100% found this document useful (1 vote)
310 views

Provide Network System Administration Last Edited

The document provides information about network system administration including providing client access and security, providing input into and disseminating disaster recovery plans, monitoring network performance, and migrating to new technology. It defines key terms, describes security administrator roles and responsibilities, discusses maintaining privileged access and system integrity, and provides checklists for access control and disaster recovery planning.

Uploaded by

senderajemal30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
310 views

Provide Network System Administration Last Edited

The document provides information about network system administration including providing client access and security, providing input into and disseminating disaster recovery plans, monitoring network performance, and migrating to new technology. It defines key terms, describes security administrator roles and responsibilities, discusses maintaining privileged access and system integrity, and provides checklists for access control and disaster recovery planning.

Uploaded by

senderajemal30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

ROYAL COLLEGE

INFORMATION SHEET FOR HARDWARE AND NETWORKING SERVICE

UC:-Providing Network System Administration

LG Code:- EIS HNS4 01 1221(1-4)


TTLM Code: EISHNS4TTLM011221v4
LEARNINGOUTCOMES:-

LO1: Provide client access and security


LO2: Provide input into and disseminate disaster recovery plan
LO3. Monitor network performance
Lo4. Migrate to new technology

Prepared by Sendera. J Page1


LO1.Provideclient access and security
Overview of Network System Administration
Administrators and Administration
Before considering your current system administration practices, it’s important to
clarify the terms administrator and administration.
A system administrator is the person or process responsible for carrying out functions
which support the deployment or operation of a system. This could mean an individual
whose job title is 'database administrator.' Alternatively, it could be a system account
that is responsible for running a scheduled task periodically. The commonality here is
that they carry out functions that a normal user would not. To do this, they have a higher
level of permissions on the system.
System administration refers to the acts carried out by administrators. Again, this has
a wide definition and could include:
o Using SSH(Secure Shell Protocol) to access a web server to update a file

o Adding a new user to a domain

o Configuring an alarm on
The commonality here is that all of these functions could be used for malicious
purposes and so they need to be appropriately protected.

Maintaining your management systems


Administrators don't have to be members of your staff. It's common for system
administration to be carried out by a third party supplier. So, this guidance will applyto
anyone who has access to your administration interfaces. You will also need to
consider how you maintain any management system that you put in place. At some
point, someone, somewhere will have absolute control over your system. It's important
that you have considered this and put an appropriate process in place for this access.
What is security in system administration?

Security administrators are employees who test, protect, and ensure the hardware,
software, and the data within the computer networks, is secure. A security
administrator is the lead point person for the cyber security team. They are typically
responsible for the entire system and ensure that it is defended as a whole.

Prepared by Sendera. J Page2


Providing appropriate privilege for accounts and files
What is privileged access and what are some examples of privileged accounts?
A privileged account is a login credential to a server, firewall, or another administrative
account. Often, privileged accounts are referred to as admin accounts.
Your Local Windows Admin accounts and Domain Admin accounts are examples of
admin accounts. A privileged account is allowed to do more things (i.e. it has more
privileges) than a normal account. Privileged accounts are doorways to an organization’s
“kingdom” the place where sensitive information is stored and as such, they need to be
very secure. Examples of sensitive information include medical records, credit card
details, social security numbers, government files, and more.
Types of Privileged Accounts
While most non-IT users should, as a best practice, only have standard user account
access, some IT employees may possess multiple accounts, logging in as a standard user
to perform routine tasks, while logging into a super user account to perform
administrative activities. Because administrative accounts possess more privileges, and
thus, pose a heightened risk if misused or abused compared to standard user accounts, a
PAM best practice is to only use these administrator accounts when absolutely necessary,
and for theshortest time needed.

Examples of privileged accounts typically in an organization:

 Local administrative accounts: Non-personal accounts providing


Administrative access to the local host or instance only.
 Domain administrative accounts: Privileged administrative access across all
workstations and servers within the domain.
 Break glass(also called emergency or fire call)accounts: Unprivileged users
With administrative access to secure systems in the case of an emergency.
 Service account: Privileged local or domain accounts that are used by an application
or service to interact with the operating system.
 Active Directory or domain service accounts: Enable password changes to accounts,
etc.
 Application accounts: Used by applications to access databases, run batch jobs or
scripts, or provide access to other applications.

Prepared by Sendera. J Page3


What are Privileged Credentials?

Privileged credentials (also called privileged passwords) are a subset of credentials that
provide elevated access and permissions across accounts, applications, and systems.
Privileged passwords can be associated with human, application, service accounts, and
more. SSH keys are one type of privileged credential used across enterprises to access
servers and open pathways to highly sensitive assets.
Maintaining System integrity and security
How to Maintain Access Control System Integrity
Building access control systems are used within organizations to secure access and
protect the people and assets within the areas under their control. System integrity is
paramount to the safe and successful operation of an access control solution. System
integrity can weaken over time due to a wide range of issues. Some of these are
hardware related and some due to management of the software database at the heart of
the cloud-based access control solution.
Access Control Points
The most common access entry or exit point is a doorway. On one side of the doorway
will be some form of credential reader or security keypad and on the other, similar or a
request to exit (RTE) button. A reader can be a card reader, card reader keypad,
Bluetooth low energy mobile phone or biometric reader. The reader will collect the new
credential presented and verify this with the user/credential recording the software
database .If approved, an instruction is sent to the door controller over an IP network or e
lease the doorway which is generally restricted using magnetic locks (maglocks).

 Access Control Hardware and System Access control systems comprise of a


number of components.

 Access Control Software Data Maintenance The software and database running
your access control solution is not immune to operational issues, if there are not
strong policies and management systems in place.

Tailgating This is a common problem with access control solutions. Companies and
organizations should have policies and training in place to prevent the chance of tailgating.
This occurs when a person (one or more) follows an individual whose credential has been
approved for entry. Simply holding open a door can let an ‘unapproved’ visitor into an
access-controlled area. When individuals do not follow procedure and have their individual
credentials checked by are reader for entry (or exit), movement and occupancy logs data
can also be in accurate. Evidence of this can sometimes be picked up on Who, Where and
When reports and simply analyzing the historical event and alarm logs.
Prepared by Sendera. J Page4
Access Control Management Checklist
Maintenance contracts are typically annual and will include one or more onsite
preventative maintenance visits. A typical visit should start with a discussion with the
system owner on how the systems have performed, changes made since the last
inspection and any known fault or operational issues.

 Site and system walk around including a visual inspection of all components
 Hardware inspection and operational testing
 Battery checks
 Components cleaning to remove dust
 Full system performance tests
 Individual doorway controller and reader inspections and tests
 Software database and logs inspection
 Camera system review and System review
Regular access control system maintenance is important to maintain the overall integrity
of a system. Preventative maintenance helps to identify consumables that require
replacement, in addition to components that suffering from ‘wear and tear’ usage. Their
timely replacement can not only prevent a system breakdown or malfunction but help to
ensure an extended working life for the overall system. Software database maintenance is
also important as this can ensure that only authorized users are active and with the correct
access rights for their role within the organization.

LO2.Provide input in to and disseminate disaster recovery plan


Providing input to organization’s disaster recovery plan

A disaster-recovery plan looks at what disasters could hit the company and lays out a
plan for responding to those disasters. Disaster-recovery planning includes
implementing ways to mitigate potential disasters and making preparations to enable
quick restoration of key services. The plan identifies what those key services are and
specifies how quickly they need to be restored. All sites need to do some level of
disaster-recovery (DR) planning. DR planners must consider what happens if
something catastrophic occurs at anyone of their organization’s sites and how they can
recover from it. We concentrate on the electronic data aspects of DR. However, this
part of the plan should be built as part of a larger program in order to meet the
company’s legal and financial obligations.

Prepared by Sendera. J Page5


Definition of a Disaster
A disaster is a catastrophic event that causes a massive outage affecting an entire
building or site. A disaster can be anything from a natural disaster, such as an
earthquake, to the more common problem of stray backhoes cutting your cables by
accident. A disaster is anything that has a significant impact on your company’s ability
to do business.
Performing regular backup and restore based on disaster recovery policy
What could be included in backup and disaster recovery policy?
A disaster recovery policy must include a detailed communication plan, with a list of
contacts of people who need to be notified about the disaster. The plan should include
precise information protocols what information to convey, over what channel and in what
format, to save time and reduce confusion during a crisis.
What is a disaster recovery for a server room?
Server disaster recovery is a form of disaster planning that defines the procedures for
recovering a server after an unplanned outage. This planning can include measures to
prevent server failure, as well as systems for recovery, such as restoring a data backup.
Three major types of disaster recovery sites can be used: cold, warm, and hot sites.
Understanding the differences among these three can help SMBs, working in
cooperation with an expert IT consultant, to select the one that best suits company
needs and mission-critical business operations.

Components of an Effective Disaster Recovery Plan

 Complete Inventory of Hardware/Software/Other Equipment


 Documented Business Objectives
 Defined Tolerance for Downtime and Data Loss
 Alternative Workspaces
 Remote Access
 Secure Backups
 A Comprehensive Testing Strategy

Data Backup
How will you backup data for disaster recovery?

Prepared by Sendera. J Page6


Backup and disaster recovery involves periodically creating or updating one more
copies of files, storing them in one or more remote locations ,and using the copies to
continue or resume business operations in the event of data loss due to file damage, data
corruption, cyber attack or natural disaster. Businesses generate large amounts of data
and data files are changing throughout the work day .Data can be lost, corrupted,
compromised or stolen through hardware failure, human error, hacking and malware.
Loss or corruption of data could result in significant business disruption. Data backup
and recovery should be an integral part of the business continuity plan and information
technology disaster recovery plan.

Developing a data backup strategy begins with identifying what data to backup, selecting
and implementing hardware and software backup procedures, scheduling and conducting
backups and periodically validating that data has been accurately backed up.

Developing the Data Backup Plan Identify data on network servers, desktop computers,
laptop computers and wireless devices that needs to be backed up along with other hard
copy records and information. The plan should include regularly scheduled backups from
wireless devices, laptop computers and desktop computers to a network server. Data on the
server can then be backed up. Backing up hard copy vital records can be accomplished by
scanning paper records into digital formats and allowing them to be backed up along with
other digital data.

Options for Data Backup Tapes, cartridges and large capacity USB drives with integrated
data backup software are effective means for businesses to backup data. The frequency of
backups, security of the backups and secure off-site storage should be addressed in the
plan. Backups should be stored with the same level of security as the original data. Many
vendors offer online data backup services including storage in the “cloud”. This is a cost-
effective solution for businesses with an internet connection. Software installed on the
client server or computer is automatically backed up. Data should be backed up as
frequently as necessary to ensure that, if data is lost, it is not unacceptable to the business.
The business impact analysis should evaluate the potential for lost data and define the
“recovery point objective.” Data restoration times should be confirmed and compared with
the IT and business function recovery time objectives.

Prepared by Sendera. J Page7


LO3. Monitor network performance

3.1 Performing diagnostic test to monitor network


Quickly diagnose and troubleshoot network fault, availability, and performance issues
Reduce network downtime
Network downtime can be caused by a variety of different issues. Without the right
network diagnostic tools, it can be like searching for a needle in a haystack. Solar Winds
network monitoring software is a network diagnostic tool designed to continuously
conduct latency tests and monitors fault, availability, and performance of network devices.
Quickly resolve network connectivity issues
Troubleshooting becomes a time-consuming endeavor without quick insights into network
latency and connectivity. Solar Winds Network Performance Monitor (NPM) is a network
diagnostic tool built to automatically track and display current and historical performance
metrics through customizable charts and dashboards. This intuitive, visual data aggregation
provides the in-depth insights you need to stay apprised of ongoing performance issues,
even in the most complex environments. Whether the problem is caused by flapping routes,
interface downtime, or hardware health, Network Performance Monitor can help you
quickly identify and resolve your issues.
Accelerate time-to-resolution
When it comes to solving a performance issue, the first thing you have to do is get to the
source. Solar Winds Network Performance Monitor uses software packet analysis and
capture to help you determine whether the problem lies in the application or the network.
Knowing which path to take will help you quickly pinpoint the root cause of the issue,
identifying the location and cause of bottlenecks. Through cross-stack network data
correlation, you can expedite the process even further by dragging and dropping network
performance metrics on a common timeline. This type of network performance diagnostics
provides immediate visual correlation across all your network data, accelerating the time-
to-resolution and helping ensure a positive end-user experience.
Diagnose network issues and optimize performance
Network analysis is an essential part of any IT team’s strategy. Solar Winds network
diagnostic tool doesn’t just give you performance data, it helps you dig into these analytics
to quickly identify and resolve network performance issues.
Network analysis can show you the leading causes of network problems, such as slow
speeds, network connection problems, and packet loss center on overloaded network
devices, such as switches and routers, or missing information in your routing table and
other system databases, such as the DNS server or the DHCP system.

Prepared by Sendera. J Page8


3.2. Monitoring software and files
Software monitors utilize a collection of code fragments embedded in the operating
system, or applications program, to gather performance data. The monitoring software
must be kept to a minimum in order that its impact on the running system being measured
is minimal.
File Activity Monitoring discovers the sensitive data on your servers; classifies content
using pre-defined or user defined definitions; configures rules and policies about data
access, and actions to be taken when rules are met.
3.3 Monitoring performance indicators
What are key performance indicators in networking?
Key Performance Indicators (KPIs) are used measure, track and report how the
organization is performing in relation to its objectives. They can be used both for post-hoc
analysis and reporting and for setting goals for the organization. It is important to design
relevant and well-understood KPIs.
What is network performance analysis?
Network Performance is "the analysis and review of collective network statistics, to define
the quality of services offered by the underlying computer network that is primarily
measured from an end-user perspective."
Parameters Used to Measure Network Performance
 Bandwidth.
 Throughput.
 Latency.
 Packet Loss.
 Jitter.

Lo4. Migrate to new technology

Terms and Terminologies Migration of technologies:


 TECHNOLOGY: is the use of human invention and discoveries to satisfy
their needs and desires.
 TECHNOLOGY SKILL: ones’ ability in operating ICT equipments and
software; Such as storage and communication devices.
 APPLICATIONS: can be commercial software applications; organization-
specific software
 ENVIRONMENTAL CONSIDERATIONS: recycling, safe disposal of
Prepared by Sendera. J Page9
packaging (e.g. cardboard, paper, plastic) and correct disposal of redundant
hardware (e.g. motherboards, hard drives, circuit boards) by an authorized
body.
 SOFTWARE: can be user-based software for new business processes, customer
relationship management, integrated services (e.g. banking and financial services)

Migration in the information technologies is the process of moving from the use of
one operating environment to another operating environment, that’s most cases is
thought to be a better one. the migration is using the old technologies upgraded into
new technologies (oldest version into newest version of technologies). Example
Office 2003 to 20007, 2020, 2013, 2016, 2019 and etc..,
Windows XP to windows 7, 8, 10 and etc…
Windows server 2003 to windows server 2008,
2012 and above… Migration can be migrate to new
 Hardware

 Software and

 Both hardware and software

Migrations steps
 Phase1:- Discovery is reviewing where you are and where you are going.
 Phase2:- Design is build your image, application and deployment process of present
technology.
 Phase3:-Test Insure hardware and software compatibility and validate deployment
phase duress.
 Phase4:- Deploy (organize) look for automation options to keep cost down.
 Phase5:- project closers (conclusion) optimize environment and document standard
operating procedures and solve problems (Evaluate the performances )

Prepared by Sendera. J Page10


Technology and Business

Unless businesses make use of the advantages of the new technology, they will
find that they can’t compete with businesses that do. Consider the changes to our
lives that have been brought about by such things as telephone banking, the
Internet, e-business, email and so on, and the competitive advantages such
changes have given the organizations that implement them. Organizations need
to be constantly aware of current or emerging technology trends and directions
in information technology (IT). IT will continue to evolve and produce more and
more new technology. Your objective is to not only apply new technology. It is
to solve the organization’s problems, but to employ it in the most cost efficient
and appropriate manner.
To ensure that IT is totally aligned with business objectives, IT professional need to:
 Provide business-focused leadership rather than technology-focused

leadership. The IT leadership must be connected to business


management.
Note: - Leadership is an ability to influence a group toward the achievement of
vision or set of goal.
 Is maximizing effort than followers and influence behaviors and attitude of
others.
 Is a process of influence among leader and followers who intend the mutual?
 Leader doesn’t tell rather than show.

 Think about the impact of tasks on business as a whole rather than provide
solutions for individual tasks.
 Concentrate more on end-user experience with new technologies rather than the
technology itself.
 Focus on the business goals and let the technology follow.
New Technology and Your Business
New technology is used to enhance service, promote innovation, and improve
communication and quality while reducing the costs, and increase productivity and
profits. The appropriate business use of new technology should result in benefits

Prepared by Sendera. J Page11


such as:
 reduced costs

 improved quality of existing services

 existing resources being utilized to optimum capacity resulting in better

products and better ways of conducting business


 increased flexibility

Identifying appropriate new technologies


Suppose you came across a new technology that most IT assistants are excited
about. How would you evaluate whether you need to implement this technology in
your organization? Remember that technology should be identified based on an
organizational need and comply with the technical, commercial and economic
criteria of the organization. Here are some approaches you can use when selecting a
new technology for the benefit of the organization.
 Get together with a team of IT professionals- put your heads together to
identify a suitable new technology that will help achieve your business
goals.
 Horizon scanning - talk to your circle of friends or other IT professionals.
 Collective scanning - attends meetings of IT professionals such as the
Systems Administrator’s Guild/union to discuss their findings.

Evaluating and selecting new technology


Usually there is a gap between what new technology promises and what it actually
delivers. This gap will be narrowed if you align the new technology with current
business needs and IT strategy of the organization. Reducing this gap will result in
maximizing benefits of the new technology.
How do you evaluate whether the new technology is successfully aligned with the
business requirements? There are several tangible (eg cost savings) and intangible

Prepared by Sendera. J Page12


(eg user satisfaction) benefits of implementing new technologies. You can use
assessment tools such as an evaluation matrix to compare two or more competing
products. An example is given in Table 1 below.
Table 1: An evaluation matrix
Business need and/or performance criteria Product X Product Y
Economic factors
Capital required, fixed costs, variable costs, impact on
profits, etc.
Product/service efficiency
Does the new technology provide the service or
production more efficiently than the existing
system?

Interoperability, backward compatibility Is the new


technology able to interoperate with the existing
network/system?
Maintainability by existing personnel/training
needs/ease of use
Effect on quality of service or product
Quality
Effect on flexibility of service or flexibility of production

Effect on labor/client relations How does the new


technology affect workers and worker-management
relationships? Does it improve the client relationship with
the organization?
Time required for implementation
Scalability
Can the new technology cope with growth of the
organization?
Use a rating scale such as: 1 = poor, 2 = below average, 3 = average, 4 = good, 5 =
excellent, to compare alternative technologies.

Prepared by Sendera. J Page13


Testing proposed solutions
When processes that are linked to an organizational problem have been identified,
you will need to construct tests to measure outcomes. The simplest form of testing
is to note the presence or absence of an outcome. However, tests for enhanced
productivity and efficiency require examining pre- and post- implementation effects
of new technology. Statistics collected before the application of new technology
can be compared with those collected after. Problems arising from customer
dissatisfaction can be hard to measure directly, unless you conduct a survey.
However, there could be a cause to reduced levels of customer satisfaction, such as
late delivery of goods or slow processing of claims. In the case of goods delivery,
you could measure the time taken to receive an order and dispatch it, before and
after implementation of the new technology. Some IT technologies, when
implemented, become an integral part of the business. Then the profit brought in by
the new technology will justify the implementation.
Case study: Testing a new technology solution
Employment Services Ethiopia (ESE) is a non-profit organization providing
employment assistance to long-term unemployed people in Ethiopia. Each branch
maintains its own database of employers and a current list of job vacancies with
those employers. When an unemployed person registers with the organization, an
officer will manually collect information regarding skills, abilities and work history
of the client. At the end of the day, the officer tries to find job matches for the day’s
clients (and any other registered clients outstanding) by manually searching through
the employer database. When a job is found, the officer rings the client and
organizes necessary paper work for the job interview.

As the IT assistant, you have suggested that this process be automated to increase

Prepared by Sendera. J Page14


the efficiency of the service. You have conducted an evaluation and selected the
best method of automating the process of matching client characteristics to the jobs
available on the database. In order to test the automated system, you decided to
have both manual and automated systems running parallel for a period of two
weeks. During this time some clients were served using the automated system and
the others were served using the manual system. At the end the two weeks, you
calculate the average time it has taken to match clients to a job since the first
meeting with them. You will use these figures to get an understanding of the quality
of service and efficiency improvements of the automated system.
Planning implementation
The introduction of new technology requires careful planning in order for a smooth
transition to occur. Implementing the technology without planning is bound to
result in problems and frustrations. The objective here is to minimize any disruption
to the day-to-day running of the organization. Sound project management skills are
required in implementing new technology. In producing an implementation plan,
the following should be considered:

1. Timing :- Timing is an important consideration if the implementation is to go smoothly.


The adoption of new technology can place an additional burden on staff having to deal
with disruption to their normal workflow. Most departments have peak periods of
activity that should be avoided. For example, an accounting department’s busiest time is
the end of the financial year; therefore this period is definitely not suitable for any
implementation of new technology.
2. Tasks :- What are the things that have to get done to implement the new technology?
The implementation plan should clearly identify these tasks and schedule them in an
appropriate sequence. Installing a network, for example, will have a different set of
tasks from installing a new software system.

Prepared by Sendera. J Page15


Table 2 shows the tasks required to install new PCs for a group of users.

Task Description
1 Back up files on existing computers
2 Remove existing computers
3 Install new computers
4 Test new computers
5 Restore files to new computers
Identifying the tasks and their sequence beforehand should ensure that the
implementation goes smoothly. This is a very simple example, but can you
imagine what would happen if Task 2 was performed without performing
Task 1?

3. Resources: - Having identified the tasks, the next step is to allocate people and
resources to them. To minimize confusion, people need to know exactly what they are
supposed to do. Obtaining resources may involve negotiating with the people involved
or their superiors as they may have other commitments.
Table 3 provides an example of resources required for installing new PCs.
Task Description Human resource Resource (tools)
1 Back up files on existing Melkesa Chala Portable HDD and backup software
computers
2 Remove existing computers Toltu Tola Trolley, packaging tools and inventory
forms
3 Install new computers Sanyi Yani Trolley and inventory forms
4 Test new computers Hayat Bona Testing software and checklist
5 Restore files to new Firom Yani Portable HDD and backup software
computers

Prepared by Sendera. J Page16


4. Schedule :- After assigning resources to each task, the next step is to determine how
long each task will take to complete. Work out the start and finish date of each task.
Then communicate this to those involved so that they know exactly when particular
tasks are to be done. Table 3 below shows the start and finish dates for each task so that
staffs know when the tasks are to be completed. This means that your plan should
provide a picture of:
o what is to be done, who is to do it and When it is to be completed.

Table 4: Task duration

Ta Description Resource Start Finish Date


sk Date
1 Back up files on existing Usman 1st Sept 1st Sept
computers Hassan
2 Remove existing Toltu 2nd 3rd Sept
computers Tola Sept
3 Install new computers Firew 4th 9th Sept
Yani Sept
4 Test new computers Haymanot 10th 14th Sept
Timsel Sept
5 Restore files to new Firew 15th 15th Sept
computers Yani Sept

5. Milestone :- Milestones are established points in the project used to determine whether
or not the project will meet the anticipated schedule. These are usually major events in
the course of the project such as ‘installing new computers’ or ‘software purchased’. It
is important to establish milestones in your implementation plan and monitor the
progress of the implementation on an ongoing basis. You can also gather project
progress reports from implementation team members.
6. Organizational issues :- Any impact on the day-to-day running of the business needs to be
identified and planned for. For example the installation may require that the network
not be operational for a period of time. Therefore it should be scheduled for a time
when it will have as minimal an impact as possible, for example, after hours.
Prepared by Sendera. J Page17
Sometimes it is difficult to identify downtime when no one would be affected. In all
cases, users who will be affected need to have sufficient warning in terms of days not
hours.
Managing the implementation
Technology and its use need to be managed if it is to be used effectively.
Management of technology includes tasks such as:
 overcoming resistance to technology
 ensuring that users are competent in using the technology
 monitoring the efficient use of the technology
 monitoring the performance of the technology

Evaluating the new technology


Evaluation needs to be conducted after the migration into the new technology to
assess the project’s success or failure. In this process, you must use the project
success indicators to compare against the actual benefits and returns. During
evaluation, data is collected, recorded and analyzed to identify the benefits of the
new technology.
Evaluation is conducted after implementation of new technology to:
1. Identify any issues relating to the relevance, effectiveness and efficiency of the
hardware and software systems installed.
2. Identify changes that are necessary to address any pressing issues.
3. Ensure that the organizational process used for migrating to new technology are
acceptable to stakeholders and identify any changes that are necessary
4. Verify whether the system the system has delivered what was expected so as to
benefit future projects.
5. Monitor long-term use of the system.

Prepared by Sendera. J Page18


The process of evaluation
There are three steps in the evaluation process:
1. Collect record and analyze feedback to track progress against the targets.

Explain success and failures with respect to the performance indicators.


Identify unintended positive or negative effects.
2. Decide on necessary adjustments to the system to increase its usability and
performance.
3. Establish any lessons that could be learnt from this project so future

information technology projects would be much more efficient.

4. Environmental considerations for new equipment and software

 Group Assignment
Part I. Explain the question given below
1. System Administrators and system Administration
2. security in system administration
3. privileged account
4. Types of Privileged Accounts
5. Disaster
6. Disaster-recovery plan
7. Data Backup
8. Backup data for disaster recovery
9. Terms and Terminologies Migration of technologies
10. Technology and Business

Prepared by Sendera. J Page19

You might also like