Group 7 conducted fieldwork at the CUT campus security control room, identifying several issues with outdated computer systems that affect performance, security, and connectivity. They proposed solutions including hardware upgrades, enhanced security measures, and improved backup systems to mitigate these problems. A detailed implementation plan was also outlined to ensure effective execution of the proposed solutions.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views13 pages
GROUP 7 Fieldwork
Group 7 conducted fieldwork at the CUT campus security control room, identifying several issues with outdated computer systems that affect performance, security, and connectivity. They proposed solutions including hardware upgrades, enhanced security measures, and improved backup systems to mitigate these problems. A detailed implementation plan was also outlined to ensure effective execution of the proposed solutions.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13
GROUP 7
Fieldwork VENUE: CUT SECURITY CONTROL
Isaac Chinhema C23157224N
Ackson S Gwerevende C23155420P Privilege Mandidewa C23154214A
Brandon Gombaz C23155249Y
For our fieldwork as group 7, we went to the CUT campus security and control room responsible for safety and security of the students and staff at CUT. We were allowed to enter the control room and the secretary’s office. The control room had 2 desktop computers, one Lenovo ThinkCentre corei3 and a Dell OptiPlex corei3. The secretary’s office has a Dell OptiPlex Core 2 Duo. The control room computers are using windows 10pro as their operating system and the secretary’s computer is using windows 7. The control room uses their computers for many purposes such as Incident reporting and management, Access Control, Emergency response coordination, Data management, Communication and dispatch, Campus patrol management and Policy management. The secretary’s computer is mostly for handling communication through email, Liaison, as well as well as data entry and report filing. PART 1: PROBLEM IDENTIFICATION: ONSITE ASSESSMENT We managed to identify some issues with their systems. Most of these issues revolve around the fact that their computer are a bit old and outdated. They are as follows: Performance Issues: • Slow Processing: Old hardware may struggle to keep up with modern software demands, leading to slow performance, lagging, and longer load times. • Limited RAM and Storage: Older computers often have less RAM and storage, which can cause issues when running multiple programs or storing large files. Security Risks: • No Security Updates: Older operating systems may no longer receive security updates, making them more vulnerable to malware, viruses, and other cyber threats. Hardware Failures: • Component Wear and Tear: Hard drives, fans, and other components may wear out over time, leading to hardware failures that can result in data loss or the need for repairs. Limited Connectivity: • Slower Internet Speeds: Older network cards may not support the latest Wi-Fi standards, resulting in slower internet connections. Backup Failures: • Hard Drive Failure: If the drive where backups are stored or the source drive fails, the backup process may be interrupted or fail completely. • Power Outages: Sudden power loss during a backup process can cause incomplete backups or data corruption. Problem Analysis
Performance issues: low system response times or degraded performance can
affect employee efficiency. Security Risks: Exposure to malware or unauthorized access due to outdated patches or weak security configurations can lead to data breaches and system compromise. Hardware failure: can cause operational disruption and also affect employee efficiency. Limited connectivity: will affect communication and slow down processes. Backup Failures: can cause loss of data or data corruption. SOLUTION PROPOSAL 1. Performance issues Solutions: • Upgrade Hardware: Consider upgrading critical components like RAM, SSDs (instead of traditional HDDs), and CPUs if possible. Even minor upgrades can significantly improve performance. • System Cleanup: Regularly perform system cleanups to remove unnecessary files, applications, and temporary files that can slow down the system. • Optimize Software: Ensure that the software used is optimized for performance. Disable or uninstall unnecessary startup programs, and use lightweight software alternatives where possible. • Regular Maintenance: Implement regular defragmentation of hard drives (if using HDDs) and run diagnostics to identify and resolve performance issues before they become severe. 2. Security Risks Solutions: • Enhance Security Configurations: Review and harden security configurations across all systems. Use strong, complex passwords and change them regularly. Enable firewalls, antivirus, and antimalware solutions. • User Access Controls: Implement the principle of least privilege, ensuring that users only have access to the systems and data necessary for their role. • Security Awareness Training: Regularly educate employees on security best practices, such as recognizing phishing attempts and not downloading unverified software. 3. Hardware Failure Solutions: • Regular Hardware Inspections: Schedule regular inspections and maintenance of all hardware components to identify potential failures before they occur. • Proactive Replacement: Develop a hardware lifecycle management plan that replaces outdated or failing components before they cause major disruptions. • Environmental Controls: Ensure the physical environment of the hardware (temperature, humidity, dust levels) is controlled to prevent premature wear and failure. SOLUTION PROPOSAL (continued) 4. Limited Connectivity Solutions: • Network Infrastructure Upgrade: Upgrade network infrastructure, including routers, switches, and cabling, to support faster and more reliable connectivity. • Wi-Fi Optimization: Optimize Wi-Fi networks by improving signal strength, reducing interference, and ensuring adequate coverage across the campus. • Bandwidth Management: Implement Quality of Service (QoS) policies to prioritize critical communication and data transfer over less important traffic. • Remote Access Solutions: For employees working remotely or in different locations, provide robust VPN solutions to ensure secure and reliable connectivity to the campus network. • Cloud Services: Consider utilizing cloud-based communication tools that can offer more stable and scalable connectivity, reducing reliance on local infrastructure. 5. Backup Failures Solutions: • Automated Backup Solutions: Implement automated backup solutions that run on a set schedule and notify administrators of any issues or failures. • Redundant Backup Systems: Use multiple backup locations, such as on-site and off-site or cloud-based backups, to ensure data is not lost even if one system fails. • Regular Backup Testing: Periodically test backups to ensure they are complete, accurate, and can be restored quickly in case of an emergency. • Versioning and Retention Policies: Implement backup versioning to keep multiple copies of data, allowing recovery from a specific point in time if corruption occurs. • Encryption and Secure Storage: Ensure that backups are encrypted and stored securely to protect against unauthorized access and data breaches. By implementing these solutions, you can mitigate the impact of these common problems, ensuring better system performance, enhanced security, and reliable operations. PART 2
RECOMMENDATION AND IMPLEMENTATION PLAN
Performance Upgrades Upgrade Hardware: 1. Assess Needs: Determine the hardware components that need upgrading based on system performance assessments (e.g., RAM, SSD). 2. Purchase Components: Procure the required hardware upgrades from reliable vendors. 3. Installation: Install new components, following manufacturer instructions and ensuring compatibility with existing hardware. 4. Testing: After installation, test the system to verify performance improvements and stability. System Cleanup: 1. Identify Unnecessary Files: Use disk cleanup tools to identify and remove temporary files, caches, and old system logs. 2. Uninstall Unneeded Programs: Remove software that is no longer in use or that slows down the system. 3. Regular Maintenance: Schedule regular cleanups to maintain optimal performance. Optimize Software: 1. Review Startup Programs: Use Task Manager (Windows) or Activity Monitor (macOS) to identify and disable unnecessary startup programs. 2. Update Software: Ensure that all installed software is updated to the latest versions. 3. Choose Lightweight Alternatives: If possible, replace heavy software with more efficient alternatives. Regular Maintenance: 1. Defragment Hard Drives: For HDDs, use built-in defragmentation tools to optimize file storage. 2. Run Diagnostics: Use system diagnostic tools to identify hardware or software issues and address them accordingly. Enhance Security Enhance Security Configurations: 1. Review and Update Configurations: Regularly review security settings and apply best practices for firewalls, antivirus, and other security measures. 2. Implement MFA: Enable multi-factor authentication for critical systems and access points. User Access Controls: 1. Implement PoLP: Review and adjust user permissions to ensure only necessary access. 2. Regular Audits: Conduct periodic access reviews to ensure compliance with access policies. Security Awareness Training: 1. Develop Training Programs: Create or procure training materials on security best practices. 2. Schedule Regular Training: Conduct regular training sessions and provide ongoing updates on new threats. Hardware Maintenance
Regular Hardware Inspections:
1. Schedule Inspections: Create a regular maintenance schedule for hardware checks. 2. Perform Inspections: Conduct physical checks and run diagnostic tools to identify potential issues. Proactive Replacement: 1. Establish a Lifecycle Plan: Develop a plan for replacing aging hardware based on performance and reliability metrics. 2. Budget for Replacements: Allocate budget for proactive hardware upgrades and replacements. Environmental Controls: 1. Monitor Conditions: Use environmental monitoring systems to track temperature, humidity, and dust levels. 2. Maintain Cleanliness: Ensure server rooms and equipment areas are clean and properly ventilated. Network Connectivity Upgrades
Network Infrastructure Upgrade:
1. Assess Infrastructure Needs: Identify network components that need upgrading (e.g., routers, switches). 2. Upgrade Hardware: Purchase and install new network equipment to improve speed and reliability. Wi-Fi Optimization: 1. Survey Network Coverage: Use tools to map Wi-Fi signal strength and identify weak spots. 2. Adjust Access Points: Optimize the placement and configuration of Wi-Fi access points to enhance coverage. Backup System Maintenance Automated Backup Solutions: 1. Choose Backup Software: Select reliable backup software that supports automation and notifications. 2. Configure Backup Schedules: Set up automated backup schedules and configure alert notifications for failures. Redundant Backup Systems: 1. Implement Multiple Backup Locations: Use a combination of on-site and off-site backups or cloud storage. 2. Test Redundancy: Regularly test backup systems to ensure data integrity and accessibility. Regular Backup Testing: 1. Schedule Tests: Regularly test backup restores to verify data integrity and recovery processes. 2. Document Results: Keep records of backup test results and address any issues identified. THE END
(Nanzan Library of Asian Religion and Culture) Mark R. Mullins - Christianity Made in Japan - A Study of Indigenous Movements - University of Hawaii Press (1998) PDF