Preview

Export data into external source (m3)

Powerful Essays
Open Document
Open Document
1668 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Export data into external source (m3)
Explain the Impact of Organisational Policies on the Troubleshooting and Repair Process (P1)
Referring to the policies related to the College’s network. Produce an audio recording for the Network manager to explain the impact of their organisational policies on the troubleshooting and repair process.
Introduction
In this documents, I am going to be explaining the impact of organisational policies on the troubleshooting and repair process, I am going to be talking about the organisational policies, such as considerations e.g. security, costs, systems downtime, disruption, resource allocation, prioritisation, contractual requirements, trend analysis, escalation procedures, documentation, reporting, contractual legal issues.
Organisational Policies
An organisational policy is expected to do many things. Primarily it should protect people and information, as well as set the rules for expected behaviour by users, system administrators, management and security personnel. It should also authorise relevant personnel to monitor, probe, investigate, define and authorise the consequences of violations, in addition to defining the company’s baseline stance on security. This can help minimise risk and help track compliance with appropriate regulations.
Security
This policy is mainly responsible for making sure that all the security detail such as password and user accounts are secure so you have to make sure that you are the only person that uses the account. IT systems Acceptable usage policy requires from users to log off the computer as inappropriate people could get the access to the data that they shouldn’t. The user also shouldn’t install the unauthorized software as this could lead to the issues such as making the equipment unusable by affecting it performance. The users also have to make sure that the equipment is secure during the use of it and after. The users within college are not allowed to connect they own device to the college network if they don’t get

You May Also Find These Documents Helpful

  • Powerful Essays

    The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons learned.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If your computer is a part of business, you should follow the policy established by network administrator.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Random Shi

    • 592 Words
    • 3 Pages

    Rob calls the help desk to report that he cannot access any web sites on the Internet. While he is still on the phone, you have him try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law would put the hackers from obtaining information wrongly.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Best Essays

    There is a range of policies procedures and legislation linked to safeguarding and to the…

    • 3968 Words
    • 16 Pages
    Best Essays
  • Satisfactory Essays

    The first step an organization must take in creating a security policy is to determine which assets to protect from which threats; a company that stores its customers’ credit card numbers might decide that those numbers are an asset that must be protected from eavesdroppers; then the organization must determine who should have access to various parts of the system; next, the organization determines what resources are available to protect the assets identified. Using the information it has acquired, the organization develops a written security policy. Finally, the organization commits to resources to building software, hardware, and physical barriers that implement the security policy.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays