Managing Computerised Offices Operating environment 2.10.1.

Slides:



Advertisements
Similar presentations
System Developed By Srijan Software Services, Dehradun Are you associated with Multiple Companies ? Are you facing problems ? Service industry is the largest.
Advertisements

Technology implementation in PO 1. Overview of the training process Objective Method Brief introduction Group discussion Group exercises Syndicate presentations.
.3.1 Technology branch of CO/RO Overview of the functions.
Preparing for Power Outages Like any other part of the infrastructure, electrical power to the campus can fail, either as an isolated incident (e.g., tripped.
Network Detective Prepared For: ABC Corp Prepared By: Roger G. Best.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Investigation in Computerised Environment. Causes for fraud in computerised environment Lack of technical knowledge at supervisory level Improper exercise.
9 - 1 Computer-Based Information Systems Control.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Information System Economics IT MAINTENANCE MANAGEMENT.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Concepts of Database Management Seventh Edition
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
Managing a computerised PO Operating environment 1.
Chapter 8Basic Computer Maintenance  8.1Preventive Maintenance 8.1Preventive Maintenance 8.1Preventive Maintenance  8.2Monitoring System Performance.
Duties of a system administrator. A system administrator's responsibilities typically include:
Installing Virtualisation Software and Virtual Servers.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
November 2009 Network Disaster Recovery October 2014.
Vendor management. What is vendor management? Everything that happens after the vendor starts delivering the equipments and other high value items purchased.
Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
Hands-On Microsoft Windows Server 2008
Topic : Introduction Maintenance and Troubleshooting.
1 QUICK TECH HELP HARDWARE. 2 HARDWARE TROUBLE SHOOTING. S. no. PROBLEMSREMEDY 1Non start of Computer  Check whether Floppy is left in Floppy drive Check.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
New roles in Technology Migration issues – Rule of PO 2.7(b)1.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Operating and maintenance of generator. Operating Generator If it is manually operated generator, whenever power goes off, before starting the generator,
C ONFUSED, F RUSTRATED, C OME OVER AND SEE US AT THE HELP DESK. We can help you with this and much, much more.
Concepts of Database Management Eighth Edition
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
SXe on Windows 2000 Installing Windows 2000 Server, Progress, and SXe.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Module 15 Managing Windows Server® 2008 Backup and Restore.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Chapter 2 Securing Network Server and User Workstations.
FIT03.05 Explain features of network maintenance.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Install, configure and test ICT Networks
When Bad Things Happen to Good Computers Presented by Stephen Skunta & Lindsey Karoly.
Business Continuity Planning for OPEN OPEN Development Conference September 18, 2008 Ravi Rajaram IT Development Manager.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
2.0 PROJECT INITIATION AND PLANNING The initiating and planning are the phase where process or workflow to develop the system will identify and planning.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Career Oriented SAP BASIS training in India,uk,usa Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING.
OST TO PST How to deal with the problem of OST when Outlook gets terminated abruptly ?
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Network Management Chapter 8 Semester 3 By Roger Lewis.
NERC Published Lessons Learned Summary
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
(Hardware & Infrastructure)
Managing the IT Function
IT OPERATIONS Session 7.
6. Application Software Security
Presentation transcript:

Managing Computerised Offices Operating environment

IT framework in PO SUCCESSFUL IT BASED OPERATIONS Application environment System environment Support systems Routine maintenance Troubleshooting Upgrades Hardware mtce Peripheral mtce Network mtce Server management Database management Security Good quality power supply UPS maintenance Generator care

Overview of the tasks Managing the hardware Managing the software Managing the security environment Managing the support systems

Managing the hardware Involves – Continuous availability of hardware and peripherals – Availability to user of the system is ensured for the time required to complete the tasks – Security to the equipments – Disaster management Protection against fire Protection against natural disasters – Suitable layout to aid smooth transaction flow

Availability of hardware and peripherals Routine maintenance of all equipments – Proper cleaning – Minimising unnecessary movement – All equipments are put to use continuously – Spare printers to provide redundancy Numbering the systems and other equipments and keeping the History sheet updated Equipments to be kept covered while not in use Preventive maintenance – AMC to be ensured and terms of contract to be understood – Have contact details displayed at prominent places for immediate contact

User – system ratio Assess the requirement for each user Plan the layout of the systems in office to ensure equitable distribution Ensure availability of system for each user according to need Ensure that no unwanted software (games etc.,) are installed to avoid performance issues

Ensuring physical security Ensure physical security to systems both during working hours and off hours Server to be installed in a room or rack and kept locked. Entry and exit to be logged Rooms to be dust free Rooms to be properly ventilated and free from dampness Layout to ensure easy access while in use and also for troubleshooting

Ensuring protection Ensure systems draw power through UPS Ensure proper earthing Ensure proper insulations where required Fire protection - use materials that can fight electrical fire and show leads for use during emergency Place layout diagram with leads for fire fighting equipments in prominent place and train staff to handle emergency

Support systems - UPS UPS to be installed in a ventilated location inside the office – preferably not inside a room UPS vendor and AMC details to be noted prominently on the equipment for immediate contact Batteries to be numbered, date of supply and expiry to be mentioned thereon for planning replacements Adequate capacity to be ensured and capacity not to be exceeded at any cost

UPS continued Power for electrical fixtures not to be drawn from UPS Test the UPS periodically for committed power supply during power failures Ensure that UPS and batteries are kept dust free and are not housed in damp environment Ensure that UPS is kept charged always Ensure that UPS can protect against surge, spike and over voltage situations

Support system - generators Ensure that the generator meets the environment norms Ensure that the generator is mounted on anti vibrating mountings to prevent damage to structures Ensure that sufficient diesel is available in stock always Ensure that generators are turned on immediately after power outage to prevent data loss due to unexpected shut down Ensure that diesel usage is properly monitored; Maintain a register to watch Procure the wiring diagram and keep in personal custody Perform load test once in three months

Managing software environment Ensure that operating system and SQL server of approved version are installed in the systems Ensure that automatic updates are turned on to keep the OS and SQL Server periodically updated Prevent spurious software from being installed in the operating environment Secure the CDs of operating system and SQL Server and preserve in safe custody personally

Software environment cont’d Ensure that office staff are aware of minimum troubleshooting and do not rely too much on system administrator Have a backup system administrator Have all the staff trained in all applications to ensure continuity of operations in case of turnovers Through continuous monitoring, prevent unauthorised access Ensure that all applications are updated with the latest versions and patches

Security issues Every user including temporary users to have personal user accounts and passwords are changed The user accounts of users who left the office are not deleted but disabled Users do not leave the systems without securing their login; Avoid bartering of user accounts Antivirus protection exists for all systems and are kept updated; Periodic scanning is scheduled

Prerequisites for applications Client/server network running Windows network – Server to have Windows 2003/2008 server OS – Clients to have Windows Vista/7 OS – Network preferably configured as domain and user and password security implemented SQL Server standard edition installed in server, only client tools in clients – Password of sa protected Operating environment protected with continuous power supply and physical security 2.10(a).15

Continuity issues A good backup strategy to secure all application databases Strategy to ensure recovery of at least half an hour past data Fall back plans to be in place to continue operations during failure till restoration Office administrator is aware of restoration process Implement standby server, if provided 2.10(a).16

Upgrades Keep the applications updated How to check current versions ? (watch demo) Protect the current environment before attempting upgrade 2.10(a).17

Preventive vigilance Periodically check the articles booked with data in Point of sale Ensure that users do not work beyond working hours without due authorisation Ensure that administrative tool of SQL Server is not installed in clients Ensure that operators or outsiders do not perform the task of supervisors Ensure that user and password security is strictly implemented in all applications and common user accounts are not used Ensure that office systems are not installed with programming software and are not used for personal uses 2.10(a).18

Action in case of frauds Isolate the server immediately, remove network connection and make immediate report Stop all computer operations using the exiting server and switch over to alternate server until investigation commences If identified, prevent the primary offender from performing any tasks on computer with immediate effect Do not allow any staff to leave the office till investigation commences Search and secure any materials like CDs in the work area Secure all backup media Protect all the reports already printed from unauthorised access and secure current day’s reports 2.10(a).19

Thank you