100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

BTEC IT Unit 12 IT Technical Support and Management Assignment 3 (DISTINCTION)

Rating
-
Sold
3
Pages
12
Grade
A+
Uploaded on
08-05-2024
Written in
2023/2024

This assignment received DISTINCTION for UNIT 12 IT Technical Support and Management Assignment 3 , covering all these criteria: P5 - Produce an IT support and management plan that adequately meets most of the client’s requirements. P6 - Review the IT support and management plan with others to identify and inform improvements. M3 - Justify, using feedback from others, the decisions made for an IT support and management plan, explaining how it will meet the client's requirements and be fit for purpose. D3 - Evaluate, using feedback from others, the refined IT support and management plan, justifying how it fully meets the client’s requirements and is fit for purpose. If you have any questions, please do not hesitate to message me.

Show more Read less
Institution
Course












Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
May 8, 2024
Number of pages
12
Written in
2023/2024
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

UNIT 12- IT Assignment 3:

TECHNICAL Planning IT Support




SUPPORT

, Unit 12 – Assignment 3




Contents
Introduction...........................................................................................................................................2
Incident Response.................................................................................................................................2
Disaster Recovery..................................................................................................................................3
Incident Recovery..................................................................................................................................5
Capacity Planning..................................................................................................................................7
System capacity.....................................................................................................................................8
Sustainability and Environmental Waste Planning................................................................................8
Ergonomics............................................................................................................................................9
Network Diagram...................................................................................................................................9
Evaluation............................................................................................................................................10

,Introduction
As an IT technician, I have been hired by a company which specialises in computer repair. As
a result of this, my manager now provides local businesses with outsourced IT support and
management services. The clients have asked me to create a support plan for their clients.




Incident Response
Specialised teams within organisations called incident response teams (CSIRT) are in charge
of managing and resolving a variety of incidents that could have an effect on the company's
operations, security, or reputation. Usually, they are made up of professionals with
knowledge of IT, cybersecurity, risk management, and communications. The way CSIRT
typically operate and support their companies is by:

Incident response teams respond by setting up the policies, practices, and tools required to
deal with situations in an efficient manner. This might involve putting together incident
response plans, holding frequent exercises, and training sessions, and making sure the right
equipment and technology are available.

Identification: Determining the exact time of an incident is the first stage in incident
response. This could be keeping an eye out for unusual activity on systems, getting reports
from people or automatic warnings, or spotting behaviours that point to a possible issue.

Containment: The main goal after discovering an incident is to reduce its effects and stop it
from . To stop more harm, this may involve putting compromised services on hold, isolating
affected systems or networks, or applying temporary solutions.

Eradication: After the incident has been isolated, the next move is to get rid of the source of
the issue. To stop such occurrences in the future, which can involve eliminating malware,
patching vulnerabilities, restoring from backups, or putting in place long-term fixes.

Recovery: After the incident's removal, priority turns to resuming regular business activities
and recovering any potentially compromised data or services. To stop such situations in the
future, this may involve rebuilding compromised systems, restoring from backups, or adding
further security measures.

Lessons Learned: Lastly, incident response teams will carry out a post-event review to view
what went wrong, why it occurred, and what may be done to stop it from happening again.
This often includes recording lessons learned, revising incident response protocols, and
communicating information to stakeholders within the company.

For example, if a company's servers were targeted by a cyber-attack. The team will prepare,
identify, isolate, and remove the breach. After restoring data and implementing additional
security measures, they will conduct a post-incident analysis to identify weaknesses and

,improve their response capabilities. They will also update plans, enhanced monitoring tools,
and providing staff training to better prepare for future incidents.


Incident response teams assist companies by quickly addressing issues like a critical PC
failure. They identify and contain the problem, restoring functionality. They communicate
with stakeholders, maintain communication, and conduct a thorough post-incident review
to identify weaknesses and implement improvements to strengthen the organisation's
cybersecurity posture.


Another example is that if employees cannot access important documents stored on
internal network. The incident response team will establish protocols and procedures for
handling incidents, identifying potential cyberattacks or technical malfunctions, contain the
damage, eradicate the threat, and restore access to documents. After solving the incident,
they will conduct a post-incident analysis to identify what went wrong, what worked well,
and what needs improvement for future incidents. This information will be used to update
response plans, improve security measures, and provide employee training.




Disaster Recovery
Disaster recovery is a method of repairing and resuming vital IT infrastructure and business
operations after a disaster, such as a hardware failure, cyberattack, or natural disaster. In
order to secure the quick recovery of data, applications, and systems, minimise downtime,
and limit the impact of the disaster on the organisation, it involves putting strategies,
policies, and procedures . In order to ensure business continuity and protect the
organisation's reputation, income, and consumer trust, disaster recovery aims to restore
regular business activities quickly and efficiently.

Disaster Risk Severity Person1 Person2 Justification
Feedback Feedback
Ransomware on It is high risk as Person 1 Person2 stated Upon reviewing
file server all of the suggested to that files should the feedback, I
business’s data have a backup be encrypted, have concluded
is stored in the server in case which means that it is still a
server. anything is lost that even an high-risk
Response time attacker gains situation. So,
is 50 minutes access to the there should be
server, they will backup in order
not be able to prevent
view the files permanent loss
easily of any data,

, which will save
the business
stress and time.
The files should
also be
encrypted,
which ensures
advanced
security so that
not anyone can
just view the
files, and makes
it harder for
people to gain
access to them
Malware High risk since Person1 stated Person2 I choose
the malware to use firewall proposed using person2
will spread to as if someone antivirus as it feedback as the
different accidentally a monitors and antivirus will
computers and phishing email detects any able to
systems thus or an malicious quarantine and
damaging the illegitimate link, malware in files isolate the
organisation. firewall will and in malware,
block it. computers whereas
Response time firewall will not
would be 20-60 able to do it
mins with much high
malware
situations that
can incredibly
damage the
business
Switch failure Medium Person1 Person2 Overall, I will
severity. Switch recommended suggested choose the
failure might flowing power having multiple second
not impact the supply ensuring switches in case prevention as
organisation as that switches of one fails to having multiple
a whole, it may have high take the load switches in case
usually just reliability of one fails to
disrupt the data take the load
transmissions
and bandwidth
speed etc.

Response time
should be 10-30
mins

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lydii sixth form
Follow You need to be logged in order to follow users or courses
Sold
34
Member since
1 year
Number of followers
5
Documents
28
Last sold
3 weeks ago

4.1

10 reviews

5
6
4
1
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions