ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

IT Concepts

Verified

Added on  2023/03/30

|8
|1846
|444
AI Summary
This document discusses IT concepts, including the advantages of using Linux as an operating system and the features of Sage 50 cloud for financial management. It also provides information on IT security plans and managing backups.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT CONCEPTS
IT CONCEPTS
Name of Student
Name of University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT CONCEPTS
The operating system that the server must use is Linux, this particular operating system
must be chosen over Windows because of the following reasons
1. Secure: windows tend to be vulnerable to various attacks or numerous hacks. Linux is
not at all vulnerable like Windows. It is not invulnerable, but when compared to
Windows, it is more secured (Schneier 2017). The way Linux works, makes it more
secured as an operating system. Overall the entire process of package management,
the entire concept of repositories along with a couple of more features makes it even
more possible for the operating system to be more secured compared to Linux. Linux
does not require the usage of any sort of anti-virus programs (Fielder, Panaousis and
Malacaria 2016). There are numerous software tools that exist and can help in keeping
the system free from threats. Being secure would help the organization in carrying out
their activities in an effective manner.
2. Has the ability to revive old computers: with the evaluation of operating systems,
their hardware requirements evolve as well (Benson and Rahman 2015). Suppose a
genuine copy of windows 10 has been installed, the users would have to meet the
minimum requirements of the hardware for the purpose of running it successfully, and
the users would not be able to run it on low end systems (Fennelly 2016). With the
use of Linux, one of the oldest computers can be used for achieving a particular task.
For low end systems, users are provided with options to install a certain version of the
operating system.
3. Software updates: Microsoft provides a particular software update when it gets a
particular set of issues or if anything major is supposed to be fixed (Soomro, Shah and
Ahmed 2016). Besides this, users would observe a particular software update for
addressing a small problem. With Linux, users would notice that they are provided
with more updates for fixing the issues that the user might face (Szabó 2017). Users
Document Page
2IT CONCEPTS
would encounter a huge number of software updates, besides these the updates are
very fast in nature as well.
4. Customization: one more advantage that is provided by Linux over windows is the
customization. Apart from installing various themes, it would also allow the
organization in customizing the icons that are used (Kwon 2017). Apart from this, the
users would be allowed to use Conky for the purpose of displaying the system
information on the desktop in the most innovative way possible.
The software that must be used is Sage 50 cloud. This is the best as well as in class online
accounting platform that has been built for helping various SMBs to manage the finances in
an effective manner (Khouzani, Malacaria and Hankin 2016). It further helps in compliance
with numerous taxes and hence reporting the necessities. It usually comes with around 50
features that are enterprise level, it also consists of capabilities for helping the organization to
keep a tab and hence get a handle of the organization’s taxes, budgeting, inventory, cash
flow, invoicing along with financial data among many more (Riabov, Sohrabi and Udrea
2016). With the use of the mobile capability, the organization can carry out various payments
that would be on the go as well as bill numerous customers and hence give the accountants
with access to the accounting books that is real time. The unique features of the platform of
accounting is that it tends to combine the robust characteristic set of various desktops along
with the accessibility of these cloud, this would let the organization to access as well as store
various data in the platform of cloud and hence perform different tasks in the systems
(Pompon 2016).
It can be installed by using various steps
Document Page
3IT CONCEPTS
1. Stage 50 first must be installed on the computer which has the ability to store the data
files of Stage 50 Company which is the server (Dax, Ivan and Ley 2017). There are
various files that has the ability to record Stage 50 transactions as well as records.
2. After it has been installed in the server, installation of Stage 50 must be carried out on
every work station (Herd, Favreault and Meyer 2018). Every computer that would
have Stage 50 operating in it, should have Stage 50 installed in it.
3. After the Stage 50 is installed in the server, the organization would get instructions on
installing it in the work stations. The users can make use of a particular link that
would be provided in the instructions section, this kink can be used for the purpose of
installing Stage 50 in an easy manner in the work stations (Benson and Rahman
2015). The organization can also install Stage 50 on numerous work stations at the
same time.
4. Stage 50 accounting as well as Stage 50 pro accounting are not usually multi user
compatible and must be installed on a particular computer only.
The origination might have hold of a security plan, this plan would discuss reading
the employees who would be allowed to access the data, files which are secured.
Access to data and files: file and data would be present within the organization,
manual data would be present or stored into various files, and digital data would be saved in
systems. The digital data might belong to a specific employee or the entire organization
(Soomro, Shah and Ahmed 2016). The data that being to various employees must not be
accessed by other employee because this might result in leaking of data and hence result in
security issues of the data. Besides this the data that belongs to the organization would have
to be allowed to every employee but serious measures must be undertaken so that the data
does not get leaked from within the organization (Khouzani, Malacaria and Hankin 2016).
The manual data must be distributed to different individual employees to whom that data

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT CONCEPTS
belongs. This would not allow other employees to access their data and misuse it for ill
purposes. This would also prevent the data from getting leaked.
Security of files: the files must be secured considering the fact that they might be
damages by any source like natural disasters such as earthquake, floods and many more. The
data might also be compromised by hackers and they might demand for ransom amount of
money in order to return the access of the data (Riabov, Sohrabi and Udrea 2016). Files that
are stored in the systems must have a copy and the copy must be saved somewhere outside
the office premises. The manual data like files must have a different copy which would also
be secured away from the office premises.
Security plan
The IT security plan as well as process could be implemented as well as maintained
by putting minimum effort as well as resources. This would prove to be the initial step of
elimination of bulk of threats that cause numerous compromises (Dax, Ivan and Ley 2017).
An IT security plan can be implemented by the organization, a security plan has been
provided below for the purpose of using by the organization.
1. Consider an inventory of the organization’s physical as well as data assets that are to
be protected by the organization.
2. Perform risk assessment for determining which level of security is required in order to
protect the data assets
3. Complete an entire c checklist for making the organization aware of their security
strengths as well as weaknesses.
4. Complete a particular evaluation. Evaluate the findings that have been obtained and
then discuss various recommendations for correcting deficiencies and hence improve
Document Page
5IT CONCEPTS
security along with departmental administration as well as IT staff (Herd, P.,
Favreault and Meyer 2018).
5. Develop various strategies for securing the data, set the target dates for the purpose of
implementation.
Responsibilities for a particular security plan that is departmental
Inventory: IT staff
Risk assessment: systems administrator as well as director or dean or administrator
Checklist: systems administrator
Evaluation: systems administrator would provide report to the director or dean or
administrator
Plan: IT staff along with the approval of the director or dean or administrator
Plan for managing backups
Backups can be managed with the use of various steps, these steps are as follows
1. Planning ahead: backup infrastructure must be factored in the process of planning
for the purpose of rolling out applications, servers as well as primary shortage growth.
Proper planning would enable the backup team to completely understand a specific
application’s requirements for the business as well as design characteristics with the
respect of protection of data (Khouzani, Malacaria and Hankin 2016). The policies of
backup as well as approach is required for a database application which employs the
split mirrors as well as replication is considered to be different compared to the ones
needed for as particular file based environment.
2. Review the backup logs regularly: a particular review of the error of the backup
application as well as numerous activity logs has been considered as a daily activity of
Document Page
6IT CONCEPTS
an organization (Schneier 2017). Analysis of log can be very time consuming, but it
has the ability to pay dividends that are very valuable in nature and is necessary for
reliable backup.
References
Benson, K. and Rahman, S., 2015. Security Risks in Mechanical Engineering
Industries. arXiv preprint arXiv:1512.01730.
Dax, J., Ivan, A., Ley, B., Pape, S., Pipek, V., Rannenberg, K., Schmitz, C. and Sekulla, A.,
2017. IT Security Status of German Energy Providers. arXiv preprint arXiv:1709.01254.
Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Herd, P., Favreault, M., Meyer, M.H. and Smeeding, T.M., 2018. A Targeted Minimum
Benefit Plan: A New Proposal to Reduce Poverty Among Older Social Security Recipients A
Targeted Minimum Benefit Plan. RSF: The Russell Sage Foundation Journal of the Social
Sciences, 4(2), pp.74-90.
Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September.
Efficient numerical frameworks for multi-objective cyber security planning. In European
Symposium on Research in Computer Security (pp. 179-197). Springer, Cham.
Kwon, J.K., 2017. A Study on Establishment of Small and Medium Business Information
Security Plan under Resource Restrictions. Journal of Convergence for Information
Technology, 7(2), pp.119-124.
Pompon, R., 2016. IT Security Risk Control Management: An Audit Preparation Plan.
Apress.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7IT CONCEPTS
Riabov, A., Sohrabi, S., Udrea, O. and Hassanzadeh, O., 2016. Efficient high quality plan
exploration for network security. In International scheduling and planning applications
woRKshop (SPARK).
Schneier, B., 2017. IoT security: what's plan B?. IEEE Security & Privacy, 15(5), p.96.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), pp.215-225.
Szabó, Z., 2017. The Information Security and IT Security Questions of Pension Payment.
In Key Engineering Materials(Vol. 755, pp. 322-327). Trans Tech Publications.
1 out of 8
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]