SAM Module 7 & 8 Notes PDF
Document Details
Uploaded by Deleted User
Tags
Summary
These notes cover modules 7 and 8 on aspects of software maintenance and computer network components. The topics include adaptive, perfective, preventive, corrective, and emergency maintenance, as well as various aspects of system administration and user management.
Full Transcript
Module 7 If minor glitch lang/restart/uninstall and Aspects of Software Maintenance install the software 1. Adaptive Maintenance Check for updates 2. Perfective Maintenance...
Module 7 If minor glitch lang/restart/uninstall and Aspects of Software Maintenance install the software 1. Adaptive Maintenance Check for updates 2. Perfective Maintenance Contain checking system resource 3. Preventive Maintenance (memory CPU disk space) 4. Corrective Maintenance Review the error messages and logs 5. Emergency Maintenance Disabling the presence of the 3rd party software Why Consider Key Aspects Software Presence on checking of the software Maintenance Check the recent changes made in the Bug fixing system Enhancement Check the application for the installation Performance optimization of the software to another computer Migration Compatibility Re-engineering Run diagnostic tools to identify Documentation hardware/software issues. Clearing cache and temporary files Disadvantages Restoring it from backup Cost Proper documentation Compatibility Implement the solution (after we gather Longevity information and understand the problem) Undocumented changes Document the steps in troubleshooting Technological advancements Seek help daw ha experts kun you did Integrity of the changes structure of the everything na software/structural integrity Complexity Module 8 Changing requirements Computer Net Components Interoperability issues End users Test coverage Links/connections Disruption of schedules/operation Design topologies Introduction of the new malicious Arrangement of nodes software/bugs Network topology Technical debt User resistance Administering Own Network Factors: Skill gaps Administer firewall, various security Inadequate testing measures End of life Network addressing Subnetting the domain system Advantage Improved software quality System Admin and Maintenance Enhanced security/user satisfaction Administer/maintain systems Longevity of the software (software/hardware) Software always aligned with the evolving To ensure proper functioning, security, business need and reliability Competitive advantage To be able to have continuous Key Concepts of System Admin and improvements Maintenance Improved collaboration System administration - responsible for Reduce downtime and improve scalability the day-to-day management operation User management - we create and SOFTWARE TROUBLESHOOTING manage user accounts Gather data/gather information System configuration (install, configure Identify the problem/understanding the OS, software application) problem Network management (setup and Try to do the troubleshooting maintain network devices) Testing potential solution Security management (apply security Replicate the issue patches/updates) Check the obvious cost of the problem Backup and recovery (design and execute Key Aspects of User Management backup strategies, ensure security of data User account creation loss/system failures) User authentication Monitoring and troubleshooting User authorization Presence of automation and scripting Access control Virtualization and cloud management Users roles and groups Documentation User deactivation and removal Collaboration and communication (create Password management a pasitib environment daw) User training User monitoring and auditing Importance of System Administration User self-service Reliability and availability Data segregation Security Compliance and reporting Performance optimization Integrity of data File System Kemeru Efficiency and automation Presence of file Utilization of resources Formatting Not only technical skills/problem-solving Journaling abilities and good communication and adaptability Resource Management Monitor CPU usage Computer System Fundamental Processes Monitor memory Startup Sequence: (dire ak sure hinin, aminado Monitor network na may kulang, step 1 and step 2, 5 steps daw Software resource inin) o Application instances Initialization o Resource monitoring and analysis Loads the boot loader o Resource allocation and Load operating system optimization Initialization and configuration o Energy management o Log in requirement if meada o Virtualization and cloud o UI na management Shutdown Process: o Disaster, recovery, and backup 1. User initiation o Capacity planning 2. Application and processes are being closed 3. Save the configuration settings and data Three Types of Backup 4. Devices connected are being unmounted Full backup or ejected Incremental 5. Services halted Differential backup 6. Kernel will be able to send shutdown Types of Backup Location signals On-site 7. Powering off Off-site Key Aspects of Software Management Security Mechanisms Software acquisition Retention policy Installation and deployment Data Recovery Scenarios Presence of software updates and Recovery after data corruption patches Data loss Presence of license management Security management Recovery Time Objective (RTO) Version control Recovery Point Objective (RPO) Configuration management (very very relevant daw yakan ni maam) Testing Backups Software inventory Restoration Methods: Uninstallation and decommissioning Bear metal restore ?? User training and support Granular restore (specific files lang) Compliance and auditing Practices in Backup The 3-2-1 Backup Rule ensures data safety by maintaining: o 3 Copies of Data: The primary data and two backup copies. o 2 Different Storage Formats: Use devices like external drives and cloud storage. o 1 Offsite Backup: Store one copy at a remote location to protect against local disasters. Committed Backup Regular Monitoring Documentation Incremental Backup Differential Backup Image-Based Backup Off-Site And Cloud Backup Mirror Backup Hybrid Backup Continuous Data Protection Virtual Machine Snapshot Backup Tools Backup software Built-in or OS (backup keme) Network-attached storage devices Restoration Procedures Identify data loss/system failure has occurred Choosing the right backup Prepare for restoration Aspects of Restoration Procedure Follow the steps Verify data integrity Test restores data Monitor Update recovery plans Notify relevant stakeholders Maintain communication to stakeholders Apply a rapid response to the situation Recovery testing Documentation of the restoration process Training