IT Security and Support: Automation, Technologies, and Coverage
VerifiedAdded on 2020/04/15
|9
|1524
|32
Report
AI Summary
This report, titled "Security and Support in IT," delves into the critical aspects of IT infrastructure and operations. It begins by exploring automation as a means to achieve uniformity in IT processes, highlighting its benefits and implementation strategies. The report then examines technologies used in server computers to improve reliability, availability, and performance, emphasizing the importance of hardware selection and various techniques like server clustering. It also defines the scope of coverage for helpdesk operations, detailing the 'what' and 'who' of support services. A significant portion of the report is dedicated to the role of trusted certificate authorities in establishing secure communication, particularly between the IT department and students. The report concludes with a discussion on authentication for announcements and summarizes the key findings regarding automation, technology, helpdesk operations, and secure communication, offering a comprehensive overview of IT security and support.

Running head: SECURITY AND SUPPORT IN IT
SECURITY AND SUPPORT IN IT
Name of the Student
Name of the University
Authors Note:
SECURITY AND SUPPORT IN IT
Name of the Student
Name of the University
Authors Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2SECURITY AND SUPPORT IN IT
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Automation for Uniformity..........................................................................................................3
Technologies used in server computers for improving reliability, availability and performance4
Scope of coverage for helpdesk operation...................................................................................4
Trusted certificate authority for establishing secure communication..........................................5
Role it plays in achieving secure communication between IT department and students.............5
Authentication for announcement................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Automation for Uniformity..........................................................................................................3
Technologies used in server computers for improving reliability, availability and performance4
Scope of coverage for helpdesk operation...................................................................................4
Trusted certificate authority for establishing secure communication..........................................5
Role it plays in achieving secure communication between IT department and students.............5
Authentication for announcement................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7

3SECURITY AND SUPPORT IN IT
Introduction
Automation is nothing but the use of various control system like computer or robots and
various information technologies like computers or robots and other technologies related to
information (Stephens, and Didden, 2013). It will be used for handling various process and
machines in various industry which will replace human being in the coming future.
In the coming pages of the report the full idea regarding automation for uniformity has
been provided. After that proper solution has been provided regarding it. The reason behind the
implementation of fully automatic system has been provided in the coming pages of the report.
Various technologies have been discussed which will help in improvisation of reliability,
availability and performance related to it.
Discussion
Automation for Uniformity
Automation is nothing but the use and creation of technology and its application so that it
provides control and monitoring the production of various goods and services. Automation
generally helps in achieving productivity and uniformity of products. It works in a way or
process which is similar to worker which can provide service (Inventory, 2012). Longer
production hour ensures that various products can be easily produced in minimum time. They
robots incorporated in the system can easily produce a product which is consistent and uniform.
Human being is more prone to error and products which are not uniform can reduce the overall
productivity.
Introduction
Automation is nothing but the use of various control system like computer or robots and
various information technologies like computers or robots and other technologies related to
information (Stephens, and Didden, 2013). It will be used for handling various process and
machines in various industry which will replace human being in the coming future.
In the coming pages of the report the full idea regarding automation for uniformity has
been provided. After that proper solution has been provided regarding it. The reason behind the
implementation of fully automatic system has been provided in the coming pages of the report.
Various technologies have been discussed which will help in improvisation of reliability,
availability and performance related to it.
Discussion
Automation for Uniformity
Automation is nothing but the use and creation of technology and its application so that it
provides control and monitoring the production of various goods and services. Automation
generally helps in achieving productivity and uniformity of products. It works in a way or
process which is similar to worker which can provide service (Inventory, 2012). Longer
production hour ensures that various products can be easily produced in minimum time. They
robots incorporated in the system can easily produce a product which is consistent and uniform.
Human being is more prone to error and products which are not uniform can reduce the overall
productivity.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4SECURITY AND SUPPORT IN IT
In my case I will implement a fully automation for this system help it reduce my burden
of individually looking into the systems. In the beginning it can have issues but with the passage
of time it will decrease slowly.
Technologies used in server computers for improving reliability, availability and
performance
Improvisation of server reliability begins with careful choice of server hardware and
features related to it. The administrator should start selecting server with proper power supplies.
There are many other techniques like making use of multiple network interface ports (Zissis and
Lekkas, 2012). There are many other approach for server reliability which is making use of
server cluster.
Availability of a system means that system is on-line and it can be easily accessed. The
goal of high availability is to reduce and minimize the time which is needed for recovering form
outage (Bauer and Adams, 2012). The goal of achieving high availability solution is to minimize
the downtime and also focuses to minimize the time required for downtime and time required for
recovering from recovering from issues.
Performance of a system can be easily increased by following various steps like
Removing malware from the system.
Upgrading the system to a better video card.
Having a faster drive.
Solving various issues related to hardware and driver.
Removing junk files from the system.
Analyzing the network connectivity on timely basis.
In my case I will implement a fully automation for this system help it reduce my burden
of individually looking into the systems. In the beginning it can have issues but with the passage
of time it will decrease slowly.
Technologies used in server computers for improving reliability, availability and
performance
Improvisation of server reliability begins with careful choice of server hardware and
features related to it. The administrator should start selecting server with proper power supplies.
There are many other techniques like making use of multiple network interface ports (Zissis and
Lekkas, 2012). There are many other approach for server reliability which is making use of
server cluster.
Availability of a system means that system is on-line and it can be easily accessed. The
goal of high availability is to reduce and minimize the time which is needed for recovering form
outage (Bauer and Adams, 2012). The goal of achieving high availability solution is to minimize
the downtime and also focuses to minimize the time required for downtime and time required for
recovering from recovering from issues.
Performance of a system can be easily increased by following various steps like
Removing malware from the system.
Upgrading the system to a better video card.
Having a faster drive.
Solving various issues related to hardware and driver.
Removing junk files from the system.
Analyzing the network connectivity on timely basis.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5SECURITY AND SUPPORT IN IT
Scope of coverage for helpdesk operation
A help desk is zone where consumer or customer can easily have answer regarding their
queries related to computing, put their respective problems and provide solution regarding it. A
helpdesk can be either online or physical thing but should provide and have defined scope of
coverage regarding it (Madsen et al., 2013). Scope of coverage must properly define that what is
support provided by it and who will be supported by this, time interval for which the support will
be provided.
What: The beginning of coverage is at what which primarily focuses on problems related
to PCs, Network, specific operating system and application and how it can provide support to
platform.
Who: Second scope of coverage is the who behind it, which will provide support
regarding department, buildings and many other.
Trusted certificate authority for establishing secure communication
Certificate Authorities or CA generally issues various digital certificates. Digital
certificate is nothing but small data files which are needed to be verified. It contains some
credentials which can help website, people and devices which are generally represent the
authentication about various online identity (Space, 2012). CA plays a key role on the method of
operation of Internet and the transparency of trusted transaction which can takes place on the
internet. CA faces a large number of issues related to digital certificates which are mainly used
for protection of information, encrypting large number of transaction and providing secure
communication to large number of transaction which will ultimately help in establishing secure
and proper communication (Vratonjic et al., 2013).
Scope of coverage for helpdesk operation
A help desk is zone where consumer or customer can easily have answer regarding their
queries related to computing, put their respective problems and provide solution regarding it. A
helpdesk can be either online or physical thing but should provide and have defined scope of
coverage regarding it (Madsen et al., 2013). Scope of coverage must properly define that what is
support provided by it and who will be supported by this, time interval for which the support will
be provided.
What: The beginning of coverage is at what which primarily focuses on problems related
to PCs, Network, specific operating system and application and how it can provide support to
platform.
Who: Second scope of coverage is the who behind it, which will provide support
regarding department, buildings and many other.
Trusted certificate authority for establishing secure communication
Certificate Authorities or CA generally issues various digital certificates. Digital
certificate is nothing but small data files which are needed to be verified. It contains some
credentials which can help website, people and devices which are generally represent the
authentication about various online identity (Space, 2012). CA plays a key role on the method of
operation of Internet and the transparency of trusted transaction which can takes place on the
internet. CA faces a large number of issues related to digital certificates which are mainly used
for protection of information, encrypting large number of transaction and providing secure
communication to large number of transaction which will ultimately help in establishing secure
and proper communication (Vratonjic et al., 2013).

6SECURITY AND SUPPORT IN IT
Role it plays in achieving secure communication between IT department and students
Trusted certificate authority plays a key role in establishing secure communication
between IT department and students. Certificate authorities generally issues certain digital
certificates. An SSL certificate is a popular kind of digital certificate which helps in binding
details of web server for providing cryptographic keys (Mansour et al., 2014). These keys are
generally used in SSL/ TLS protocol for establishing a secure communication between browser
and web server which mainly help in hosting SSL certificate. SSL certificate must contain the
name of the domain of the website which will be used and this is generally issued by CA which
are trusted and does not have any expiry date.
Authentication for announcement
Browser, OS and mobile devices plays a key role in making authorization CA
membership programs where it easily has membership programs which can be easily accepted as
a programs. After that CA contain some problems which provides problems regarding SSL
certificate (Zissis and Lekkas, 2012). Before issuing a digital certificate CA will conduct analysis
which can easily identify the applicant. A domain related SSL certificate can easily have
ownership of domain which is being provided within given certificate.
Conclusion
From the above discussion it can be easily concluded that automation helps in achieving
uniformity. Automation is method or technique which is used for innovating technology and its
application for achieving control and monitoring of various goods and services related to it.
Different technologies which are used for improving reliability, performance and availability has
been discussed in the above pages of the report. After that summarization of scope of coverage
of help desk operation has been provided. The importance of trusted certificate authority for
Role it plays in achieving secure communication between IT department and students
Trusted certificate authority plays a key role in establishing secure communication
between IT department and students. Certificate authorities generally issues certain digital
certificates. An SSL certificate is a popular kind of digital certificate which helps in binding
details of web server for providing cryptographic keys (Mansour et al., 2014). These keys are
generally used in SSL/ TLS protocol for establishing a secure communication between browser
and web server which mainly help in hosting SSL certificate. SSL certificate must contain the
name of the domain of the website which will be used and this is generally issued by CA which
are trusted and does not have any expiry date.
Authentication for announcement
Browser, OS and mobile devices plays a key role in making authorization CA
membership programs where it easily has membership programs which can be easily accepted as
a programs. After that CA contain some problems which provides problems regarding SSL
certificate (Zissis and Lekkas, 2012). Before issuing a digital certificate CA will conduct analysis
which can easily identify the applicant. A domain related SSL certificate can easily have
ownership of domain which is being provided within given certificate.
Conclusion
From the above discussion it can be easily concluded that automation helps in achieving
uniformity. Automation is method or technique which is used for innovating technology and its
application for achieving control and monitoring of various goods and services related to it.
Different technologies which are used for improving reliability, performance and availability has
been discussed in the above pages of the report. After that summarization of scope of coverage
of help desk operation has been provided. The importance of trusted certificate authority for
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7SECURITY AND SUPPORT IN IT
establishment of secure communication has been provided. The role played by trusted certificate
authority for establishment of secure communication between IT department and students has
been provided in the above pages of the report. The guarantee of authentication for any
announcement has been provided in the report.
establishment of secure communication has been provided. The role played by trusted certificate
authority for establishment of secure communication between IT department and students has
been provided in the above pages of the report. The guarantee of authentication for any
announcement has been provided in the report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8SECURITY AND SUPPORT IN IT
References
Bauer, E. and Adams, R., 2012. Reliability and availability of cloud computing. John Wiley &
Sons.
Inventory, F.N.A., 2012. Department of Natural Resources. Guide to the natural communities of
Florida.
Madsen, H., Burtschy, B., Albeanu, G. and Popentiu-Vladicescu, F.L., 2013, July. Reliability in
the utility computing era: Towards reliable fog computing. In Systems, Signals and Image
Processing (IWSSIP), 2013 20th International Conference on (pp. 43-46). IEEE.
Mansour, H.A., Sabreen, K., Pibars, M., El-Hady, A. and Eldardiry, E.I., 2014. Effect of water
management by drip irrigation automation controller system on faba bean production under
water deficit. International journal of geomate, 7(2), pp.1047-1053.
Space, N.O.V.A., 2012. Mission automation and autonomy: In-flight experience derived from
more than 8 years of science operations in orbit about mars.
Stephens, A. and Didden, M., 2013. The development of ICT Sector Guidance: rationale,
development and outcomes. Hilty et al.(2013), pp.8-11.
Vratonjic, N., Freudiger, J., Bindschaedler, V. and Hubaux, J.P., 2013. The inconvenient truth
about web certificates. In Economics of information security and privacy iii (pp. 79-117).
Springer, New York, NY.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems, 28(3), pp.583-592.
References
Bauer, E. and Adams, R., 2012. Reliability and availability of cloud computing. John Wiley &
Sons.
Inventory, F.N.A., 2012. Department of Natural Resources. Guide to the natural communities of
Florida.
Madsen, H., Burtschy, B., Albeanu, G. and Popentiu-Vladicescu, F.L., 2013, July. Reliability in
the utility computing era: Towards reliable fog computing. In Systems, Signals and Image
Processing (IWSSIP), 2013 20th International Conference on (pp. 43-46). IEEE.
Mansour, H.A., Sabreen, K., Pibars, M., El-Hady, A. and Eldardiry, E.I., 2014. Effect of water
management by drip irrigation automation controller system on faba bean production under
water deficit. International journal of geomate, 7(2), pp.1047-1053.
Space, N.O.V.A., 2012. Mission automation and autonomy: In-flight experience derived from
more than 8 years of science operations in orbit about mars.
Stephens, A. and Didden, M., 2013. The development of ICT Sector Guidance: rationale,
development and outcomes. Hilty et al.(2013), pp.8-11.
Vratonjic, N., Freudiger, J., Bindschaedler, V. and Hubaux, J.P., 2013. The inconvenient truth
about web certificates. In Economics of information security and privacy iii (pp. 79-117).
Springer, New York, NY.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems, 28(3), pp.583-592.

9SECURITY AND SUPPORT IN IT
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



