Tuesday, 9 August 2011

Strategies


Network 


Network topology – ring, star, bus, mesh, tree, fully meshed. 
LANs and WANs – local area and wide area 
Distributed networks – split up – horizontal and vertical
Network hardware – computer, router, switch, hub, modem, multiplexer, server, client-server, NIC, cabling
Network software – Network OS, network operating system, network management system, auditing and monitoring software
Network auditing and monitoring procedures – traffic management, issuing server space, network manager/administrator, location of server, no of nodes


Levels of access, Administrator rights, Disc space (quota), Access rights to printers, Access rights to e-mail, Access rights to Internet, Access rights to folders, Access rights to applications, Remote access, Printer credits/allowance. 


Backup Strategy 


Storage - kept off-site in a secure safe location, each version clearly labelled, frequency of at least daily 
Recovery - recovery requires last full backup and following incremental backups to be loaded.
Rotation - One set of tapes kept in one location to cover a week, fortnight or month and another set of tapes kept in a different location to be used for the next period and a third set for the next period before reverting to the first set. 


Frequency any time there is a changeor regularly once a month / end of every day 
Storage (multiple) tape or DAT tape or another external hard drive mirror driveone copy off-site 
Version Control 3 copies (GrandFather/Father/Son)
Distinction between full back up and incremental all new data since the last back up of any type, differential – all data since the last full backup. 


Security Strategy


Options - user name and password guidelines, encryption, biometric, secure the room, store data off site 


integrity – accuracy, making sure it is consistent 


privacy of data – keeping sensitive data private describe the security risks to information systems – hacking, viruses – Trojan, spyware, worm 


code of conduct, virus protection, firewall or (protection from hackers, encryption, denial of service risk, access rights 




Upgrade Strategy


Future proofing 
• Computers and communications technology develop at an incredible rateand future proofing requires an organisation to attempt to anticipate future developments in order to secure resources which will be compatible with them. 
• Buy the most advanced processorand ensure that the computer can be upgraded with extra memory and storage if required. In a year or so this computer will be the standard that everyone else is buying. 
Legacy systems 
• Legacy systems are the systems which are in existence (or under development), at the start of an upgrade program. 
• Many companies continue to use legacy systems because the cost of buying new hardware and re-writing/upgrading the application software for the new hardwareis so costly that it does not make financial sense to move to the new system. 


Emulation – imitation of how the system would run.


Software Strategy


Evaluation of software functionality, performance, usability, compatibility data migration, reliability, resource requirements, portability, support)
Training on-the-job training, in-house and external courses)
User support manuals, online help, online tutorials - provided free with package, always available compared to help desk which is not, help desk to provide telephone support to all its branches, newsgroups, FAQs, bulletin board)


Hardware compatibility with example eg system requirements or implication eg
upgrade hardware.
• Integration with existing software packages.
• Compatibility with existing operating system.
• Compatibility with existing data documents.
• Others may not be able to open documents from this department.

No comments:

Post a Comment