Report

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

MERU UNIVERSITY OF SCIENCE AND TECHNOLOGY

SCHOOL OF COMPUTING AND INFORMATICS

DEPARTMENT OF COMPUTER SCIENCE

BACHELOR OF SCIENCE IN COMPUTER SECURITY AND FORENSICS

(BCSF)

INDUSTRIAL ATTACHMENT REPORT

BY:

WELDON KIPKIRUI KENEI

CT206/0024/18

PERIOD: MAY TO JULY 2022


OVERVIEW

 Summary
 Declaration
 Acknowledgement
 Summary
 List of abbreviations
 Abstract
 Table of contents
 List of figures and tables
 Introduction
 Description of the attachment Establishment
 Report on actual work carried and experience gained
 Summary and Recommendations

i
SUMMARY

This report is compiled in partial fulfillment of the Bachelor of Science in Computer security and
forensics at Meru University of Science and Technology and it serves to provide an overview of
what I learned during the attachment period at The Eldoret National Polytechnic for a period of
eight weeks I was attached at the Institution. The report gives a brief description of the history of
the institution and the duties performed. The duties that I was assigned and the knowledge and
skills acquired are explained as well. Evaluation of the company’s SWOT analysis is explained
at length at the end of the report including conclusions and recommendations.

ii
DECLARATION

STUDENT

I hereby declare that this attachment report is my original work and has not been submitted for
awards in any other University or college. This work forms partial fulfillment of the requirement
in the award of a degree in Bachelors of Science in Computer Security and forensics.

NAME SIGNATURE DATE

________________ ________________ ___/____/_______

SUPERVISOR

This report has been compiled and submitted with my approval to the school of computing and
informatics at Meru University of Science and Technology

NAME SIGNATURE DATE

______________ ________________ ___/____/_______

iii
ACKNOWLEDGEMENT

I do hereby humbly offer my gratitude to the Almighty Father, God, for his love all through the
journey. Secondly, I would like to thank The Eldoret National Polytechnic for the great
experience I had while in attachment. I would like to pass regards to the ICT officer who was
also my supervisor, and the entire ICT team.

iv
ABSTRACT

Training exercise plays a vital role to the career path of an attaché in the production of a highly
skilled and competent personnel with practical experience in areas of concern. That is, students
are able to acquire practical skills related to the theory they learned in the class environment,
new knowledge, skills and experience.

v
Table of Contents
OVERVIEW.................................................................................................................................................i
SUMMARY................................................................................................................................................ii
DECLARATION........................................................................................................................................iii
ACKNOWLEDGEMENT..........................................................................................................................iv
ABSTRACT................................................................................................................................................v
CHAPTER 1................................................................................................................................................1
INTRODUCTION.......................................................................................................................................1
1.1: Expectations from the attachment.....................................................................................................1
CHAPTER 2................................................................................................................................................2
DESCRIPTION OF THE ATTACHMENT ESTABLISHMENT...............................................................2
2.1: Location and brief history.................................................................................................................2
Contact address........................................................................................................................................2
2.2: Objective of the establishment..........................................................................................................2
2.2.1: The Vision.................................................................................................................................2
2.2.2: The Mission...............................................................................................................................3
2.2.3: Core values................................................................................................................................3
2.3: The various departments/units in the establishment and their functions...........................................3
2.3.1: PRINCIPAL ACCOUNTABILITIES........................................................................................5
CHAPTER 3............................................................................................................................................6
REPORT ON ACTUAL WORK CARRIED OUT AND EXPERIENCE GAINED...............................6
3.1: ICT EQUIPMENT MAINTENANCE..............................................................................................6
3.2: ASSEMBLING AND REPAIR........................................................................................................6
3.3: TROUBLESHOOTING DEVICES..................................................................................................6
3.4: USER SUPPORT.............................................................................................................................6
3.5FIELD ATTACHMENT ACTIVITIES..............................................................................................7
Software Installation and maintenance................................................................................................7
Hardware Maintenance........................................................................................................................7
CHAPTER 4................................................................................................................................................8

vi
SUMMARY AND RECOMMENDATIONS..............................................................................................8
4.1: Summary of attachment activities.....................................................................................................8
4.2: Problems encountered.......................................................................................................................8
SWOT ANALYSIS.....................................................................................................................................9
Strengths..............................................................................................................................................9
Weaknesses.........................................................................................................................................9
Opportunities.......................................................................................................................................9
Threats.................................................................................................................................................9
CHAPTER 5..............................................................................................................................................10
CONCLUSION.....................................................................................................................................10
RECOMMENDATIONS.......................................................................................................................10
REFERENCES..........................................................................................................................................11

vii
CHAPTER 1

INTRODUCTION

This is an industrial report which is a limelight to achievements gained, skills and expertise
acquired during the entire course of attachment.

1.1: Expectations from the attachment

As an upcoming computer scientist focusing on network security, I look forward to get hands on
experience in various units within the Networking department. I am confidently convinced to
gain knowledge, skills and expertise from qualified professionals in the organization, who
showed interest in guidance and knowledge sharing in their reception period. I feel appreciated
and encouraged to consciously concentrate on everything this team offers.

I also expect to gain experience in office management and service delivery practices which are
essential in today’s job market.

An opportunity to engage in world-class research in the interrelated technologies that will enable
people to create, manipulate and share electronic information with others wherever they happen
to be, for professional and social purposes.

1
CHAPTER 2

DESCRIPTION OF THE ATTACHMENT ESTABLISHMENT

2.1: Location and brief history

The Eldoret National Polytechnic is located in Eldoret off Kapsabet-Kisumu Road. It is a college
that strives to offer hand on skills not only to their students but also to the attaches and interns
who work in the institution. The Eldoret National Polytechnic has been showing tremendous
growth since inception and has been named severally as among top tier technical colleges in
Kenya in producing skilled technical students.

Contact address

The Eldoret National Polytechnic,

P.O Box 4461-30100, 

ELDORET.

2.2: Objective of the establishment

The main objective of the institution is to equip many trainees with research skills and expose
them to the trends in technology so that they can become sustained in their careers

2.2.1: The Vision

To be a Centre of Excellence in Technological Advancement.

2
2.2.2: The Mission
To Produce Human Capital and Advance Technology through Innovative Training for a
Dynamic Economy.

2.2.3: Core values

 Stewardship
 Faithfulness
 Integrity
 Commitment
 Compassion
 Respect
 Diversity

2.3: The various departments/units in the establishment and their functions

ICT is headed by the ICT Officer/HOD and stands as a department on its own.

3
MANAGEMENT
BOARD

ICT CBO FINANCE

ICT OFFICER AUDITOR MONIES TREASURER

ASS. ICT
SALES PROCUREMENT
DIRECTOR

BENEFICIARIES

SALES OFFICER ADVERTISEMENT

4
2.3.1: PRINCIPAL ACCOUNTABILITIES
 Responsible for the installations.
 Responsible for Hardware maintenance.
 Responsible for all networking, connectivity and setting up of meetings in the institut

2.3.2: Principal Accountabilities

1. CCTV installations.
2. LAN and WAN connectivity.
3. Management of the school portals.
4. Facilitation distribution of all devices in the Institution.
5. Maintaining and updating the Database.

5
CHAPTER 3

REPORT ON ACTUAL WORK CARRIED OUT AND EXPERIENCE GAINED

3.1: ICT EQUIPMENT MAINTENANCE

I have been involved in various maintenance practices within the organization. These practices
include: -

 Blowing and dusting system units, monitors, keyboards and power savers.
 Wiping and brushing screens, keyboards and motherboards.
 Checking and replacing damaged cables.
 Keeping and arranging cables orderly for safety awareness using cable ties and conduit
pipes.
 Blowing, dusting, wiping and brushing switches, routers and their cabinets as well as
arranging the cables orderly.

3.2: ASSEMBLING AND REPAIR

I have been working together with Network and Telecommunications personnel in assembling
and repair of the equipment. These include Cisco phones, switches, Cisco systems Access point
gadgets and D-Link equipment.

I have also been assigned to assemble computer components to check on faulty and working
ones. It involved assembling system unit to check and diagnose missing or faulty components
like power supply, CMOS Battery, Motherboard, RAM modules, hard disks, cables (SATA
power cables, power connector e.tc).

3.3: TROUBLESHOOTING DEVICES

This included diagnosis for faulty components and applications/software, malfunctioning


components and malware/virus detection.

3.4: USER SUPPORT

 Helping staff to install and configure software.


 Assisting in Email configuration as well as use and easy access.

6
 Helping staff to print with newly installed Xerox Versalink printers. I would show them
how to print from a remote desktop to a centralized printer as well as showing them how
to scan documents (To an Email and handouts).
 Assisting the staff in data collection and entry.

3.5FIELD ATTACHMENT ACTIVITIES


The field attachment activities that I carried out during the training consists of networking, data
collection, hardware troubleshooting and installation, software installation and user support.

Software Installation and maintenance


It includes;

 Antivirus software such as Kaspersky Endpoint Security 1, Kaspersky Network agent and
installation of SAP that is used to make reservations.

 Microsoft outlook mail configurations

 Maintenance involved checking if the installed antivirus software is updated

 Updating computer programs, installing missing ones and new programs to the new
computers before handing over to various staff.

 Operating Systems such as Windows XP, Windows 7 and Windows 10. Maintenance
involved checking if the installed antivirus software is updated.

Hardware Maintenance
It involved;

 Maintaining a detailed account of all the computers in the organization

 Carrying out first hand repairs and replacement of faulty devices like failed RAMS

 Shifting of the hardware from one location to another

 Replacing faulty hardware like mouse, keyboard, power supplies etc.

7
CHAPTER 4

SUMMARY AND RECOMMENDATIONS.

This chapter summarizes the activities undertaken within the period I have been in office.

4.1: Summary of attachment activities

It has been great time and experience to work with The Eldoret National Polytechnic. I do
appreciate the workforce indulged in mind since the time I joined. It has been a great experience
to work with the company’s personnel who have considerably guided me through the Institution.

4.2: Problems encountered


The attachment period has been smooth despite that a few challenges were realized. These
challenges include: -

 Cold weather especially in the morning due to the geographical position of the
organization
 Financial constrains was the major problem I encountered during my period in the
company.
 Language barrier.
 4.3: Suggestions for improvement of the scheme.
 Though TWL offers great experience, it is with concern that students should be
encouraged through a way of payment in order to share freely their own
experiences and skills, simply because it might demotivate some skilled students
hence fail to offer some of the skills or experiences.
 The institution should encourage use of protective wear through advice to best
companies manufacturing safety and foot wear.

8
SWOT ANALYSIS

Strengths
The ICT department comprises of highly skilled staff who are determined to doo their work
diligently to meet the mission and vision of Good Shepherd Sisters-Chalice.

Weaknesses
Lack of proper cohesion between service tenants and property owners

Opportunities
The organization has the ability to help the less privileged in the society equipping them with the
knowledge and resources to better their lives

Threats
The institution had poor security policies and if there were any, they were poorly implemented.

9
CHAPTER 5

CONCLUSION

The work scope and duties assigned focused on hardware, software, networking, networking
security. database, data collection and analysis work were highly relevant to my field of study
because I could relate my theory knowledge to the field practical.

RECOMMENDATIONS
The institution has so far implemented all security features to the institution and should continue
in being up to date with the emerging technological and security trends to avoid being
compromised by possible data breach.

10
REFERENCES
https://thenyeripoly.ac.ke/

11

You might also like