I attached the previous 4 labs. I need lab 5 now. 1.5 page is enough. Make sure you read the other labs because they all are connected. due in 10 hours. No Plagiarism. Security Operations – Week #5 La
Step 4: Develop the Systems Management section of your ISP
Information and technology are gaining tremendous momentum and earning a spot in the necessity in the factors of production. Thinking of business, IT is no longer an afterthought activity. The goal of maintaining the balance between the users and the administrator System Management is fundamental. The aspect of information technology infusion has been a crucial component of this endeavor of system planning and management strategies to gain a competitive advantage in business operations. This paper discusses the system management of ISP concerning the administrator and the user responsibilities delegated to them.
Authentication and Encryption
This involves using common language that is understood by the administrator and the recipient user of the systems. It provides identification so that no confusion is involved during the execution of functions. Authentication is a definite way of proving the gatekeeper that you are using the right information to access the systems. Encryption transforms data into what seem to be authentic to meaning data. It can be used to process the data or reverse the data (Page & Tonry, 2019). Authentication and encryption both are systems that use some secret to safeguard the information. However, the encryption is more complicated since it uses the secret passwords called Keys to encrypt and decrypt data. The user must possess the right password so that the administrator can recognize them to allow them to access their data.
System Administrator Responsibilities
The System Administrator is the person who is commissioned with setting systems, maintaining, installing, monitoring the performance of the systems configuring the networks and software as well as hardware. The administrator should ensure a smooth streamline for the IT infrastructures. It is the system administrator's work to manage the users by setting the ways to identify their entry to the system; if the order is intruding, they are responsible for countering attack the intrusion before it messes up with the data saved in the systems (Logan, 2020).
User Responsibilities
every community is governed by the law that harmonizes their operations, so the system's users are governed by rules, and they are responsible for the maintenance and integrity of the arrangements. Users are responsible for guarding and honoring other users' rights. The users are also responsible for honoring the integrity of the system. Adhering to the laws governing operations is also the responsibility that users should observe keenly. Users should also safeguard their entry keys, passwords, and secrets information that can be used by strangers to alter the system's operations (Page & Tonry, 2019).
Auditing
These are the activities that are involved in the evaluation of systems to assess its effectiveness and efficiency to the users and the administrator to enable the involved parties to achieve their goals and objectives. There are different types of audit; adequacy audit is the type of inspection that examines the range to which the documented systems, represented manually, work intrusions, and files match the required standard for the operations. A compliance audit is carried to find out the extend of implementation of the documented system and observe in the organization. Others are external audit and extrinsic audit (Page & Tonry, 2019).
Configuration
It is the process of keeping the computer systems and software performing in better ways that are desirable and consistent. It prevents users from making changes, either small or big that go unfiled or undocumented (Logan, 2020). If an undocumented change happens across the systems, there are chances that the system will experience instability. With the configuration, it is easier to track the states of the service's existence all the time. The configuration enables an accurate replication environment where the right setting since the system administrator knows what originally was in place (Logan, 2020). Configuration can be done automatically to affect the process.
References
Logan, P. Y. (2020). Crafting an undergraduate information security emphasis within information technology. Journal of Information Systems Education, 13(3), 3.
Page, M. G., & Tonry, R. M. (2019). "System and method for securing embedded controller communications by verifying host system management mode execution." U.S. Patent No. 10,289,832. Washington, DC: U.S. Patent and Trademark Office.