Justifacation for plans
Throughout my plans for my managment and supporting of systems I have coverd many diffrent aspects of maintianing and managing a system and network. These plans cover a range of diffrent topics and aspects of a computer system that have to be looked at and considerd. One of the first things mentioned on the plan was the network code of practice. This is an important piece in any sort of network or system managment as it sets out a load of rules that are to be followed by everyone on the network such as not trying to gain access around the firewall and accessing ilegal activity. These rules are very important in keeping data and the network secure as we want to be able to limit activity to a low as any dangourous activity could come with consequences as it could cause a virus or potential data breach to happen or for law enforcment to get involved with any ilegal activity caused on our systems.
We also talked about our technical support service which is available for all employees who use our network and systems. In this support services we provide a quick response to all tickets made online using zen desk. We do this to make it simpler for staff and for technical staff to make requests and have them sorted quicker. There is also a SLA which covers more details about what service we provied when a user uses our systems. In this agreement we talk about that our contact and working ours are between 9 am and 5 pm and that all tickets submitted must meet the ticket requirment to be looked at. This helps us sort tickets more effectifly and also keep ticket requests between time constriants.
At cyber soloutions we want to have some contingancy plans and some user support documention for our users in place at all times. In our contingancy plans we plan for a flood, fire, earthquake and data loss. This is the most basic but most likely events that could happen to cyber solutions so we cover theme in detail to what to do in one of these situations. We also have user support documentation to help with giving our users an easy to use platform to diagnose problems them selfs without having to support technical support.
A user on our systems will have the same amount of access avalaible throughout our systems and network as we don't want our users to encounter any problems if having to use another machine on site. We also have a range of backup procedures in place incase of the worst senarios such as an earthquake or flood. These back ups variety between onsite backups to offsite.
Any user that is to use our systems should have explicit permission to access them as without this permision this user would be going against our Security policies, access control and traffic management expectations which would be very bad.
Comments
Post a Comment