IT Infrastructure Management Report: Forensic Analysis and Policy

Verified

Added on  2020/05/11

|3
|784
|79
Report
AI Summary
This report delves into the critical aspects of IT infrastructure management, beginning with a forensic analysis of a computer, emphasizing the importance of isolating the device and creating a copy of the storage data for examination of deleted, encrypted, and corrupted files. The report highlights the necessity of reviewing unallocated disk space and slack space, aligning with ethical considerations and logical file structure review precedents. It emphasizes the need to record system time and date accurately, acknowledging potential time drift and the importance of comparing system time with a reliable source. The report also addresses IT security policy, including legal elements such as Information Security Policy, E-mail rules, and relevant legislations. The role of a system administrator is examined, emphasizing the legal implications, including Freedom of Information, Privacy and Electronic Communications Regulations, and Copyrights. The report concludes by outlining the implementation of regulations through a holistic approach, documentation of system errors, and the integration of smartphones and e-learning in the college setting, alongside the maintenance of a formal log book for security.
Document Page
Running Head: IT INFRASTRUCTURE MANAGEMENT 1
IT Infrastructure Management
<Student ID>
<Student Name>
<University Name>
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT INFRASTRUCTURE MANAGEMENT 2
The forensic analysis of a computer would have to be initiated with the physical
isolation of the device and making a copy of the storage data of the device. The copy of the
data is examined and unallocated disk space that helps in obtaining copies of deleted,
encrypted and corrupted files. Then reason for adopting this method could be established on
the grounds of the acceptance of these methods on ethical basis (Bailey, 2015).
It is always necessary to review the unallocated disk space and slack space since
logical file structure review precedents indicate that when potential evidence like the laptop is
found, the address on its hard drive should be recorded (Iden & Eikebrokk, 2014). The logical
addressing scheme considered in this review also includes the mandatory guidelines for
recording the physical address of any form of evidence that also includes references to sector
and cluster addresses.
The first entry in the log book would be to record the system time and date. This
process has to be initiated carefully since PC operating systems are not able to keep an
accurate record of time. Therefore the time on the computer could drift thereby it could be
accomplished through interpreting the margin of this drift so that the file access times could
be obtained (Jabbouri, et al., 2016). This process was also characterized by recording the time
and date as obtained through the operating system reports and comparing it with data from
reliable source which can be identified from the time sync server. The final stage in this event
was to document the timeserver which was used.
The IT security policy would include legal elements such as Information Security
Policy, E-mail rules, E-mail filtering, Consequences of IT service abuse, Retrieval of
Employee E-mail and Relevant Legislations. These documents would be provided to
employees in the form of documented reports of these legal aspects covered by the policy of
the organization. Furthermore these documents would have to be associated with substantial
support from the web pages facilitated by ICT Management alongside improving the
regulations on IT security (Shibambu & Ditsa, 2017).
As a system administrator in the college, I have to ensure a formal impression of the
legal implications of my job since it would help me in aligning organizational performance
with ethical and legal responsibilities. The legal aspects pertaining to Freedom of
Information, Privacy and Electronic Communications Regulations, Copyrights, Designs and
Patents, Equality, Computer Misuse, Official Secrets would have a potential impact on my
job with respect to computer security. The actions which I would take in order to implement
Document Page
IT INFRASTRUCTURE MANAGEMENT 3
these regulations would involve a holistic approach wherein I would be able to learn the
comprehensive aspects of regulations and laws associated with computer security in a
professional environment (Jabbouri, et al., 2016). Documentation of system errors and
frequent maintenance of hardware would be the formal priority of my job as a system
administrator. The use of smartphones and e-learning methods in the college would also have
to be included as a significant dimension in my job role. I would ensure to maintain a formal
log book for the security of individual departments in the college alongside complying with
the legal aspect related to computer privacy and security.
References
Bailey, S. M. (2015). Information technology service management frameworks: A study of it
processes and their relationship to the Information Technology Infrastructure Library
(ITIL) (Doctoral dissertation, Capella University).
Iden, J., & Eikebrokk, T. R. (2014). Exploring the relationship between information
technology infrastructure library and process management: theory development and
empirical testing. Knowledge and Process Management, 21(4), 292-306.
Jabbouri, N. I., Siron, R., Zahari, I., & Khalid, M. (2016). Impact of Information Technology
Infrastructure on Innovation Performance: An Empirical Study on Private Universities
In Iraq. Procedia Economics and Finance, 39, 861-869.
Shibambu, A., & Ditsa, G. (2017). Analysis of Information Technology Infrastructure
Towards Improving Services in the Public Sector. Journal of Information Technology
and Economic Development, 8(1), 33.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]