100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Ensayo

BTEC IT Unit 12 IT Technical Support and Management Assignment 3 (DISTINCTION)

Puntuación
-
Vendido
3
Páginas
12
Grado
A+
Subido en
08-05-2024
Escrito en
2023/2024

This assignment received DISTINCTION for UNIT 12 IT Technical Support and Management Assignment 3 , covering all these criteria: P5 - Produce an IT support and management plan that adequately meets most of the client’s requirements. P6 - Review the IT support and management plan with others to identify and inform improvements. M3 - Justify, using feedback from others, the decisions made for an IT support and management plan, explaining how it will meet the client's requirements and be fit for purpose. D3 - Evaluate, using feedback from others, the refined IT support and management plan, justifying how it fully meets the client’s requirements and is fit for purpose. If you have any questions, please do not hesitate to message me.

Mostrar más Leer menos
Institución
Grado

Vista previa del contenido

UNIT 12- IT Assignment 3:

TECHNICAL Planning IT Support




SUPPORT

, Unit 12 – Assignment 3




Contents
Introduction...........................................................................................................................................2
Incident Response.................................................................................................................................2
Disaster Recovery..................................................................................................................................3
Incident Recovery..................................................................................................................................5
Capacity Planning..................................................................................................................................7
System capacity.....................................................................................................................................8
Sustainability and Environmental Waste Planning................................................................................8
Ergonomics............................................................................................................................................9
Network Diagram...................................................................................................................................9
Evaluation............................................................................................................................................10

,Introduction
As an IT technician, I have been hired by a company which specialises in computer repair. As
a result of this, my manager now provides local businesses with outsourced IT support and
management services. The clients have asked me to create a support plan for their clients.




Incident Response
Specialised teams within organisations called incident response teams (CSIRT) are in charge
of managing and resolving a variety of incidents that could have an effect on the company's
operations, security, or reputation. Usually, they are made up of professionals with
knowledge of IT, cybersecurity, risk management, and communications. The way CSIRT
typically operate and support their companies is by:

Incident response teams respond by setting up the policies, practices, and tools required to
deal with situations in an efficient manner. This might involve putting together incident
response plans, holding frequent exercises, and training sessions, and making sure the right
equipment and technology are available.

Identification: Determining the exact time of an incident is the first stage in incident
response. This could be keeping an eye out for unusual activity on systems, getting reports
from people or automatic warnings, or spotting behaviours that point to a possible issue.

Containment: The main goal after discovering an incident is to reduce its effects and stop it
from . To stop more harm, this may involve putting compromised services on hold, isolating
affected systems or networks, or applying temporary solutions.

Eradication: After the incident has been isolated, the next move is to get rid of the source of
the issue. To stop such occurrences in the future, which can involve eliminating malware,
patching vulnerabilities, restoring from backups, or putting in place long-term fixes.

Recovery: After the incident's removal, priority turns to resuming regular business activities
and recovering any potentially compromised data or services. To stop such situations in the
future, this may involve rebuilding compromised systems, restoring from backups, or adding
further security measures.

Lessons Learned: Lastly, incident response teams will carry out a post-event review to view
what went wrong, why it occurred, and what may be done to stop it from happening again.
This often includes recording lessons learned, revising incident response protocols, and
communicating information to stakeholders within the company.

For example, if a company's servers were targeted by a cyber-attack. The team will prepare,
identify, isolate, and remove the breach. After restoring data and implementing additional
security measures, they will conduct a post-incident analysis to identify weaknesses and

,improve their response capabilities. They will also update plans, enhanced monitoring tools,
and providing staff training to better prepare for future incidents.


Incident response teams assist companies by quickly addressing issues like a critical PC
failure. They identify and contain the problem, restoring functionality. They communicate
with stakeholders, maintain communication, and conduct a thorough post-incident review
to identify weaknesses and implement improvements to strengthen the organisation's
cybersecurity posture.


Another example is that if employees cannot access important documents stored on
internal network. The incident response team will establish protocols and procedures for
handling incidents, identifying potential cyberattacks or technical malfunctions, contain the
damage, eradicate the threat, and restore access to documents. After solving the incident,
they will conduct a post-incident analysis to identify what went wrong, what worked well,
and what needs improvement for future incidents. This information will be used to update
response plans, improve security measures, and provide employee training.




Disaster Recovery
Disaster recovery is a method of repairing and resuming vital IT infrastructure and business
operations after a disaster, such as a hardware failure, cyberattack, or natural disaster. In
order to secure the quick recovery of data, applications, and systems, minimise downtime,
and limit the impact of the disaster on the organisation, it involves putting strategies,
policies, and procedures . In order to ensure business continuity and protect the
organisation's reputation, income, and consumer trust, disaster recovery aims to restore
regular business activities quickly and efficiently.

Disaster Risk Severity Person1 Person2 Justification
Feedback Feedback
Ransomware on It is high risk as Person 1 Person2 stated Upon reviewing
file server all of the suggested to that files should the feedback, I
business’s data have a backup be encrypted, have concluded
is stored in the server in case which means that it is still a
server. anything is lost that even an high-risk
Response time attacker gains situation. So,
is 50 minutes access to the there should be
server, they will backup in order
not be able to prevent
view the files permanent loss
easily of any data,

, which will save
the business
stress and time.
The files should
also be
encrypted,
which ensures
advanced
security so that
not anyone can
just view the
files, and makes
it harder for
people to gain
access to them
Malware High risk since Person1 stated Person2 I choose
the malware to use firewall proposed using person2
will spread to as if someone antivirus as it feedback as the
different accidentally a monitors and antivirus will
computers and phishing email detects any able to
systems thus or an malicious quarantine and
damaging the illegitimate link, malware in files isolate the
organisation. firewall will and in malware,
block it. computers whereas
Response time firewall will not
would be 20-60 able to do it
mins with much high
malware
situations that
can incredibly
damage the
business
Switch failure Medium Person1 Person2 Overall, I will
severity. Switch recommended suggested choose the
failure might flowing power having multiple second
not impact the supply ensuring switches in case prevention as
organisation as that switches of one fails to having multiple
a whole, it may have high take the load switches in case
usually just reliability of one fails to
disrupt the data take the load
transmissions
and bandwidth
speed etc.

Response time
should be 10-30
mins

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
8 de mayo de 2024
Número de páginas
12
Escrito en
2023/2024
Tipo
ENSAYO
Profesor(es)
Desconocido
Grado
A+

Temas

$10.90
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
lydii sixth form
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
34
Miembro desde
1 año
Número de seguidores
5
Documentos
28
Última venta
3 meses hace

4.1

10 reseñas

5
6
4
1
3
2
2
0
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes