logo

Managing IT Security: Internet Downtime, Power and Server Failure, Risk Identification, Firewall, and More

Assessment Task 2 for the Diploma of Information Technology course at Strathfield College Pty Ltd is a written questionnaire on managing IT security.

7 Pages1505 Words152 Views
   

Added on  2023-06-04

About This Document

This article discusses how to manage IT security in case of internet downtime, power and server failure, risk identification, and more. It also explains the role of firewall and different types of violations. The article is relevant for students studying ICTNWK614.

Managing IT Security: Internet Downtime, Power and Server Failure, Risk Identification, Firewall, and More

Assessment Task 2 for the Diploma of Information Technology course at Strathfield College Pty Ltd is a written questionnaire on managing IT security.

   Added on 2023-06-04

ShareRelated Documents
MANAGING IT SECURITY
Managing IT security
Unit Code ICTNWK614
Assessment 2
Name of the Student
Name of the University
Author Note:
Managing IT Security: Internet Downtime, Power and Server Failure, Risk Identification, Firewall, and More_1
1
MANAGING IT SECURITY
You work as a system administrator in an IT company. Suddenly, an internet downtime
occurs. How do you respond to this?
Identification of the root cause will be my primary step regarding the internet downtime
issue of my IT organization. Since my corporation deals with many sensitive data running on
our network it is very essential for me as a system administrator to protect those data from
threats and vulnerabilities (Robert and Edem 2016). Deciphering the blue screen can give me
the reasons for this issue. The server room of out IT firm will be secured immediately with
different troubleshooting options and backup internet providers in our office will be called
and made to work temporarily (Bailis and Kingsbury 2014). A tool which is mostly used in
our organization in a similar situation named tracerute will be used to map the route of the
data packets. Every device has to be critically observed during this adverse time.
How do you prepare for power failure and server failure situations?
The power failure can be tackled with the help of the following measure:
Additional utility line (Qiu et al. 2016).
Emergency generator
Electrical equipment maintenance
Distributed power equipment/cogeneration
Uninterruptible power supply (UPS)
Managing IT Security: Internet Downtime, Power and Server Failure, Risk Identification, Firewall, and More_2
2
MANAGING IT SECURITY
The power failure can be tackled with the help of the following measure:
Power consistency.
Ensure that the server is clean from debris.
Avoid over heating of server.
Application of the raid array which helps to mirror the data over two or more disk
drives so that if one of them fails the other can replace the failed array.
Server Clustering
When is it best to use the following services?
Hot Site: It can be used in the disaster recovery service in a small scale industry (Prentice et
al. 2014).
Cold Site: The cold site will be most efficient in the organization where the clients of the
organization can partially work and resume their operations in spite of the operational
disaster.
Warm site: This kind of site is best suited for organization which can relocate their
infrastructure and provide the same service to their clients.
List and explain the possible actions that can be performed once the risk has been
identified.
The identification of any kind of operations or any other kinds of risks will lead to
analyses of the reasons behind the cause of those risks and effective strategy should be taken
so that the future risks associated with those systems can be minimized to a significant extent.
What’s the difference between a virus and a worm?
Managing IT Security: Internet Downtime, Power and Server Failure, Risk Identification, Firewall, and More_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Database Security
|5
|685
|20

Necessity of Securing Backups and Off-Site Storage
|5
|807
|305

Security
|14
|4078
|1

Assignment | Cyber Security
|23
|2174
|14

Disaster Recovery Assignment
|8
|1988
|188

The Global Trend on the Use of Social Networking Sites by Different Business Organisation across the World
|11
|3380
|76