Professional Documents
Culture Documents
Install and configure new software and services Keep systems and services
operating
Hardware Management
Capacity planning
Inventory
Configuration
Data Backups
Perhaps most important aspect!
Disaster recovery
Onsite/Offsite
Periodic testing
Multiple copies
User communication
Software Installation/Maintenance
Evaluation of software
Installation
Security
System Monitoring
Hardware and services functioning and operational
Capacity
Security
Passwords
Break-ins
System logs
Examination
Troubleshooting
Problem discovery, diagnosis, and resolution
Often requires
Outside experts
Luck
Expediency
Local Documentation
Administrative policies and procedures
Location
Software
Patches installed
Security Concerns
System logging and audit facilities
Live exploits
User Assistance
Time intensive!
Techniques
Help desks
Trouble-ticket systems
Administration Challenges
Need
24x7 availability
1. Scalability
2. Security
3. Simplicity
Learning is Critical
Know how to find answers:
3. Read critically
Hanlon’s Razor:
Pareto’s Principle:
Sturgeon’s Law:
Murphy’s Law:
Like any modern fully-fledged Unix, Linux includes true multitasking, virtual memory,
shared libraries, demand loading, shared copy-on- write executables, proper
memory management, and TCP/IP networking.
Linux really refers to the kernel – most of the commands that you are familiar with
are really separate programs, not specific to Linux, and often are part of the Free
Software Foundation's GNU project.
Linux was first developed for 32-bit x86-based PCs (386 or higher). These days it
also runs on dozens of other processors.
System admin may have to order supplies, deal with users, develop software,
repair, and hardware
Programmers
Network Administrators
Operators
The Sysadmin must be able to communicate with technical and non-technical users.
The Sysadmin must be able to solve difficult technical problems. The Sysadmin
must be able to work in a group setting.
Install and maintain operating system software, application software, and patches.
Install and maintain user accounts; develop acceptable use policy and login-name
policy; determine password change policies; install/configure/manage name
services; and manage licenses.
Determine disk quota, police/manage disk space, and monitor log files.
web agents
calendar software
Skills Required
Delegation and Time Management
Ethics
Desire to learn
Hardware
Software
Problem Solving
Types of Administrators/Users
In a larger company, following may all be separate positions within a computer support
or Information Services (IS) department. In a smaller group they may be shared by a
few sysadmins, or even a single person.
Database Administrator
Network Administrator
Security Administrator
Web Administrator
Technical support
computer operator
Web administrator
maintains web server services (such as IIS or Apache) that allow for internal or
external access to web sites. Tasks include managing multiple sites, administering
security, and configuring necessary components and software. Responsibilities may
also include software change management. •
computer operator
3. Security:
8. User Management:
They manage user accounts, permissions, and access rights. This involves
creating, modifying, and deleting user accounts as well as controlling what
resources users can access.
Various distributions of Linux, such as Ubuntu Server, CentOS, and Red Hat
Enterprise Linux, are widely used for server environments due to their stability,
security features, and open-source nature.
2. Windows Server:
3. UNIX:
Though less prevalent than Linux and Windows, UNIX-based systems like
FreeBSD and Solaris are known for their stability and scalability.
There are numerous anti-virus policies for organizations and schools on the
internet but I could not find any policy regarding software agencies policy on
how to ensure that the software they produce is clean. Sure, it is a
developer's ethics not to create software that might destroy a company's
reputation but, we cannot eliminate this possibility.
Overview
The purpose of this policy is to set minimum guidelines necessary to ensure that the
software it produced meets the quality it promised to the client.
It’s the company’s obligation to protect it’s business and client reputation from
fraudulent and inappropriate actions its employees might do. Such actions are
punishable by company’s employment policy. Punishments may vary depending on
the severity of the malware it caused.
Scope
Definition
Git
Branch
to let the team know that the code is ready to be tested and reviewed.
Code Review
is a process to verify that the codes are optimized and working properly as what is
stated on the requirements.
Any employee who is found to have violated this policy may be subject to
disciplinary action, up to and including termination of employment.
User accounts will be created for employees and authorized personnel upon
request from the HR department or relevant department head.
New accounts will be created with minimal access privileges necessary for the
individual's role.
2. Password Management:
Users are required to choose strong and unique passwords that meet the
organization's password complexity requirements.
Employees changing roles within the organization will have their access rights
adjusted accordingly.
User data will be securely archived for a defined retention period before
account deletion.
Users will receive training on secure password practices and the importance of
protecting their accounts.
User account activities will be logged and regularly reviewed for any suspicious
or unauthorized activities.
Audit trails will be maintained and retained as per data retention policies.
7. Exception Handling:
Any exceptions to this policy, such as granting elevated access for specific
tasks, must be documented, approved, and reviewed periodically.
8. Policy Compliance:
Non-compliance with this policy may result in disciplinary actions, including but
not limited to account suspension, revocation of privileges, and, in severe
9. Policy Review:
This policy will be reviewed annually or as needed to ensure its relevance and
effectiveness in maintaining user account security and access control.