100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

Unit 12 Assignment 3/Learning Aim C Distinction Grade achieved

Rating
-
Sold
-
Pages
11
Uploaded on
04-03-2026
Written in
2025/2026

This document presents a refined IT support and management plan that has been enhanced using peer feedback to ensure it fully meets the client’s requirements and is fit for purpose. The plan focuses on improving network clarity, security, usability, and scalability, while integrating practical solutions for daily operations and future expansion. Key improvements and features include: Optimised network layout to reduce clutter, minimise failure points, and streamline troubleshooting Clear visual representation of devices with colour-coded Ethernet connections and identifiable icons for routers, tablets, servers, and wireless access points Enhanced security measures, including the correct placement of firewalls and inclusion of an ISP for better network management Centralised resource management, such as a dedicated printer room and logical grouping of shared devices Redundancy and disaster recovery, including offshore backups, server failover, and proactive system monitoring Consideration of user experience, such as a private manager workstation, wireless mobility, and simplified user access Responsive to feedback, demonstrating flexibility, careful planning, and attention to both technical and practical requirements Overall, the plan provides a well-organised, secure, and scalable IT network that satisfies client needs, supports efficient operations, and prepares the organisation for future growth.

Show more Read less
Institution
Course

Content preview

Unit 12: IT Technical Support
and Management
C: Develop a plan to support
and manage a new IT system
using industry standards and
methods

, 1 of 11



Introduction
I have been employed as an IT technician for a PC repair business. My manager is expanding into the
IT management and support industry by offering local businesses outsourced IT support. For one of
the companies that has enrolled in outsourced support, I have been requested to create a support
plan. The company for which I must create a support strategy is a start-up that operates an online
business. In addition to the 25 to 30 employees who will all have desktop PCs, the senior staff will
also have tablet computers that are Wi-Fi-connected to the company LAN, enabling data sharing and
Internet access.



Incident Response
Incident response teams are specialised teams within businesses tasked with managing and
resolving a range of occurrences that may impact the operations, security, or reputation of the
business. They are typically composed of experts in communications, risk management,
cybersecurity, and information technology. CSIRT usually supports and operates their businesses by:
In reaction, incident response teams establish the procedures, rules, and equipment needed to
handle circumstances effectively. This could entail creating incident response plans, conducting
regular training sessions and exercises, and ensuring that the appropriate tools and technology are
available.

Recognition: The first step in incident response is to determine the precise moment of an incident.
This could involve monitoring systems for anomalous activity, receiving reports from users or
automated alerts, or identifying patterns that suggest a potential problem.

The limitation: After an incident is discovered, the primary objective is to lessen its impact and
prevent it from spreading. This may entail implementing temporary fixes, isolating impacted systems
or networks, or suspending compromised services to prevent further damage.

Eradication: Reducing the cause of the problem is the next step after isolating the incidence. This can
entail removing malware, patching vulnerabilities, restoring from backups, or implementing long-
term solutions to prevent such incidents in the future.

Recovery time: Resuming normal business operations and retrieving any possibly compromised data
or services take precedence after the issue has been resolved. Rebuilding hacked systems,
recovering from backups, or implementing additional security measures may be necessary to
prevent such circumstances in the future.

Lessons Learnt: Finally, incident response teams will conduct a post-event review to determine what
went wrong, why it happened, and potential preventative measures. This frequently entails
documenting lessons learnt, updating incident response procedures, and informing company
stakeholders.

For instance, if a cyberattack targeted the company's systems. The group will get ready, find the
breach, isolate it, and eliminate it. They will carry out a post-event study to find vulnerabilities and
fixes following data restoration and the installation of extra security measures.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
March 4, 2026
Number of pages
11
Written in
2025/2026
Type
OTHER
Person
Unknown

Subjects

$13.85
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
waqarmohammed997

Also available in package deal

Get to know the seller

Seller avatar
waqarmohammed997 Blackburn College
Follow You need to be logged in order to follow users or courses
Sold
14
Member since
2 year
Number of followers
0
Documents
25
Last sold
1 week ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions