Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.4 System Support & Security - Coggle Diagram
5.4 System Support & Security
System Support & Security Phase
• Managing systems support and security involves three main concerns:
– user expectations
– system performance
– security requirements .
• Successful, robust systems often need the most support
• In most organizations, more than half of all IT department effort goes into supporting existing systems
User Support
• Companies provide user support in many forms, including user training and a help desk to provide technical support and assistance.
User Training
User Training Package.
Depending on the nature of the changes,
the package could include online support via e-mail, a special Web site, a revision to the user guide, a training manual supplement, or formal training sessions.
Training users about system changes is
similar to initial training.
The main objective is to show users how the
system can help them perform their jobs.
Help Desks
A help desk is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
A help desk has three main objectives:
Show people how to use system resources more effectively,
Provide answers to technical or operational questions
Make users more productive by teaching them how to meet their own information needs.
A help desk can boost its productivity by using remote control software, which allows IT staff to take over a user’s workstation and provide support and troubleshooting.
Types Of Maintenance
Maintenance activities include:
Changing programs, procedures, or documentation
to ensure correct system performance.
Adapting the system to changing requirements; and making the system operate more efficiently.
System Maintenance Tools
Many CASE tools include system evaluation and maintenance features, including the following examples:
• Performance monitor that provides data on program execution times
• Program analyzer that scans source code, provides data element cross-reference information, and helps evaluate the impact of a program change
• Interactive debugging analyzer that locates the source of a programming error
• Reengineering tools
• Automated documentation
• Network activity monitor
• Workload forecasting tool
System Security
• System security refers to protecting the system from theft, unauthorized access and changes, and accidental or accidental harm. In automated systems, security involves protecting all the parts of computer system which includes data, software, and hardware. systems security includes system privacy and system integrity.
• System privacy deals with protecting people systems from being accessed and used without the permission/information of the concerned individuals
BACKUP AND RECOVERY
• Backup refers to copying data at prescribed intervals, or continuously.
• Regular backup of databases daily/weekly depending on the time criticality and size
• Incremental back up at shorter intervals.
• Backup copies stored in secure remote place particularly necessary for disaster recovery
• Duplicate systems run and all transactions mirrored if it is a very critical system and cannot tolerate any disruption before storing in disk
• Recovery involves restoring the data and restarting the system after an interruption.