it 225 phase 5 individual project

Upload: mark-murphy

Post on 14-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 IT 225 Phase 5 Individual Project

    1/31

    CTU

    IT 225

    Phase 4 Individual Project

    Mark Murphy

    11/11/2012

  • 7/30/2019 IT 225 Phase 5 Individual Project

    2/31

    1

    1

    Table of Contents

    ROLES AND RESPONSIBILITIES .............................................................................................. 2

    CENTRALIZED VERSUS DECENTRALIZED ....................................................................... 3

    STAFFING STRUCTURES ....................................................................................................... 5

    MY RECOMMENDATIONS ABOUT THE STRUCTURE ..................................................... 8

    TOOLS AND TECHNOLOGIES................................................................................................... 9

    IT SYSTEMS SUPPORT ............................................................................................................. 15

    Description of Self Service Applications .................................................................................. 15

    Real Time vs. Delayed Assistance ............................................................................................ 16

    Knowledge base ........................................................................................................................ 18

    PROCESSES AND PROBLEM RESOLUTION ......................................................................... 19

    PERFORMANCE MANAGEMENT ........................................................................................... 23

    BUSINESS CONTINUITY .......................................................................................................... 23

    PHYSICAL SECURITY .............................................................................................................. 25

    NETWORK INFASTRUCTURE AND SECURITY ................................................................... 27

    APPLICATION INFASTRUCTURE AND SECURITY ............................................................ 29

    REFERENCES ............................................................................................................................. 30

  • 7/30/2019 IT 225 Phase 5 Individual Project

    3/31

    2

    2

    ROLES AND RESPONSIBILITIES

    A help desk is a place where of information technology users can go to get help with a

    problem (Rouse, 2005). A help desk does not have to be a massive operation; it can be as small

    as one person who solves the IT problems in a company or it can be a large department that

    maintains help desks across multiple locations. However small or large a help desk is, there are

    common roles and responsibilities that apply to all of them.

    A help desk is responsible for providing a single, point of contact place where users can

    go for help (Sanderson, 2004). Help desks have evolved tremendously since the first ideas about

    them started. There are two primary types of help desks. There is an internal help desk whose

    main responsibility is to provide support for internal users of a company and there is an external

    help desk. The main responsibility of an external help desk is to provide help desk support with

    external users.

    A help desk may play many roles in an organization. Beyond helping to solve user

    problems, a help desk might also be responsible for things like the installation of new equipment

    or repairing broken equipment. Help desk employees must also carefully document problems

    that users are experiencing as well as attempts to find a solution and how the problem was finally

    resolved. The ability to provide good customer service is an essential part of any help desk. It is

    important to try and communicate clearly with the customer and allow them a chance to explain

    the problem in their own words. Help desk employees should try not to rush users and avoid

    jumping to conclusions about a users knowledge or experience.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    4/31

    3

    3

    CENTRALIZED VERSUS DECENTRALIZED

    A help desk can be set up to as either centralized or decentralized. With a centralized help

    desk, all the help desk services are included in one location. There are advantages to having

    centralized help desk services. One of the advantages is that it allows for better communication

    within the help desk department because the employees are all together. If all the people are in

    the same building, it is also easier to implement policies and monitor the efficiency of the help

    desk. Another advantage is, since all the resources are located in one area, that it promotes a

    better use of resources. For example, a caller may call with a specific problem. Since all the help

    desk resources are centrally located, it would likely be much easier and faster to find a solution

    to the callers problem. A help desk would not have to seek resources from other locations or

    offices to find a solution. (Sanderson, 2004).

    A disadvantage of a centralized help desk could be an inability to provide on- site support

    to users in remote locations. For example, if there is a problem with a piece of hardware, the help

    desk will be unable to provide any on- site support where the caller is and may instead have to

    try and come up with other solutions. Another disadvantage is there may be difficulties

    understanding a business needs. For example, imagine a business that has different business

    practices than the help desk. This could be a scenario when a business takes unusual days off

    compared to the help desk. The days off could be because of something like a local custom or

    holiday in the country where the business is located but those same days off may not apply to a

    help desk in another country. Those conditions could make it very difficult to explain or resolve

    the issue.

    In a decentralized help desk, the services may be spread out to more than one location.

    One advantage of a decentralized help desk is an ability to provide on- site services to business.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    5/31

    4

    4

    When help desk services are located in many different areas it becomes more likely that they can

    respond to and provide services directly at a company, an advantage that may not be possible in a

    centralized structure. Other advantages of a decentralized help desk could be that the help desk

    and a business they provide services to can be in the same time zone, may share the same

    customs and will usually have the same language.

    A disadvantage of a decentralized help desk is there may be difficulties measuring

    performance. With employees spread across different areas it could also be difficult providing

    standardized information and policies. Still another disadvantage could be difficulty creating and

    having all employees understand a common mission and goals.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    6/31

    5

    5

    STAFFING STRUCTURES

    There are five main staffing structures that can be used to set up a help desk. They are

    pool, dispatch, tiered, specialized and method. And while these structures all share the general

    idea of staffing a help desk, they are all different.

    A pool staffing structure is set up so any service request goes to a centralized location and

    is then handled by the next available help desk employee. This kind of setup is not the most

    effective use of a help desk because any employee will try and handle any request. This means

    employees with very limited experience will have the same responsibilities as an employee with

    much more experience. That also means that a service request may go to an employee who lacks

    the expertise needed to handle a problem while another employee who may have the required

    expertise will be given another assignment.

    With dispatch staffing, service requests initially go to an employee who gathers

    information and then directs the request to an appropriate location to handle the request. This

    structure creates the advantage of having little to no phone queue with initial service requests.

    However, once a request is directed to another location, the request may end up in a queue.

    (Sanderson, 2004). This could be frustrating to caller because they may have to wait in the queue

    for a long period of time.

    A tiered staffing structure has a help desk that is divided into several groups. With a

    tiered model, a problem is addressed by a first line specialist. That first line specialist also takes

    ownership of the problem. Taking ownership of a problem is a good customer service tactic

    because it makes the customer feel comfortable that their problem will be properly addressed and

    resolved.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    7/31

    6

    6

    If the first line cannot solve the problem, the problem is escalated to the second line

    specialist. Second level specialists usually do not take first level requests and may be specialists

    in particular areas. For example, certain second level employees may be specialists in things like

    networking, hardware or software. Or if they work at in internal help desk, they may have a

    deeper understanding of what the business uses. Also, second level employees often handle calls

    that are related to the area in which they specialize.

    There are advantages to having a tiered structure. Tiered structures often have higher

    customer service satisfaction levels and employee satisfaction. Tiered structures also allow for

    less experienced employees to gain experience and knowledge by solving problems.

    A specialized staffing has two types of support models: productivity and business. In the

    product model the help desk is divided into different groups and each group has a specific

    responsibility. For example, there may be a group that handles hardware related issues and

    another group for software issues. These groups may also be broken down into even more

    specialized areas if needed. Groups may also be broken down into a tiered structure. A problem

    with this structure is that users may have more than one problem and a problem may be caused

    by several things, including different groups in the structure. For example, if a user is unable to

    access the internet, they may have a network issue with the modem, hardware issues with

    components or a software issue with the internet program. This may make a problem more

    difficult to resolve since there are different groups involved with fixing it.

    In the business structure the help desk is divided up according to the units they provide

    support. For example in this model, the accounting department would be supported by an

    accounting help desk and a sales department would be supported by a sales help desk. I would

  • 7/30/2019 IT 225 Phase 5 Individual Project

    8/31

    7

    7

    imagine this kind of structure is not effective in a small business. I think this might be helpful in

    a very large organization where each department has a need to be supported by its own support

    staff.

    For method staffing, a help desk is organized by the manner in which support is provided.

    One group is responsible for telephone requests and another group is responsible for email and

    web requests. This kind of structure works well when there is an equal number of service

    requests between the phone and email or web support. If one department, like phone support,

    receives a disproportionately higher number of requests than the email department, then it is not

    an appropriate staffing model.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    9/31

    8

    8

    MY RECOMMENDATIONS ABOUT THE STRUCTURE

    After learning about the different staffing structures, I feel comfortable making a

    recommendation on the structure I would use for this project. I would use a tiered help desk

    structure and I would have a centralized help desk.

    I would use a tiered help desk structure because it seems to be an effective way to operate

    a help desk. Instead of using help desk structures like a pool or dispatch, I prefer the tiered

    structure because it gives employees the opportunity to gain experience by helping with less

    complicated problems and still allows complex problems to be solved by more experienced

    staffers. I like the idea of mentoring less experienced personnel and helping them become more

    effective help desk employees.

    I would use a centralized help desk because my company is a small business and all of its

    resources are local. As my company grows, I would add a help desk anywhere the business

    expands. If additional offices are opened, I would include a help as part of the business

    expansion.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    10/31

    9

    9

    TOOLS AND TECHNOLOGIES

    There are five major steps in diagnosing a help desk issue. Communication is essential to

    solving any issues that may come into a help desk. If the problems are not understood then they

    can never be solved, so it is important for the listener and speaker to maintain professionalism

    and practice good communication skills.

    The first step is to diagnosing a help desk issue is to identify the problem. When a user

    contacts a help desk, it may be difficult to understand the specific problem. A key component to

    help identify the problem is to collect data. The first pieces of information that should be

    collected is user data, such as the users name, title, department and configuration information.

    Next, the help desk should try to determine what can be causing the problem. For example, try to

    find out if the problem is caused by a component like a new piece of hardware or a new software

    application. Or perhaps the problem is a symptom of another problem. An example of this could

    be when a computer repeatedly restarts. That could indicate a problem with the computer power

    supply or something else, like a failing drive. It is also important to note when the problem first

    started. This is important because if component upgrades or other work were done around the

    time the problem started, that could help determine the problem. Lastly, it is important to get a

    clear description of the problem. For example, if a user gets an error message when they start

    their computer it can be tremendously helpful in solving the issue. Another example would be to

    ask the user to explain exactly what happened when they tried to do something. If the user tried

    to print and suddenly got error messages or requests to connect with a printer, that kind of

    information can be very helpful. This is a time when the help desk should carefully listen to the

    speaker and try to understand exactly what the speaker is trying to explain.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    11/31

    10

    10

    The second step is to determine the root cause. This step is important because this is the

    step where the help desk works to understand the problem and start to come up with solutions.

    There are three ways this is done. The first thing to do is ask open ended and closed ended

    questions. This can start out by asking simple questions like does the computer turn on and

    asking if everything is plugged in. After some of the closed ended questions are asked, move

    onto open ended questions. Good open ended questions should follow a Who? What? When?

    Pattern. For example, who is affected by this problem? Who else is affected? What was the user

    doing when the problem first started? What error messages did the user get? What happened that

    may the user call the help desk (shut off, applications not responding)? What program was the

    user using? What did the user do to try and fix the problem before calling the help desk? Finally,

    ask questions about when the problem happens. When did the user first notice the problem?

    When does it occur most often? Has it happened before and how was it fixed that time? When

    the help desk has gathered enough information they can answer the question about why this

    problem happened.

    The next thing to do is to try and replicate the problem. Try and have the user repeat the

    steps that caused the problem and explain what is happening. If the user can repeat the problem

    or if the help desk can replicate the exact steps, then it can be easier to find a solution. For

    example, if a user calls because a program will not open, have the user start at the beginning and

    repeat the same to try and open the program. If possible, try and see if the user can access the

    program on another computer. That can help determine if the problem is isolated to one

    computer or if there is a larger problem. See if the user can access other programs to make sure

    there is only one problem or if there are many.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    12/31

    11

    11

    The third thing to do is to come up with a root cause analysis. A root cause analysis is a

    process used to identify the underlying factors that are causing a problem (Sanderson, 2004).

    This can be more time consuming because the help desk may be fixing more than just the reason

    why the user called in the first place. But the idea is to figure out why the user had the problem

    and fix that so the user does not have the same problem again. To help get to the root cause, the

    help desk must continue asking why questions to the user. In root cause analysis, there are

    three steps of information processing.

    1. Identify cause areas2. Identify underlying causes3. Identify root causesTo further understand each of the three steps listed above, this section will provide more

    details about them. For example, suppose a user contacts the help desk because their printer is

    not working. Some of the possible root causes could be that the printer is not plugged in, it is not

    connected to the computer or it does not have paper. If the printer is not plugged in or does not

    have paper, the solution is fairly easy. It may be more difficult to help the user connect the

    printer to the computer. If the printer is plugged into the wall and the power is supplied from the

    outlet or if the printer has plenty of paper, it becomes more difficult to determine the root cause.

    To identify underlying causes the help desk should determine if the problem is an isolated

    problem or if affects the entire network or other users. If the problem affects many users, the

    help desk should try and resolve the root problem instead of focusing on just the individual users.

    One way to help diagram a problem is to use something called a Fishbone Diagram. A

    fishbone diagram is a representation used to identify all possible causes of a situation

  • 7/30/2019 IT 225 Phase 5 Individual Project

    13/31

    12

    12

    (Sanderson, 2004). This can be a very useful tool to help identify problems. To create a fishbone

    diagram, first draw a straight line on a piece of paper. This line is referred to as the bone. Next,

    write a problem statement at the end of the bone. A problem statement is just a brief description

    of the problem, for example, the user cant print. Write a list of possible causes along the top and

    bottom of the paper and draw a line to connect the problems to the bone. On each line, write any

    possible problems that could be related to the main problem.

    The third step is togenerate options. With generating options, the idea is to come up with

    solutions to the users problem. There are various techniques used to come up with solutions.

    One popular way is by brainstorming. Brainstorming is usually a group of people who work

    together solving a problem. An example of an increasingly popular brainstorming technique is

    called mind mapping. In mind mapping, there is a central word or phrase and that could be the

    users problem. Connected to the central idea are other problems, possible solutions or other

    information, like is this a network problem or is it just one user? A brainstorming group should

    Supplies

    The user cant print.

    Is there paper?

    Power

    Is it plugged in?

  • 7/30/2019 IT 225 Phase 5 Individual Project

    14/31

    13

    13

    be open to suggestions and many possible solutions. And since the goal is to solve a problem,

    there should be a reasonable time limit attached to the session.

    The fourth step is to evaluate and prioritize options. In this step, there are three primary

    approaches used to evaluate possible solutions to a problem (Sanderson, 2004). The first

    approach is module replacement. Module replacement is done when the problem is possibly

    caused by a piece of hardware. Each piece of hardware is replaced and if the problem is solved,

    that piece of hardware was likely the cause. Module replacement is usually the replacement of

    the hardware that may be causing the problem, but it can also be a solution for a software issue.

    For example, if an application is not working correctly, the module replacement technique can be

    used for uninstalling then reinstalling the program.

    The second approach is hypothesis testing. Hypothesis testing is when the help desk tries

    to solve the problem by testing different solutions. For example, use a printer that does not print.

    The first hypothesis could be that the printer is not plugged in. To test the hypothesis, check and

    make sure the printer is plugged in and will turn on. If that does not solve the problem, move to a

    second hypothesis. For example, after testing the first hypothesis, it is confirmed that the printer

    is plugged in and turns on, so the second hypothesis is that the printer is not connected to the

    computer. These steps and hypothesis testing continues until the problem is solved.

    The third approach is configuration management. With configuration management, a help

    desk will try to start and run a system using only a basic configuration. For example, if a user

    cannot access the internet, a help desk will try to connect online using cables connected to the

    modem. If that is successful, the help desk can start to add devices like switches and routers. The

  • 7/30/2019 IT 225 Phase 5 Individual Project

    15/31

    14

    14

    help desk should make sure they maintain an internet connection every time they add a device. If

    the connection is lost after a device is added, that may be the cause of the problem.

    The fifth and final step is to determine a course of action. After all the testing and

    questions are asked and a help desk has a solution, they must determine a course of action. A

    course of action is just a decision about what to do next. There are some things to consider

    before implementing a course of action. Some things to consider are how quickly can a solution

    be implemented? If the problem is isolated to one user, the solution may be implemented fairly

    quickly but if multiple users are affected and there are many steps required to complete the

    repair, the implementation may be slow. Another consideration is determining if there are

    enough resources available to help. If one person must implement the solution for many users,

    perhaps other option should be considered, like contracting the work out. What is the cost of the

    proposed solution? If a user has multiple issues, would it be cheaper and faster to buy a new

    workstation or have the help desk manage the issues? Finally, what is the likelihood of

    eliminating the root cause of the problem so it does not happen again? For example, if a problem

    is determined to be caused by a faulty power outlet, can the outlet be replaced or is there another

    solution.

    Solving problems is never easy to do. But when all parties communicate clearly and

    openly, it can be tremendously helpful and save time for everyone involved. And when a help

    desk follows a defined structure to help determine problems, acquire solutions and implement

    those solutions, it seems like it is much easier to solve large problems and can make solving

    smaller problems even faster.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    16/31

    15

    15

    IT SYSTEMS SUPPORT

    After carefully reviewing phone based support systems, it was determined that it was not

    the best approach for our company. As an alternative, we would like to implement a web based

    solution that includes self- service applications and a knowledge base. We will carefully explain

    what each of those are and how they may be used in this situation.

    Description of Self Service Applications

    A self- service application is a computer program that allows users to solve their own

    problems through the use of a support website (Sanderson, 2004). There are many advantages to

    using a self- service application. Some key advantages include immediate availability to try and

    solve a problem, meaning the user can try and use the system to solve a problem immediately

    instead of waiting for a help desk to open or an agent to become available.

    A company can use a variety of tools to build a Web Based Self Service Application. One

    commonly used technological tool that is used is an online problem ticket form submission. With

    a ticket form, the user enters information onto a premade form. The information should include

    the users name, the type of problem (like email, printing, hardware, software, other, unsure) and

    contact information in case the problem is escalated or if there are any other problems, the

    company can contact that user. The ticket form should also include a section that identifies the

    priority of the problem and a text area where the user can describe the problem. After the user

    completes the form and submits it, the form is sent to a help desk employee who can review the

    ticket and work on a solution.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    17/31

    16

    16

    Real Time vs. Delayed Assistance

    Real time assistance is when the user and help desk are in live contact with each other

    and actively interact. An example of real time assistance is when a user can speak with a help

    desk employee directly on the phone. Another example of real time assistance would be instant

    messaging or chatting. With instant messaging, there is an immediate connection made between

    the user and help desk. As a benefit for a help desk, messaging applications can be preformatted

    which can save time throughout the process. Another interesting tool that real time assistance can

    use is monitoring web site activity (Sanderson, 2004). This would be useful when a user visits a

    help area of knowledge base. If it does not appear like the user has found a solution, the help

    desk can initiate a messaging application to provide additional support.

    Another real time assisted support tool is remote control programs. These programs

    appear to be increasingly popular and easy to use. With this tool, a help desk employee connects

    to a users computer through an internet connection and can then perform tasks on the users

    computer. With this tool, the user does not have to do anything. Some things the help desk can

    do is log into the computer, display and update configuration settings, reboot the computer,

    download applications or transfer files (Sanderson, 2004).

    There are three modes that remote control programs work with. They are watch, share

    and control. In the watch mode, the help desk can watch what is happening on the users

    computer so the help desk can get a better understanding any problems or issues. In the share

    mode, both the user and help desk support have access to the computer. In the control mode, the

    help desk has complete control over the users computer.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    18/31

    17

    17

    Delayed assistance is when there is a time delay between communication from a user and

    the help desk. An example of delayed assistance tool is when a user submits a form to the help

    desk. There is a communication between the user and the help desk, but it is not in real time. It is

    delayed. The fact that there is a delay does not mean this is an ineffective tool for a help desk.

    When a user submits the form, it gives the help desk an opportunity to collect whatever

    information may be needed to help solve the problem. A potential problem with this kind of

    support though could be if a user submits a form but does not fill out all the requested

    information. For example, if a user submits a form and complains that a printer is not working

    correctly but does not provide any other information, there could be a long delay before the help

    desk can address the issue because they will have to ask the user to resubmit the form.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    19/31

    18

    18

    Knowledge base

    Like a ticket based support system, a knowledge base also requires a user to complete a

    form. The form will be a collection of searchable data that can include almost any information

    about the problem the user has. The form should try and gather information about the type of

    problem (hardware, software, printing, email, internet access) and may include areas for the

    user to identify specifics about their system, like the computer brand or what kind of printer they

    are having problems with.

    Once the form is completed, it is submitted and is automatically searched for matching

    words or key terms from the form. Matching words or key terms are searched against a

    collection of data and when matches are found, they are identified as possible solutions. Once the

    knowledge base has identified possible solutions, they are presented to the user who can then

    pick whichever seems to be the best. An important consideration when creating a knowledge

    base is that if the user is unable to find a solution after searching the knowledge base, there must

    be another way to contact a help desk. For example, there should be an option to submit the form

    for review by help desk employees.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    20/31

    19

    19

    PROCESSES AND PROBLEM RESOLUTION

    Before a company begins to define what constitutes a service level and what kids of

    metrics will be used to define success, there should be an understanding about what a service

    level is. A SERVICE LEVEL measures a performance of a system (Rouse, 2010). Systems

    should constantly reviewed and updated to make sure they are effective and meeting its

    demands.

    Once the company has defined a service level, they can begin to define the SERVICE

    LEVEL AREEMENT. A Service Level Agreement is a written agreement between a help desk

    and its customers. The agreement outlines in detail what services, products and support structure

    that the help desk provides. For example, a service level agreement between a help desk and its

    customers could state something like the help desk will provide services Monday through Friday

    from 6am to 11pm but not on weekends or nationally recognized holidays. The SLA could also

    describe the type of support available to users (phone based or web based). Another area that

    could be included with an SLA is what the help desk responsibilities are when a system is having

    trouble, like when a printer is not working or if a problem is going to take a long time to resolve.

    Service Level Agreements should be created with input from both the help desk and the

    business the help desk will support. The SLA should be easy to understand and be clearly

    written, so whoever reads it can understand the terms. The SLA should also define the roles and

    responsibilities of the users and help desk and provide a reasonable response time for problems.

    Lastly, a SLA should include criteria for a service evaluation (Sanderson, 2004).

  • 7/30/2019 IT 225 Phase 5 Individual Project

    21/31

    20

    20

    To help determine the success or failure of a SLA, the company should use clearly

    defined metrics that are called performance metrics. Some examples of performance metrics and

    a brief overview of what they measure are listed below.

    Total number of calls: This metric will measure how many service requests are madewithin a certain period of time.

    Average speed to answer: This metric will measure how long a caller has to wait beforetheir call is answered by a help desk employee.

    Average hold time: This metric will measure how long a caller is placed on hold beforethey are helped by a help desk employee.

    Average abandon rate: This metric will measure how many calls come into a help deskbut are not answered by help desk analysts.

    After work time: This metric will measure how much time a help desk employee takes tofinish their work after a call. This can include any time spent documenting the call and

    steps to resolution.

    Average call handling time: This metric will measure how long it takes the help deskemployee to come up with a solution to the problem. It should be noted that more

    complex problems will often take longer periods of time to solve them.

    Available time: This metric will measure the amount of time that a help desk employee isavailable to respond to calls for help. When a call is assigned to a help desk employee,

    they are removed from the list of available agents and when the call is completed, they

    are returned to the available list.

    Auxiliary time: This metric will measure the time that help desk employees spend onother responsibilities other than actually helping customers.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    22/31

    21

    21

    First call resolution: This metric will measure how often the first call to a help desk isresolved. The

    Based on this list, one metric that will help keep the customers happy is the average

    speed to answer. If calls to a help desk for a service request are answered quickly and dealt with,

    the customer will be happy with the service. Another metric that can help keep the customer

    happy is limiting the average hold time. Customers want to speak with the help desk when they

    call, not be placed on hold for long periods of time. So keep the wait times at a minimum and the

    customer will be happy.

    One metric that will help keep the help desk analyst happy is the total number of calls. If

    help desks are swamped by calls and are constantly trying to play a type of catch up, morale

    could negatively be effected. Another metric that can keep help desk analysts happy is the After

    Work Time. The After Work Time measures the time it takes help desk employees to finish their

    work after a service call. If the help desk employee has a fast turn around and is quickly finishing

    work after a call, perhaps offer a reward or other incentive to encourage the good performance.

    The metric that has the best chance of success and customer satisfaction is first call

    resolution. This metric will measure how many calls were successfully handled by the help desk

    the first time a customer called. To help illustrate my point, if a customer had to make repeated

    calls to a help desk to resolve a problem, this would indicate a potential problem and the

    customer would probably not be satisfied. But if the initial calls to the help desk were answered

    quickly and problems were solved, the customer will be happy.

    By comparison, when customers have their problems solved quickly, they can be more

    pleasant to interact with. When customers do not have their problems solved when they expect

  • 7/30/2019 IT 225 Phase 5 Individual Project

    23/31

  • 7/30/2019 IT 225 Phase 5 Individual Project

    24/31

    23

    23

    PERFORMANCE MANAGEMENT

    BUSINESS CONTINUITY

    A major consideration when developing a business continuity plan is data backups.

    Backing up data should never be overlooked. If a company does not have data backups and there

    is a catastrophe or if computers are lost and damaged, there may be no way to recover the

    information that was on those computers.

    It is also a good practice to have multiple backups available to ensure the most recent

    version of work is available. Some backup programs will backup everything automatically; other

    programs will only backup things that have changed since the last backup. However the backup

    system is designed, it should be planned out and carefully followed. The best backup program in

    the world will be useless if it is not used.

    An important thing to consider is securing the data backups. The company should protect

    backups the same way they protect other data. The company should limit who has access to data

    backups and where the backups are stored. Finally, a company should understand how to recover

    data from the backup before it actually needs to use it.

    Some final important elements to ensure business continuity is the ability to protect

    against power loss. One way to protect against power outages would be to have power

    generators. Another possibility could be to use an uninterruptible power supply or UPS. A UPS

    is designed to shut down a computer or system when a power supply is interrupted. A UPS can

  • 7/30/2019 IT 225 Phase 5 Individual Project

    25/31

    24

    24

    also start up another system though, like a generator. Power surges pose a threat any electronic

    device but one way to protect against them is to use a surge protector.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    26/31

    25

    25

    PHYSICAL SECURITY

    Physical security of computers is something companies should take extremely seriously.

    A good security plan can protect computers and information from internal threats like theft and

    vandalism and external threats like hackers and viruses. Carefully planned and executed security

    protocols can also help to protect against natural disasters, catastrophes and accidents

    (Sanderson, 2004).

    Being prepared is a key part to developing a security plan. That means a company must

    acknowledge the possible security threats it faces and work to combat those threats. For example,

    to protect against theft or other vandalism, there are several things a company can do. A few

    things the company can do are to limit employee access to certain areas, like server rooms or

    other sensitive data. The company should require visitors to check in before entering the facility.

    The company should have locks on all the doors which will further prohibit unauthorized access.

    The company should also consider encrypting computers that contain important business

    information. Some things a company can do to prevent against external threats are to control

    access to the network and use antivirus software to protect against viruses.

    There are also things a company can do to protect computers in the event of a natural

    disaster or other catastrophe. One thing the company should do is have an alarm system. There

    are many alarm systems that offer protection against fires and break-ins but there are also alarms

    that can monitor for other threats as well. For example, there are systems that can monitor

    moisture levels in a server room that help to protect against things like floods or water damage.

    There are many ways a company can help to protect its computers and facility. It is

    crucial that a company prepares for problems before they happen. With proper planning and

  • 7/30/2019 IT 225 Phase 5 Individual Project

    27/31

    26

    26

    implementation of solid security protocols, a company should be able to prevent or respond to

    many kinds of threats.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    28/31

    27

    27

    NETWORK INFASTRUCTURE AND SECURITY

    Network security is another critical business consideration. There are many things a

    company can do to protect its network infrastructure and provide security. One way a company

    can do that is by requiring users to log into the network by using a user name and password.

    Each employee should have a unique identification and password that they will use each time

    they try to access the network.

    Another way to do protect a network is by using routers. A router is a network device that

    examines data packets and determines where the data packet should go in the network

    (Sanderson, 2004). When a router examines the data packet, it checks for the destination address

    that is contained inside the packet. If the address matches an address in the network, the router

    will recognize it and send the data packet to that address. If there is no such address, the data

    packet will be discarded.

    A firewall is another crucial device used to protect a network. A firewall is a network

    device that is usually used between the internet and a company. A firewall is designed to clock

    unauthorized access to a network. It could be worth noting here that there are hardware firewalls

    and software firewalls, but most of the time when people are referring to firewalls in terms of

    network protection and access control, it is the hardware firewall.

    Encryption is another important element. Encryption was also mentioned as a way to

    enhance physical security (because drives and files should be encrypted), but it is also a way to

    help with network security. And just because a computer hard drive is encrypted does not mean

    that files from that drive will be encrypted when they are sent across a network. It is a different

    use of encryption technology. In addition, there are times when encryption is strongly

  • 7/30/2019 IT 225 Phase 5 Individual Project

    29/31

    28

    28

    recommended or required, like when passing credit card or other sensitive information across the

    internet.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    30/31

    29

    29

    APPLICATION INFASTRUCTURE AND SECURITY

    Application infrastructure deals with the way applications are used across a network. For

    example, a company may use a financial software program to keep track of its financial records.

    The financial program may need to be accessible to several people across the company network,

    like accounting offices in different locations, but not every user should be able to access that

    information. The company must develop a security plan to protect applications or sensitive

    information.

    One way to secure these applications and information is to require additional sign on

    methods in order to access the information. For example, require employees to use different user

    names and passwords to login. Another way to secure the data is by requiring employees to

    periodically change their passwords and make sure the passwords meet certain criteria, like 8

    characters and contain letters and numbers.

    Another way to secure the applications is to control where they are used. Limit the

    workstations that have access to the information. Do not allow every work station on the network

    to have access to sensitive information. For example, an accounting department may need access

    to financial software, but a maintenance department probably will not, so do not allow the

    application to be used on those workstations.

  • 7/30/2019 IT 225 Phase 5 Individual Project

    31/31

    30

    REFERENCES

    Rouse, M. (2005, April).Help Desk. Retrieved October 13, 2012, from

    http://searchcrm.techtarget.com: http://searchcrm.techtarget.com/definition/help-desk

    Sanderson, S. (2004).Introduction to Help Desk Concepts and Skills. Burr Ridge, IL.: McGraw-

    Hill Technology Education.

    Rouse, M. (2010, November).service level. Retrieved November 3, 2012, from

    http://whatis.techtarget.com: http://whatis.techtarget.com/definition/service-level