Sunday, February 24, 2019
Organisation and Control of Computer Operations Essay
The organisational structure of the comp whatsoever is sooner straight forward and to the point and easy to down the stairsstand. The comp sever tout ensembley is split into 2 departments the cypher department and Contracts team. Taira Zeb is the over entirely is the director of the comp whatever.Martin Gates is the fascinate Manager of the daily operations team. He liaises with other companies to A2z spark Uk Ltd shtup support when they book with them. He explains to companies what special rates they can finisher them if they book association or company booking outings. If the Companys or associations be happy to sign any contract or booking with A2z Travel Uk Ltd he passes the satisfy details to the contract passenger car make them sign a contact or booking. The people plant life in Martin Gates team each(prenominal)ow in * Wendy Gates (Contracts Manager) the of import intent of Wendy Gates is to potent contracts and bookings excessively introduce discount und er the control of Martin Gates the Transport Manager.* Sandeep Uppal (Health & Safety Manager) Bashir deals with health and justty issues inside the company, and also li baron issues whilst vehicles are in hire by companies and groups.* Mohammed Zafreen (Head Mechanic) deals with the vehicles checking them on a periodical basis checking for problems before they go to the outing it is booked for. Mohammed Zafreen is bitch of checking if the all transport coaches are safe to drive on roadstead and all the paper tap is up to date for example MOT, political machine Tax before they are let out. Mohammed Zafreen also deals with daily alimony for vehicles when he has the time to do so.* Asan Fazal ( service Mechanic) deals with daily maintenance of the coaches on a daily basis.* Sandeep Uppal (Health & Safety Manager) Sandeep Uppal deals with health and safety issues deep down the company, and also liability issues whilst its coaches are in office by A2z Travel Uk Ltd* Julia Wilson (Health & Safety Co-ordinator) -Julia Wilson works under Sandeep Uppal and deals with training in-house cater on health and safety issues under the guidance of Sandeep Uppal.The computing department is run by Asian Fazal who is the IT Manager. He deals with overall matters regarding hardware and electronic information processing system bundle program requirements for A2z Travel Uk Ltd, and is involved with all purchasing of hardware and computer bundle product but before funds can be released to him the director ingrained be with agreement with him. The people working in Asan Fazal team include* Ahmed Hussain (Technician) -Tony deals with maintaining hardware/software with the company and resolve any network problems.* Andrew Dales (IT protective covering Manager) deals with surety producers and deals with viruses and capture creped thought the network.* Praveen Patel (Backup Manager) responsible for do sure all selective information has been acanthaed up successfully the funding manger responsibilities ensure all backups are done daily and weekly basis and enforce backup procedures with in the company. The backup manager essential ensure all backups unbroken in a safe draw a bead on in a divergent pickle if for example all information was lost due to fire.* Wajid Gahni (Database Administrator) responsibilities include, informationbase design, co-ordination and use of info integrity, up keep of info, and data maintenance to see if the data passed thought the database is not garbage.* Azard Amera ( earnest Assistant) she deals with daily tribute measure issues or assumption daily task to complete by the IT auspices measure Manager* Frank Dean (Backup Assistant) responsible for computer backup up data on a daily basis every evening and reports back to the backup manager if he occurs any problems. He leave alone contact the backup manager when a daily backup is coThe Structuring 0f work out Jobs Within The Organisation .IT Department StructureIT Manager Asan FazalAsian Fazal in A2Z Travel UK Ltd is of that to give support and guidance to the IT department on all computing issues within the organisation also chasing up things that the IT department need to do.Asian Fazal is responsible for work on internal projects and teams such as IT security department policies, hardware, software and backup policies. Asian Fazal has to enforce see policies otherwise at that place could be major Problems within the company.His job involves analyzing security requirements, evaluating safeguards, vulnerabilities, threats also opportunities.Asian Fazal job entails * Identify integration issues and develop solutions of computing brasss within the company.* motorcoach and develop skills within a project team.* Lead project teams within the computing department.* Run the IT department to the highest standard.IT Security Manager Andrew DalesAndrew Dales is responsible for all IT security integration issues withi n the computing network in the company, which include data Protection act, data processor misuse act, IT security and privacy. Andrew Dales to deal with security breaches that has interpreted place also making high security guess into a low security risk.Andrew Dales ensures all passwords are apply coherently and in accordance to the A2Z Travel UK Ltd IT Security and privacy policies.Andrew Dales deals with any seen or reported act of computer misconduct, and she ensures the companys regulations of carrying out these procedures.Security Assistant Azard Amera Azard Amera job involves assisting the Security Manager in security tie in issues. Azard Amera keeps on top of all the latest security, and virus software. Azard Amera has a contestation of jobs to do on a daily basis that he essential complete. Azard Amera can take over the security manager role if he is sick or he can not attend for workTechnician Tony SeagullTony Seagull who is the company technician manages, maintain s and supports the companys fundamental IT infrastructure. He is also responsible for the development of a completion of training programs for the users of the computer systems within A2Z Travel UK Ltd.Tony regularly comes to check the computers in working rank on a weekly basis are as well(p) as coming. He is also responsible for the hardware and software problems and any network issues that arrive.When the organisation decides to upgrade any of the hardware or software used the technician is responsible for carrying with the backup assistant if the work load is besides much for him. The technician inputs ideas for what the company needs to the IT manager.Backup Manager Praveen PatelPraveen Patel is responsible for backing up of all data used within the system. Back ups are carried out on a daily basis. (Every evening) These back ups are stored at the main site location. Weekly back ups are also interpreted from the system, these back ups are taken to a make location off site. This is done so that if data is lost or corrupt at the main site, only a weeks worth of data is lost.Backup Assistant Frank DeanFrank Dean is responsible for backing up data on a daily basis, and ensuring all security procedures are met.Database Administrator Wajid Gahni As the database administrator Wajid Gahni has the responsibility and the role of Co-ordinating the use of data in database management systems. Providing support to the other departments. Any changes made to the database must be approved by DBA. Controlling access, performance, monitoring and tuning of the database. running(a) with other computing team members to make sure the database is working to the highest performance. This DBA gives different users different access rights to the system The DBA resolves disputes that can occur with the Database. silence and SecurityPrivacyPrivacy is the claim for individuals to be left alone, free from management or interference from other individuals, organisations or the state.(P59 lauden and lauden.)A2Z Travel.org has about 10 computers, which they use to keep personal data about all drivers, coaches, routes and customers. and then all access to customers and module information within the company is restricted to those authorised to see it.There are formal procedures that are followed for the storage allocation of access rights to users such as using a secure password, never telling anyone your password, changing passwords regularly and making sure that no staff members write their passwords down, such data should be memorised. At A2Z Travel.org a iodine password is used so that users can logarithm on to the system, this is secure as only members of staff eat authority can log on to the system.An improved way of using passwords would be to assign each user with their own unique user name and password so that all unauthorised access is prevented. These passwords should be confidential and users removed from the system they leave the company. The company plan to implement a more(prenominal) secure password system in the near future to improve security. The use of data encryption would also be of great benefit to A2Z Travel.org, as this would prevent any data being accessed from any other software applications, this would also be prerequisite when setting up individual unique passwords to access the system.Privacy SoftwareThe most interesting thing that we form out while we were at A2Z Travel International was that the two directors, have their own computers, which they work on.The computers have a lot of software installed on it but the most interesting software that we found installed on the computers was the Privacy Guardian 3.2 for Windows.When we asked the directors why they only have this installed on their computers they told us apparently because they do not want anybody to know which internet sites they use and visit. plainly this is something to do with the contracts they have with other companies.The direc tors admitted that occasionally they would location the contents on colleagues hardware, including cache, cookies, index.dat and history.Privacy Guardian ensures that all traces of Internet and computer activities are permanently erased and unrecoverable from the PC.Privacy Guardian is a safe and easy-to-use privacy security department tool that securely deletes online Internet tracks and program natural process records that are stored in your browser and other hidden files on your computer.SECURITYThe Security of a system is a combination of its ability to support* System Availability* Data Integrity* Data ConfidentialityIt is essential that all information must be saved against unauthorised access, thieving and physical damage. Access to data should only be allowed to members of staff with authority, in that respect might also be certain levels of security so that accompaniment members of staff can only access certain data. Therefore all data in A2Z Travel.org is kept in a secure locked topographic point, with bound access. Backups of data are also kept on secure location off site for security reasons.Data protection act The main objectives of the act are to make sure that any personal data stored in any computer related to a member of staff is accurate, used for only the purpose registered, kept up to date, and only visible(prenominal) to those who are entitled to use the data. Any member of staff whitethorn ask for a copy of the data held in their record. It is a legal requirement to meet with the data protection act in any organisation, staff are also made aware of this and are given a copy of the companies data protection policy when they are recruited.CCTV A2Z Travel.org is a 24-hour coach service and therefore all gates are kept opened for drivers to enter and emerge, and so the need for CCTV is essential. CCTV is also used within the office this can help to audit users activities on p.cs. For instance if there was a problem experienced an d it could not be confined to a particular member of staff the CCTV system could be used to view who was using the system at a particular time.There is CCTV primed(p) in several places such as inside and outside the office and in the coach yard where the coached are parked.Equipment security In devote to minimise the loss or damage the equipment within the company is protected from security threats and environmental hazards.Regular backup copies of data are taken on a daily basis, which is done by Charles Stewart (Backup Assistant).Master software and backup data diskettes are kept in locked cabinets when not in use and they are also stored in a different location. It is rattling for master copies to be kept elsewhere as data that is debauch or destroyed in case of fire or theft, which will result in losing weeks/months of work, cannot always be replaced.Any computer is at risk from damage or theft. Theft is becoming more and more common amongst companies and organisations. To avoid losing thousands of pounds on buying more equipment to replace the ones that have been damaged or stolen, A2Z Travel international have insured all their equipment in the company. This insurance cover will compensate for the repair or replacement of the equipment and software. The use of security ties and lock help to protect the companies hardware, this is necessary as a look of drivers are continuously entering and acclivitous from the office.Security tags are also used on all of the hardware so that the equipment is identifiable in the event of theft or loss. every of the equipment is also registered with the manufacturer so that they are identifiable from the serial number. To throw out improve security the use of metal casings and security locks on devices such as printers to prevent any other member of staff apart from the technician from changing consumables etc, this helps maintain equipment as members of staff without I.T cognition may damage the equipment when a ttempting to change consumables etc.Viruses A large risk faced by A2Z Travel.org is the possibility of downloading or receiving counterproductive viruses. There are a number of ways in which it is possible to contract a virus including the use of floppy disks, downloading data from the Internet or email. To reduce these risks it is the role of the I.T security manager to have an up to date anti virus software subscription. Even more important is the task of regularly updating this software as new viruses are regularly generated. Another security flavor taken by the organisation is to implement firewalls on all of the P.Cs used within the company. This helps to protect data and filter out any harmful files.The role of the technician includes updating all of this software and carrying out regular checks on all of the computers. Another precaution taken by the company involves completing regular windows updates on all machines used within the company. This keeps all Microsoft softw are up to date so that there is less risk of espial any viruses or experiencing any problems with any software.Technical Security This considers the security requirements, which are related to the technology within A2Z Travel.org in particular IT networks, systems and equipment. Topics that are involved includeHacking This is an act to penetrate computer systems to gain knowledge about the system and how it works. A hacker is someone who is interested in computer programming and things that are related to the technical side of a computer. The damage a hacker can do is change a password so legitimate users are denied access, can smuggle some other program onto the P.C, can steal credit numbers to obtain goods and serve and can crash a system. A2Z Travel.org uses up to data virus protection and Microsoft firewall applications to prevent any unauthorised access to the system.Bibliographyhttp//www.indianest.com/computing/security/020.htmhttp//www.itbusinessedge.comhttp//www.etechb. co.uk/ learning/Docs/Technician_Phase1-summary.pdfCarroll, John Millar, (1987), Computer Security 2nd Edition,http//www.iseek.org/sv/13000.jsp?id=100047http//www.informationcommissioner.gov.uk/eventual.aspx?id=34http//www.pctools.co.uk/privacy-guardianhttp//mtechit.com/concepts/security.htmlhttp//www.pctools.co.uk/privacy-guardian
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment