Provide Network System Administration Last Edited
Provide Network System Administration Last Edited
o Configuring an alarm on
The commonality here is that all of these functions could be used for malicious
purposes and so they need to be appropriately protected.
Security administrators are employees who test, protect, and ensure the hardware,
software, and the data within the computer networks, is secure. A security
administrator is the lead point person for the cyber security team. They are typically
responsible for the entire system and ensure that it is defended as a whole.
Privileged credentials (also called privileged passwords) are a subset of credentials that
provide elevated access and permissions across accounts, applications, and systems.
Privileged passwords can be associated with human, application, service accounts, and
more. SSH keys are one type of privileged credential used across enterprises to access
servers and open pathways to highly sensitive assets.
Maintaining System integrity and security
How to Maintain Access Control System Integrity
Building access control systems are used within organizations to secure access and
protect the people and assets within the areas under their control. System integrity is
paramount to the safe and successful operation of an access control solution. System
integrity can weaken over time due to a wide range of issues. Some of these are
hardware related and some due to management of the software database at the heart of
the cloud-based access control solution.
Access Control Points
The most common access entry or exit point is a doorway. On one side of the doorway
will be some form of credential reader or security keypad and on the other, similar or a
request to exit (RTE) button. A reader can be a card reader, card reader keypad,
Bluetooth low energy mobile phone or biometric reader. The reader will collect the new
credential presented and verify this with the user/credential recording the software
database .If approved, an instruction is sent to the door controller over an IP network or e
lease the doorway which is generally restricted using magnetic locks (maglocks).
Access Control Software Data Maintenance The software and database running
your access control solution is not immune to operational issues, if there are not
strong policies and management systems in place.
Tailgating This is a common problem with access control solutions. Companies and
organizations should have policies and training in place to prevent the chance of tailgating.
This occurs when a person (one or more) follows an individual whose credential has been
approved for entry. Simply holding open a door can let an ‘unapproved’ visitor into an
access-controlled area. When individuals do not follow procedure and have their individual
credentials checked by are reader for entry (or exit), movement and occupancy logs data
can also be in accurate. Evidence of this can sometimes be picked up on Who, Where and
When reports and simply analyzing the historical event and alarm logs.
Prepared by Sendera. J Page4
Access Control Management Checklist
Maintenance contracts are typically annual and will include one or more onsite
preventative maintenance visits. A typical visit should start with a discussion with the
system owner on how the systems have performed, changes made since the last
inspection and any known fault or operational issues.
Site and system walk around including a visual inspection of all components
Hardware inspection and operational testing
Battery checks
Components cleaning to remove dust
Full system performance tests
Individual doorway controller and reader inspections and tests
Software database and logs inspection
Camera system review and System review
Regular access control system maintenance is important to maintain the overall integrity
of a system. Preventative maintenance helps to identify consumables that require
replacement, in addition to components that suffering from ‘wear and tear’ usage. Their
timely replacement can not only prevent a system breakdown or malfunction but help to
ensure an extended working life for the overall system. Software database maintenance is
also important as this can ensure that only authorized users are active and with the correct
access rights for their role within the organization.
A disaster-recovery plan looks at what disasters could hit the company and lays out a
plan for responding to those disasters. Disaster-recovery planning includes
implementing ways to mitigate potential disasters and making preparations to enable
quick restoration of key services. The plan identifies what those key services are and
specifies how quickly they need to be restored. All sites need to do some level of
disaster-recovery (DR) planning. DR planners must consider what happens if
something catastrophic occurs at anyone of their organization’s sites and how they can
recover from it. We concentrate on the electronic data aspects of DR. However, this
part of the plan should be built as part of a larger program in order to meet the
company’s legal and financial obligations.
Data Backup
How will you backup data for disaster recovery?
Developing a data backup strategy begins with identifying what data to backup, selecting
and implementing hardware and software backup procedures, scheduling and conducting
backups and periodically validating that data has been accurately backed up.
Developing the Data Backup Plan Identify data on network servers, desktop computers,
laptop computers and wireless devices that needs to be backed up along with other hard
copy records and information. The plan should include regularly scheduled backups from
wireless devices, laptop computers and desktop computers to a network server. Data on the
server can then be backed up. Backing up hard copy vital records can be accomplished by
scanning paper records into digital formats and allowing them to be backed up along with
other digital data.
Options for Data Backup Tapes, cartridges and large capacity USB drives with integrated
data backup software are effective means for businesses to backup data. The frequency of
backups, security of the backups and secure off-site storage should be addressed in the
plan. Backups should be stored with the same level of security as the original data. Many
vendors offer online data backup services including storage in the “cloud”. This is a cost-
effective solution for businesses with an internet connection. Software installed on the
client server or computer is automatically backed up. Data should be backed up as
frequently as necessary to ensure that, if data is lost, it is not unacceptable to the business.
The business impact analysis should evaluate the potential for lost data and define the
“recovery point objective.” Data restoration times should be confirmed and compared with
the IT and business function recovery time objectives.
Migration in the information technologies is the process of moving from the use of
one operating environment to another operating environment, that’s most cases is
thought to be a better one. the migration is using the old technologies upgraded into
new technologies (oldest version into newest version of technologies). Example
Office 2003 to 20007, 2020, 2013, 2016, 2019 and etc..,
Windows XP to windows 7, 8, 10 and etc…
Windows server 2003 to windows server 2008,
2012 and above… Migration can be migrate to new
Hardware
Software and
Migrations steps
Phase1:- Discovery is reviewing where you are and where you are going.
Phase2:- Design is build your image, application and deployment process of present
technology.
Phase3:-Test Insure hardware and software compatibility and validate deployment
phase duress.
Phase4:- Deploy (organize) look for automation options to keep cost down.
Phase5:- project closers (conclusion) optimize environment and document standard
operating procedures and solve problems (Evaluate the performances )
Unless businesses make use of the advantages of the new technology, they will
find that they can’t compete with businesses that do. Consider the changes to our
lives that have been brought about by such things as telephone banking, the
Internet, e-business, email and so on, and the competitive advantages such
changes have given the organizations that implement them. Organizations need
to be constantly aware of current or emerging technology trends and directions
in information technology (IT). IT will continue to evolve and produce more and
more new technology. Your objective is to not only apply new technology. It is
to solve the organization’s problems, but to employ it in the most cost efficient
and appropriate manner.
To ensure that IT is totally aligned with business objectives, IT professional need to:
Provide business-focused leadership rather than technology-focused
Think about the impact of tasks on business as a whole rather than provide
solutions for individual tasks.
Concentrate more on end-user experience with new technologies rather than the
technology itself.
Focus on the business goals and let the technology follow.
New Technology and Your Business
New technology is used to enhance service, promote innovation, and improve
communication and quality while reducing the costs, and increase productivity and
profits. The appropriate business use of new technology should result in benefits
As the IT assistant, you have suggested that this process be automated to increase
Task Description
1 Back up files on existing computers
2 Remove existing computers
3 Install new computers
4 Test new computers
5 Restore files to new computers
Identifying the tasks and their sequence beforehand should ensure that the
implementation goes smoothly. This is a very simple example, but can you
imagine what would happen if Task 2 was performed without performing
Task 1?
3. Resources: - Having identified the tasks, the next step is to allocate people and
resources to them. To minimize confusion, people need to know exactly what they are
supposed to do. Obtaining resources may involve negotiating with the people involved
or their superiors as they may have other commitments.
Table 3 provides an example of resources required for installing new PCs.
Task Description Human resource Resource (tools)
1 Back up files on existing Melkesa Chala Portable HDD and backup software
computers
2 Remove existing computers Toltu Tola Trolley, packaging tools and inventory
forms
3 Install new computers Sanyi Yani Trolley and inventory forms
4 Test new computers Hayat Bona Testing software and checklist
5 Restore files to new Firom Yani Portable HDD and backup software
computers
5. Milestone :- Milestones are established points in the project used to determine whether
or not the project will meet the anticipated schedule. These are usually major events in
the course of the project such as ‘installing new computers’ or ‘software purchased’. It
is important to establish milestones in your implementation plan and monitor the
progress of the implementation on an ongoing basis. You can also gather project
progress reports from implementation team members.
6. Organizational issues :- Any impact on the day-to-day running of the business needs to be
identified and planned for. For example the installation may require that the network
not be operational for a period of time. Therefore it should be scheduled for a time
when it will have as minimal an impact as possible, for example, after hours.
Prepared by Sendera. J Page17
Sometimes it is difficult to identify downtime when no one would be affected. In all
cases, users who will be affected need to have sufficient warning in terms of days not
hours.
Managing the implementation
Technology and its use need to be managed if it is to be used effectively.
Management of technology includes tasks such as:
overcoming resistance to technology
ensuring that users are competent in using the technology
monitoring the efficient use of the technology
monitoring the performance of the technology
Group Assignment
Part I. Explain the question given below
1. System Administrators and system Administration
2. security in system administration
3. privileged account
4. Types of Privileged Accounts
5. Disaster
6. Disaster-recovery plan
7. Data Backup
8. Backup data for disaster recovery
9. Terms and Terminologies Migration of technologies
10. Technology and Business