100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Essay

Unit 12 IT Technical Support and Management Assignment 3 (Learning Aim C) Distinction

Beoordeling
4,0
(1)
Verkocht
6
Pagina's
10
Cijfer
A+
Geüpload op
11-07-2023
Geschreven in
2022/2023

UNIT 12 IT TECHNICAL SUPPORT AND MANGEMENT, COVERS ALL CRITERIA DISTINCTION LELVE ASSIGNMENT Learning aim C: Develop a plan to support and manage a new IT system using industry standards and methods C.P5 Produce an IT support and management plan that adequately meets most of the client’s requirements. C.P6 Review the IT support and management plan with others to identify and inform improvements C.M3 Justify, using feedback from others, the decisions made for an IT support and management plan, explaining how it will meet the client's requirements and be fit for purpose. C.D3 Evaluate, using feedback from others, the refined IT support and management plan, justifying how it fully meets the client’s requirements and is fit for purpose. If you have any queries, feel free to message me

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
11 juli 2023
Aantal pagina's
10
Geschreven in
2022/2023
Type
Essay
Docent(en)
Onbekend
Cijfer
A+

Onderwerpen

Voorbeeld van de inhoud

Victor Anosike
Learning Aim C IT Technical Support and Management
Assignment 3
Unit 12: Assignment – Develop a plan to support
and manage a new IT system using industry
standards and methods
In this assignment, I will create a support plan for a start-up company that runs
an internet-based business and is looking to hire between 25 and 30 people.
They will require desktop computers, as will senior management, who will be
supplied with tablet computers that will be connected to Wi-Fi via the company's
LAN. To suit the client's needs, they have requested that three black and white
printers and two colour printers be included and shared. It has been said that
the system is critical to the company's operations, thus I must make it available
24 hours a day, 365 days a year.
When developing the IT support and management plan for the company I will
need to cover the following:
 Incident response
 Disaster recovery
 Capacity planning
 Sustainability and environmental waste planning
 IT support and management plan
I will also design an appropriate layout for the organisation, indicating where the
system and cabling will be installed to guarantee a safe working environment in
accordance with health and safety regulations.

Incident Response
Incident response is the procedure of handling and resolving any form of
technical or security incident or disruption that occurs and threatens the
functioning of a company’s IT system. It entails taking measures to try to avoid
future harm to the IT system by reducing the impact of the incident’s
consequences. I propose that the company hire a Computer Incident Response
Team (CIRT), which are qualified specialists in managing and responding to
computer security problems. The major goal of the CIRT is to effectively identify
an incident or interruption and conduct an in-depth examination in order to
reduce and rapidly restore normal functionality to the IT system.
In the following sections, I will provide a full description of how the CIRT can
handle issues that occur within the IT system:
1. Incident Identification – This is the initial phase, which entails
recognising and acknowledging an occurrence that affects the IT system’s
regular operation. Security breaches, system failures, and other
catastrophes are all possible. It is the CIRT’s responsibility to determine
the cause of the occurrence
2. Incident Reporting – Following the identification of the event, it must be
reported to the proper persons or team, which would be the CIRT, who
would then be in charge of conducting the incident response
3. Incident Triage – After receiving the incident report, the CIRT would
examine the severity and probable consequences of the incident. The
assessment would take into account criteria such as the criticality of the

, Victor Anosike
Learning Aim C IT Technical Support and Management
Assignment 3
impacted systems, how sensitive the data involved was, and the likelihood
of future harm.
4. Containment and Mitigation – The next step would be to contain the
situation and prevent it from spreading further; this may include isolating
impacted systems or deactivating compromised accounts, for example.
Mitigation entails applying strategy ideas to reduce the impact of the
incident and restore regular IT system operations.
5. Investigation and Root Cause Analysis – After the CIRT has
successfully confined the incident, they may perform a detailed
investigation to determine both the cause and the source of the issue.
Examining logs, network traffic, and system setup would be actions taken
to gather as much information as possible. Implementing root cause
analysis would aid in identifying weaknesses in the IT systems, flaws in
security management, and a lack of procedure protocols that may have
led to the incident.
6. Remediation and Recovery – Depending on the results of the inquiry,
the CIRT would be able to take reasonable steps to resolve the situation.
This indicates that by patching software vulnerabilities and changing
security parameters, the impacted system would be returned to a secure
and functioning state.
7. Documentation and Reporting – Throughout the incident response
process, detailed documentation would be maintained. An incident report,
measures done to rectify difficulties, and lessons gained would be included
in the record. All of this information would be useful for future reference
and for strengthening incident response protocols.
8. Post-Incident Review and Improvement – Once the CIRT has resolved
the incident, a post-incident evaluation will be done to determine the
effectiveness of the response procedure. Lessons gathered from the entire
situation are utilised to improve security procedures and update rules. It
can also be useful to give further training in order to avoid such incidents
in the future.
The CIRT would want to adhere to the incident response plan in order to
successfully manage and reduce the effects of the IT issues while also
assuring the security and stability of its systems and data.

Incident Recovery
The process of returning an IT system to its regular condition following an
event or interruption is known as incident recovery. Planned actions are taken
to return operations to normal and restore the impacted systems t to what it
was before the incident, all while guaranteeing minimal downtime. Incident
recovery entails a variety of tasks that must be completed after recovering
the lost data, such as system validation and testing to ensure that the IT
system is functioning properly, and service verification to ensure that all
affected IT services are fully operational, and that users and stakeholders can
use them. If the CIRT can successfully and quickly perform the incident
recovery method, the organisation will be able to restart company operations,
which can help to preserve user satisfaction.

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
1 jaar geleden

4,0

1 beoordelingen

5
0
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Draymon Barnet and Southgate College (London)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
112
Lid sinds
2 jaar
Aantal volgers
63
Documenten
22
Laatst verkocht
5 maanden geleden

4,2

15 beoordelingen

5
9
4
2
3
3
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen