Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.4) SYSTEM SUPPORT & SECURITY - Coggle Diagram
5.4) SYSTEM SUPPORT & SECURITY
3 System Support & Security Phase
system performance
security requirements
user expectations
User Support
User Training
Training users about system changes is similar to initial training.
Help Desks
Centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
The help desk staff might have to perform the 15 following tasks
6.Explain an undocumented software feature
7.Show a user how to use Web conferencing
5.Offer tips for better operation
8.Explain how to access the company’s intranet or the Internet
4.Help a user recover damaged data
9.Assist a user in developing a simple database to track time spent on various projects
10.Answer questions about software licensing and upgrades
11.Provide information about system specifications and the cost of new hardware or software
3.Demonstrate an advanced feature of a system or a commercial package
2.Resolve network access or password problems
12.Recommend a system solution that integrates data from different locations to solve a business
1.Show a user how to create a data query or report that displays specific business information
13.Provide hardware support by installing or reconfiguring devices such as scanners, printers , network cards, wireless devices, optical drives, backup devices,and multimedia systems
14.Show users how to maintain data consistency and integrity among a desktop computer , a notebook computer, and a handheld computer or smart phone
15.Troubleshoot software issues via remote control utilities
2 Types Of Maintenance
1.Changing programs , procedures, or documentation to ensure correct system performance.
2.Adapting the system to changing requirements; and system to changing requirements; and
making the system operate more efficiently.
System Maintenance Tools
Many CASE tools include system evaluation and maintenance features,including the following examples
Network activity monitor
Workload forecasting tool
Automated documentation
3 System Security Concepts
Integrity
prevents unauthorized users from creating, modifying, or
deleting information.
Availability
ensures that authorized users have timely and reliable access to necessary information.
Confidentiality
protects information from unauthorized disclosure and safeguards privacy.
Backup and Recovery
Backup - refers to copying data at prescribed intervals, or continuously.
Recovery - involves restoring the data and restarting the system after an
interruption.