StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Server Administration Policies - Essay Example

Cite this document
Summary
This essay "Server Administration Policies" involves a comparison of five server administration policies for five institutions including Havard Medical School (HMS), The Institute of mathematical sciences (IMSc), the Oxford Street Data Center (OSDC), IRS, and Texas State University (TSU)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Server Administration Policies
Read Text Preview

Extract of sample "Server Administration Policies"

I maintain a continuous evaluation for age and bugs on its hardware and software so that in case of any issue it can be addressed on time. When it is identified that certain hardware is out of age, its disposal is done properly to ensure safety. Issues such as security breaches, loss of network links, and disk crashes are prevented through measures that are taken on an emergency footing, which is meant to avoid loss of data. The Oxford Data Center ensures the safety of its data centers by physically securing its location with card-reader door locks and monitoring it on a 24-hour basis with help of recorded video surveillance and security cameras. IRS ensures backup of all its data before making any changes to the production system. TSU has a policy compelling all servers in the university to register with IT security, which facilitates risk assessment.

With respect to security issues, HMS has a very comprehensive policy requiring each department to appoint two Information Security Administrators (LISAs), who are the only ones responsible for managing changes in the user data. LISAs are charged with removing or adding users from the server or requesting changes to data access controls. Oxford street Data Centre limits access to its data center to only the staff who are authorized to do so. IRS ensures the security of its data by requiring agencies to provide bring up to on a date, their safeguarding procedures on a yearly basis. TSU has a policy requiring the server to apply intrusion protection procedures, which suits its operating system. Also, a common security policy in most of the policies is the use of virus protection software and firewalls.

To administer change, IMSc requires documentation whenever proposals are made with respect to certain changes. Before these changes are implemented, the users and computer committee affected by these changes must be informed accordingly. The IRS requires that its Office of safeguard must be contacted by an agency before major changes are implemented – this ensures continued adherence with publication 1075. In addition, the IRS has a policy requiring the use of diagrams, design documentation, and implementation plans, which are all available for review when an agency contacts the IRS office. The Oxford Street Data Center has a very comprehensive policy providing guidelines for equipment installation. It has set some staging and racking rules that outline how customers should install new equipment in the machine room at the Data Center. These include the use of rack configurations and having heat and power consumption specifications that must meet the specified thresholds.

Step 2
MEMO
To
Randy Mott
Chief Information Officer, IBM
RE: IMPROVING DATA ADMINISTRATION
Security is the most pertinent aspect of data administration and hence it should be given a lot of weight. The security policies of the five institutions analyzed in this study do not place adequate importance in the education of user management and the custodian with extensive information regarding issues of security control affecting application systems and system users. (Window Server 12). In addition, an on-gained employee security education should be coupled with the performance of continuous security audits to detect bugs or any other issue on time. Ideally, these policies will be very critical to IBM considering its strategy to internalize its IT, which means that more employees will be required to administer the company's data, and hence they should be properly educated on issues of security (Murphy 5).

Other aspects of data administration that are also very important include change management because changes are always part of any successful company, and if strong policies are not put in place, its implementation may face a lot of challenges. To strengthen change policies, a Change Management Board (CMB) should be instituted to foresee all issues of change that affect IT. In addition, the board will serve as the governing authority for policy authorization, conflict resolution, change appeal approval, metric review, and approval for the initiation of procedures for major projects, such as the one that IBM proposes. The CMB should include members from different departments including the institution's CIO, the director of IT operations and infrastructure.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“None Essay Example | Topics and Well Written Essays - 750 words - 1”, n.d.)
None Essay Example | Topics and Well Written Essays - 750 words - 1. Retrieved from https://studentshare.org/information-technology/1468247-none
(None Essay Example | Topics and Well Written Essays - 750 Words - 1)
None Essay Example | Topics and Well Written Essays - 750 Words - 1. https://studentshare.org/information-technology/1468247-none.
“None Essay Example | Topics and Well Written Essays - 750 Words - 1”, n.d. https://studentshare.org/information-technology/1468247-none.
  • Cited: 0 times

CHECK THESE SAMPLES OF Server Administration Policies

The IPv6 Implementation and Its Configuration Plan

The Dynamic Host Configuration Protocol server will be maintaining a database that will have IP addresses as well as configuration information and the associated data.... Upon its receipt of the data requests from clients, the Dynamic Host Configuration Protocol server will be determining which of the available networks will be connected to the DHCP clients....
18 Pages (4500 words) Case Study

Public Administration

According to Max Weber's policy, public administrators must be restricted to only laid down the policies in the discharge of their duties.... The policies proposed by the government are generally common and it does not specify any external factor to tackle the problem.... They should have the rights to modify and implement the proposed policies.... Real world implementation of policies generally depends on the situation and thus the results might not be the same for every issue....
2 Pages (500 words) Essay

Health Systems Administration

n Health system administration, there is need to decide and take action on matters as allotment of space for the various medical or laboratory services, priorities for the acquire of new medical equipment, need for supplementary professional or technical personnel, ... he health system administrators have full responsibility for planning, directing, organizing, coordinating, and controlling overall administrative operations The Health System Administrator at this Level directs a full range of administrative services including fiscal, personnel, supply, engineering, medical records administration, and hospital housekeeping....
3 Pages (750 words) Essay

Windows Server 2008 Deployment

The paper "Windows server 2008 Deployment" insists disaster recovery plan is an important factor in managing any server infrastructure.... The blue sky is a business that uses Windows XP, Windows7, and Windows server 2003 operating systems to provide information technology (IT) services throughout the organization.... The migration to server 2008 will help the business meet its requirements.... This is because server 2008 is flexible, secure, and has scalable server management....
4 Pages (1000 words) Case Study

Administrative Decision Making & The Constitution at Work

The dichotomy theory did not intend to threaten those in power because it ensured that politicians would make relevant policies and other related decisions whilst the administrator would be the person in charge of implementing the made policies.... In the past, public administration performed in public organization which was only in the grounds of accounting instead of, the actual performance of implementing existing policies.... The public administrators have defined roles of ensuring the set policies by politicians are followed to the letter....
2 Pages (500 words) Essay

Microsoft ISA Server

Other than that, the Policy-based administration, Virtual Private network support, Proxy Server, Web Cache, and Dynamic IP filtering are other functions or tools that ISA Server provides.... The paper "Microsoft ISA server" studies threats of the IT world due to increasing theft and hacking.... The backdrop of these concerns is the evolution of the ISA server.... Microsoft is one of the biggest manufacturers of operating systems but this company is trying to present itself as one of the leading provider of complete IT solutions concerning business besides providing operating systems so, they came up with Internet Security and Acceleration server (ISA server)....
10 Pages (2500 words) Case Study

Importance of Database in Business Administration

The paper "Importance of Database in Business administration" highlights that many developing nations have reaped huge economic benefits through procuring outsourced businesses activities.... Broadly, databases can be of two types: desktop and server-based databases.... server databases are based on multi-user applications and are based on mechanisms that promote reliability and data consistency....
15 Pages (3750 words) Essay

Server Security Management

Once group policies and domain/user rights have been set by the administrator, the user will typically customize his/her account to suit his/her preferences.... he use of group policy administration is the easiest way to implement administrative policies.... The paper "server Security Management" suggests that Network administrators need to have a way of putting in place controls to help them manage the users of computer systems as well as network resources....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us