARE NETWORK
IT OPERATIONS Session 7.
The computer laboratory
Presentation transcript:

Managing a computerised PO Operating environment 1

IT framework in PO SUCCESSFUL IT BASED OPERATIONS Application environment System environment Support systems Routine maintenance Troubleshooting Upgrades Hardware mtce Peripheral mtce Network mtce Server management Database management Security Good quality power supply UPS maintenance Generator care 2

Overview of the tasks Managing the hardware Managing the software Managing the security environment Managing the support systems 3

Managing the hardware Involves – Continuous availability of hardware and peripherals – Availability to user of the system is ensured for the time required to complete the tasks – Security to the equipments – Disaster management Protection against fire Protection against natural disasters – Suitable layout to aid smooth transaction flow 4

Availability of hardware and peripherals Routine maintenance of all equipments – Proper cleaning – Minimising unnecessary movement – All equipments are put to use continuously – Spare printers to provide redundancy Numbering the systems and other equipments and keeping the History sheet updated Equipments to be kept covered while not in use Preventive maintenance – AMC to be ensured and terms of contract to be understood – Have contact details displayed at prominent places for immediate contact 5

User – system ratio Assess the requirement for each user Plan the layout of the systems in office to ensure equitable distribution Ensure availability of system for each user according to need Ensure that no unwanted software (games etc.,) are installed to avoid misuse 6

Ensuring physical security Ensure physical security to systems both during working hours and off hours Server to be installed in a room or rack and kept locked. Entry and exit to be logged Rooms to be dust free Rooms to be properly ventilated and free from dampness Layout to ensure easy access while in use and also for troubleshooting 7

Ensuring protection Ensure systems draw power through UPS Ensure proper earthing Ensure proper insulations where required Fire protection - use materials that can fight electrical fire and show leads for use during emergency Place layout diagram with leads for fire fighting equipments in prominent place and train staff to handle emergency 8

Support systems - UPS UPS to be installed in a ventilated location inside the office – preferably not inside a room UPS vendor and AMC details to be noted prominently on the equipment for immediate contact Batteries to be numbered, date of supply and expiry to be mentioned thereon for planning replacements Adequate capacity to be ensured and capacity not to be exceeded at any cost 9

UPS continued Power for electrical fixtures not to be drawn from UPS Test the UPS periodically for committed power supply during power failures Ensure that UPS and batteries are kept dust free and are not housed in damp environment Ensure that UPS is kept charged always Ensure that UPS can protect against surge, spike and over voltage situations 10

Support system - generators Ensure that the generator meets the environment conditions Ensure that the generator is mounted on anti vibrating mountings to prevent damage to structures Ensure that sufficient diesel is available in stock always Ensure that generators are turned on immediately after power outage to prevent data loss due to unexpected shut down Ensure that diesel usage is properly monitored; Maintain a register to watch Procure the wiring diagram and keep in personal custody Perform load test once in three months 11

Managing software environment Ensure that operating system and SQL server of approved version are installed in the systems Ensure that automatic updates are turned on to keep the OS and SQL Server periodically updated Prevent spurious software from being installed in the operating environment Secure the CDs of operating system and SQL Server and preserve in safe custody personally 12

Software environment cont’d Ensure that office staff are aware of minimum troubleshooting and do not rely too much on system administrator Have a backup system administrator Have all the staff trained in all applications to ensure continuity of operations in case of turnovers Through continuous monitoring, prevent unauthorised access Ensure that all applications are updated with the latest versions and patches 13

Security issues Every user including temporary users to have personal user accounts and passwords are changed The user accounts of users who left the office are not deleted but disabled Users do not leave the systems without securing their login; Avoid bartering of user accounts Antivirus protection exists for all systems and are kept updated; Periodic scanning is scheduled 14