Preview

Export data into external source (m3)

Powerful Essays
Open Document
Open Document
1668 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Export data into external source (m3)
Explain the Impact of Organisational Policies on the Troubleshooting and Repair Process (P1)
Referring to the policies related to the College’s network. Produce an audio recording for the Network manager to explain the impact of their organisational policies on the troubleshooting and repair process.
Introduction
In this documents, I am going to be explaining the impact of organisational policies on the troubleshooting and repair process, I am going to be talking about the organisational policies, such as considerations e.g. security, costs, systems downtime, disruption, resource allocation, prioritisation, contractual requirements, trend analysis, escalation procedures, documentation, reporting, contractual legal issues.
Organisational Policies
An organisational policy is expected to do many things. Primarily it should protect people and information, as well as set the rules for expected behaviour by users, system administrators, management and security personnel. It should also authorise relevant personnel to monitor, probe, investigate, define and authorise the consequences of violations, in addition to defining the company’s baseline stance on security. This can help minimise risk and help track compliance with appropriate regulations.
Security
This policy is mainly responsible for making sure that all the security detail such as password and user accounts are secure so you have to make sure that you are the only person that uses the account. IT systems Acceptable usage policy requires from users to log off the computer as inappropriate people could get the access to the data that they shouldn’t. The user also shouldn’t install the unauthorized software as this could lead to the issues such as making the equipment unusable by affecting it performance. The users also have to make sure that the equipment is secure during the use of it and after. The users within college are not allowed to connect they own device to the college network if they don’t get

You May Also Find These Documents Helpful

  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If your computer is a part of business, you should follow the policy established by network administrator.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Briargrove

    • 403 Words
    • 2 Pages

    Briargrove, a multinational organization, has a wide-range of computer systems and applications of which need to communicate with each other quite frequently. However, being that different backup systems are located globally and online, Briargrove only implemented data back-ups and lab test network without having any particular policy or procedure put into place. The impact of not implementing administrative controls is that, a vast amount of management has taken it upon themselves to download unknown software of which has counteracted with the system therefore causing a complete system failure and thereby affecting the organization as a whole entity. Subsequently, after the system failure, Briargrove has been advised to provide both a…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Random Shi

    • 592 Words
    • 3 Pages

    Rob calls the help desk to report that he cannot access any web sites on the Internet. While he is still on the phone, you have him try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 1 of 5…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law would put the hackers from obtaining information wrongly.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Best Essays

    There is a range of policies procedures and legislation linked to safeguarding and to the…

    • 3968 Words
    • 16 Pages
    Best Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The first step an organization must take in creating a security policy is to determine which assets to protect from which threats; a company that stores its customers’ credit card numbers might decide that those numbers are an asset that must be protected from eavesdroppers; then the organization must determine who should have access to various parts of the system; next, the organization determines what resources are available to protect the assets identified. Using the information it has acquired, the organization develops a written security policy. Finally, the organization commits to resources to building software, hardware, and physical barriers that implement the security policy.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays