0% found this document useful (0 votes)
4 views13 pages

GROUP 7 Fieldwork

Group 7 conducted fieldwork at the CUT campus security control room, identifying several issues with outdated computer systems that affect performance, security, and connectivity. They proposed solutions including hardware upgrades, enhanced security measures, and improved backup systems to mitigate these problems. A detailed implementation plan was also outlined to ensure effective execution of the proposed solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views13 pages

GROUP 7 Fieldwork

Group 7 conducted fieldwork at the CUT campus security control room, identifying several issues with outdated computer systems that affect performance, security, and connectivity. They proposed solutions including hardware upgrades, enhanced security measures, and improved backup systems to mitigate these problems. A detailed implementation plan was also outlined to ensure effective execution of the proposed solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

GROUP 7

Fieldwork
VENUE: CUT SECURITY CONTROL

Isaac Chinhema C23157224N


Ackson S Gwerevende C23155420P
Privilege Mandidewa C23154214A

Brandon Gombaz C23155249Y


For our fieldwork as group 7, we went to the CUT campus security and control room responsible for safety and security of the
students and staff at CUT. We were allowed to enter the control room and the secretary’s office. The control room had 2
desktop computers, one Lenovo ThinkCentre corei3 and a Dell OptiPlex corei3. The secretary’s office has a Dell OptiPlex Core 2
Duo. The control room computers are using windows 10pro as their operating system and the secretary’s computer is using
windows 7. The control room uses their computers for many purposes such as Incident reporting and management, Access
Control, Emergency response coordination, Data management, Communication and dispatch, Campus patrol management and
Policy management. The secretary’s computer is mostly for handling communication through email, Liaison, as well as well as
data entry and report filing.
PART 1: PROBLEM IDENTIFICATION:
ONSITE ASSESSMENT
We managed to identify some issues with their systems. Most of these issues revolve around the fact that their computer are a bit old and outdated.
They are as follows:
 Performance Issues:
• Slow Processing: Old hardware may struggle to keep up with modern software demands, leading to slow
performance, lagging, and longer load times.
• Limited RAM and Storage: Older computers often have less RAM and storage, which can cause issues when
running multiple programs or storing large files.
 Security Risks:
• No Security Updates: Older operating systems may no longer receive security updates, making them more
vulnerable to malware, viruses, and other cyber threats.
 Hardware Failures:
• Component Wear and Tear: Hard drives, fans, and other components may wear out over time, leading to hardware
failures that can result in data loss or the need for repairs.
 Limited Connectivity:
• Slower Internet Speeds: Older network cards may not support the latest Wi-Fi standards, resulting in slower
internet connections.
 Backup Failures:
• Hard Drive Failure: If the drive where backups are stored or the source drive fails, the backup process may be
interrupted or fail completely.
• Power Outages: Sudden power loss during a backup process can cause incomplete backups or data corruption.
Problem Analysis

 Performance issues: low system response times or degraded performance can


affect employee efficiency.
 Security Risks: Exposure to malware or unauthorized access due to outdated
patches or weak security configurations can lead to data breaches and system
compromise.
 Hardware failure: can cause operational disruption and also affect employee
efficiency.
 Limited connectivity: will affect communication and slow down processes.
 Backup Failures: can cause loss of data or data corruption.
SOLUTION PROPOSAL
 1. Performance issues
 Solutions:
• Upgrade Hardware: Consider upgrading critical components like RAM, SSDs (instead of traditional HDDs), and CPUs if possible.
Even minor upgrades can significantly improve performance.
• System Cleanup: Regularly perform system cleanups to remove unnecessary files, applications, and temporary files that can
slow down the system.
• Optimize Software: Ensure that the software used is optimized for performance. Disable or uninstall unnecessary startup
programs, and use lightweight software alternatives where possible.
• Regular Maintenance: Implement regular defragmentation of hard drives (if using HDDs) and run diagnostics to identify and
resolve performance issues before they become severe.
 2. Security Risks
 Solutions:
• Enhance Security Configurations: Review and harden security configurations across all systems. Use strong, complex
passwords and change them regularly. Enable firewalls, antivirus, and antimalware solutions.
• User Access Controls: Implement the principle of least privilege, ensuring that users only have access to the systems and data
necessary for their role.
• Security Awareness Training: Regularly educate employees on security best practices, such as recognizing phishing attempts
and not downloading unverified software.
 3. Hardware Failure
 Solutions:
• Regular Hardware Inspections: Schedule regular inspections and maintenance of all hardware components to identify
potential failures before they occur.
• Proactive Replacement: Develop a hardware lifecycle management plan that replaces outdated or failing components before
they cause major disruptions.
• Environmental Controls: Ensure the physical environment of the hardware (temperature, humidity, dust levels) is controlled to
prevent premature wear and failure.
SOLUTION PROPOSAL (continued)
 4. Limited Connectivity
 Solutions:
• Network Infrastructure Upgrade: Upgrade network infrastructure, including routers, switches, and cabling, to support
faster and more reliable connectivity.
• Wi-Fi Optimization: Optimize Wi-Fi networks by improving signal strength, reducing interference, and ensuring adequate
coverage across the campus.
• Bandwidth Management: Implement Quality of Service (QoS) policies to prioritize critical communication and data transfer
over less important traffic.
• Remote Access Solutions: For employees working remotely or in different locations, provide robust VPN solutions to ensure
secure and reliable connectivity to the campus network.
• Cloud Services: Consider utilizing cloud-based communication tools that can offer more stable and scalable connectivity,
reducing reliance on local infrastructure.
 5. Backup Failures
 Solutions:
• Automated Backup Solutions: Implement automated backup solutions that run on a set schedule and notify administrators
of any issues or failures.
• Redundant Backup Systems: Use multiple backup locations, such as on-site and off-site or cloud-based backups, to ensure
data is not lost even if one system fails.
• Regular Backup Testing: Periodically test backups to ensure they are complete, accurate, and can be restored quickly in
case of an emergency.
• Versioning and Retention Policies: Implement backup versioning to keep multiple copies of data, allowing recovery from a
specific point in time if corruption occurs.
• Encryption and Secure Storage: Ensure that backups are encrypted and stored securely to protect against unauthorized
access and data breaches.
 By implementing these solutions, you can mitigate the impact of these common problems, ensuring better system
performance, enhanced security, and reliable operations.
PART 2

RECOMMENDATION AND IMPLEMENTATION PLAN


Performance Upgrades
 Upgrade Hardware:
1. Assess Needs: Determine the hardware components that need upgrading based on system
performance assessments (e.g., RAM, SSD).
2. Purchase Components: Procure the required hardware upgrades from reliable vendors.
3. Installation: Install new components, following manufacturer instructions and ensuring compatibility
with existing hardware.
4. Testing: After installation, test the system to verify performance improvements and stability.
 System Cleanup:
1. Identify Unnecessary Files: Use disk cleanup tools to identify and remove temporary files, caches,
and old system logs.
2. Uninstall Unneeded Programs: Remove software that is no longer in use or that slows down the
system.
3. Regular Maintenance: Schedule regular cleanups to maintain optimal performance.
 Optimize Software:
1. Review Startup Programs: Use Task Manager (Windows) or Activity Monitor (macOS) to identify and
disable unnecessary startup programs.
2. Update Software: Ensure that all installed software is updated to the latest versions.
3. Choose Lightweight Alternatives: If possible, replace heavy software with more efficient alternatives.
 Regular Maintenance:
1. Defragment Hard Drives: For HDDs, use built-in defragmentation tools to optimize file storage.
2. Run Diagnostics: Use system diagnostic tools to identify hardware or software issues and address them
accordingly.
Enhance Security
 Enhance Security Configurations:
1. Review and Update Configurations: Regularly review security settings and apply
best practices for firewalls, antivirus, and other security measures.
2. Implement MFA: Enable multi-factor authentication for critical systems and access
points.
 User Access Controls:
1. Implement PoLP: Review and adjust user permissions to ensure only necessary
access.
2. Regular Audits: Conduct periodic access reviews to ensure compliance with access
policies.
 Security Awareness Training:
1. Develop Training Programs: Create or procure training materials on security best
practices.
2. Schedule Regular Training: Conduct regular training sessions and provide ongoing
updates on new threats.
Hardware Maintenance

 Regular Hardware Inspections:


1. Schedule Inspections: Create a regular maintenance schedule for hardware checks.
2. Perform Inspections: Conduct physical checks and run diagnostic tools to identify
potential issues.
 Proactive Replacement:
1. Establish a Lifecycle Plan: Develop a plan for replacing aging hardware based on
performance and reliability metrics.
2. Budget for Replacements: Allocate budget for proactive hardware upgrades and
replacements.
 Environmental Controls:
1. Monitor Conditions: Use environmental monitoring systems to track temperature,
humidity, and dust levels.
2. Maintain Cleanliness: Ensure server rooms and equipment areas are clean and
properly ventilated.
Network Connectivity Upgrades

 Network Infrastructure Upgrade:


1. Assess Infrastructure Needs: Identify network components
that need upgrading (e.g., routers, switches).
2. Upgrade Hardware: Purchase and install new network
equipment to improve speed and reliability.
 Wi-Fi Optimization:
1. Survey Network Coverage: Use tools to map Wi-Fi signal
strength and identify weak spots.
2. Adjust Access Points: Optimize the placement and
configuration of Wi-Fi access points to enhance coverage.
Backup System Maintenance
 Automated Backup Solutions:
1. Choose Backup Software: Select reliable backup software that supports automation
and notifications.
2. Configure Backup Schedules: Set up automated backup schedules and configure
alert notifications for failures.
 Redundant Backup Systems:
1. Implement Multiple Backup Locations: Use a combination of on-site and off-site
backups or cloud storage.
2. Test Redundancy: Regularly test backup systems to ensure data integrity and
accessibility.
 Regular Backup Testing:
1. Schedule Tests: Regularly test backup restores to verify data integrity and recovery
processes.
2. Document Results: Keep records of backup test results and address any issues
identified.
THE
END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy