You are on page 1of 5

**General**

1. Please state your name, job position title, and your roles and responsibilities under your
company/workplace.
 Name: Wan Hisham Bin Wan Jalaluddin
 Job Position Title: Cloud Consultant and Sales
 Roles and Responsibilities:
i. Providing consistent and reliable on-demand cloud services and
cybersecurity services to support clients' companies for business
continuity.
ii. Developing and executing disaster discovery and disaster drills for clients
by performing risk management and planning.
iii. Monitored hardware and software performance, generating routine
reports of technological performance and statistics and providing
recommendations based on overall performance for each client.
iv. Explore business development opportunities by collating information for
tenders and proposals through communicating, networking and
collaborating.
v. Conducted market research to identify companies in need of cloud
services.
2. Could you give an overview of the types of information systems used within your
workplace?
 Cloud Hosting
 Cloud Backup and Replication
 Disaster Recovery
 SaaS(Software as a Service)
 IaaS(Infrastructure as a Service)
 PaaS(Platform as a Service)
 Cybersecurity
 Ticketing System
3. What are some of the common challenges faced by the information systems department
in the workplace? How does the department overcome them?
 Security and Compliance
i. Ensuring the security and adherence to regulations of data and
applications within the cloud is a significant hurdle for professionals in
cloud computing. The nature of cloud computing, which entails the
sharing of resources and services among various users and providers,
elevates the possibility of data breaches, cyberattacks, and non-
compliance with regulations. To mitigate these risks, it is crucial for cloud
computing experts to implement key security measures, including
encryption, authentication, access management, backups, audits, and
continuous monitoring. Additionally, keeping abreast of the most recent
security protocols and regulatory requirements pertinent to their specific
industry and geographic location is essential for maintaining compliance
and safeguarding data.

**Hardware**
1. What hardware infrastructure and facilities does your workplace provide (computers,
printers, servers, etc.)?
 Tier-3 Data Centre
 Server
 Firewall
 Server Rack
 Gate Access
 CCTV
2. How do you ensure the reliability and scalability of the hardware systems supporting the
company/institution's information system?
 It is certified Tier-3(Which obeys all the requirement to get Tier-3)
 Penetration Test every 6 months
 Maintenance of generator, UPS and PDU every month(if required)
3. What measures are taken to ensure the security of hardware components against
physical theft or damage?
 24/7 monitor by NOC(Network Operations Center) and SOC(Security Operations
Center)
 All equipment is registered in the system and traceable

**Software**
1. What Operating System(s) does your workplace use?
 Windows OS
 Linux OS
 Microsoft OS (OSes)
 Chrome OS
2. What are the primary software applications and tools used within your workplace's
information system?
 Veeam
 VMWare
 Nutanix
 Sangfor
 Cloudflare
 EDR
3. How do these software applications contribute to enhancing administrative functions
within the workplace? Can you give examples of tasks you personally work on?
 Everything is synced into one cloud that can control all other clients' clouds.
4. How frequently are software updates applied to ensure the security and performance of
the system?
 Every week
**Database**
1. Can you provide insight into the database management systems utilized by your
workplace? What do you use to store and keep track of records?
 Easy to monitor and organise
 Store: Registered hardware
2. How do you utilize the database to carry out your tasks as a faculty member?
 Easy to check information on hardware without physically being there
3. How are data integrity, security, and protection maintained within the workplace's
databases? What strategies are employed for data backup and recovery within the
database infrastructure?
 By having 3-2-1-1-0 rule
i. 3 total copies of your data (1 primary copy and 2 backups)
ii. 2 different media types (such as hard drive and cloud storage)
iii. 1 off-site backup (to protect against physical disasters)
iv. 1 offline backup (to protect against ransomware or other cyber threats
that could compromise connected backups)
v. 0 errors (verification of backups to ensure they are in good condition and
can be restored)
4. How do you evaluate the effectiveness of the implemented database systems?
 Easy to organise

**People**
1. What roles and responsibilities do individuals play in managing and utilizing the
workplace's information system?
 Ticketing system: Alert technical/NOC/SOC for any request or task
2. How does the information systems department collaborate with other departments or
teams within the workplace?
 Automated process
3. How are faculty/staff trained to effectively utilize the information system components?
What measures are to ensure data privacy and security awareness among individuals
interacting with the system?
 Understanding ISO policy and applying it.

**Telecommunication and Network**


1. What network infrastructure is provided by your workplace?
 Tier-3 Data Centre
2. How is the workplace's network infrastructure designed to support the information
system's requirements?
 Everything is tested before use
3. What communication channels or tools are utilized to facilitate collaboration and
information sharing?
 Ticketing system
4. What technologies and protocols are employed to ensure efficient communication and
data transfer across the network?
 ISO policy
5. How does your workplace address challenges such as network congestion, latency, and
security threats within the telecommunication and network infrastructure?
 Always provide SLA(Service Level Agreement) and explain what it means

You might also like