Task 2 – Justification of plans

  I have chosen to not let my employees share their passwords because we don't want to somebody to share their work/data with somebody else. Somebody might get fired and they would maybe like to sabotage the company and use their friends account to delete all the work that has been done which means all the data would be lost and the work would have to be done over again. Which cant happened because the company is going to be behind the other companies and there will be no profit from the work. We as organization have not allowed our staff members to bring their own devices into the building such as usb sticks because they might be trying to transfer some harmful files into companies computers and try to sabotage the company and this law will help us avoid this problem. We have not allowed our staff to download stuff from their internet without our permission as if they might not know that they are downloading harmful data into the computer which would cause us a lot of money and times as if we might lose all our data and the computer might even fail which means there will be new one needed in place of the broken one. We have not allowed our staff members to show any documents to other people because we want our work to be kept private and safe. As if somebody might leak the document for the other organizations which would give them advantages as they would know what we are working on. This rule is going to help us prevent our work to get leaked on the internet. Everyone must follow health and safety rules at all times which means not eating or drinking next to computers, there will be first aid kit in every room just in case something happens and there will be health and safety rules all around the building which are meant to be kept at all times when in room or in the corridors. Also this includes risk assessments that has to be done.

Support requests:
We have included different steps that have to followed with support requests and escalation procedures. By following them steps you will be able to identify the issue with the document and fix it as soon as possible. First of all you need to identify the issue and contact the team members and project manager. Then you would have to review the issue together to find the easies
t and fastest way to fix the problem. Then you would have to escalate if the risk is serious enough to fix it instantly and spend most of the day by looking in o it or if the problem is not major and the issue is not going to affect anything. You should update the information about the issues at all times something has changes and you should work on it until the problem is fixed.

For contingency plan we have created the list that every worker must followed to be able to lists all the risks. first of all you must list all the risks. You will have to check if the risks is minor or major. If the problem is minor you will have to check fi the risks is going to affect your work. On the other hand if the problem is major you will have to fix it instantly. Then you will have to identify which risks are more important than the other ones. Then You Must create your contingency plans for the biggest risks because they might be the risks that escalate quickly and might fail your computer.



For the backup procedures there will be 3 backups available. Offline backup, Hot backup and incremental backup. All are different.
Offline backup is the easiest to perform as it involves simply copying data base log files on an offline storage area. Just simple backup of your data that should be done everyday at the end of the day to keep our work updated and safe.
Hot backup gives you a snapshot of your database. Since your application can be writing on the database at the time that the snapshot is being taken, you do not necessarily know what the exact state of the database is for that given snapshot. This backup has to be done at least once a week.

Comments

Popular posts from this blog

Task 3 – Practical