Professional Documents
Culture Documents
System Admin Tech Newsletter - Ninth Issue
System Admin Tech Newsletter - Ninth Issue
System Admin Tech Newsletter - Ninth Issue
Technology Newsletter
SYSADMIN @ Jocata -
Network Management and Data Security Initiatives
Many organizations around the world have already embraced work-from-home practices to ensure business conti-
nuity and limit employee exposure to COVID-19 infection. In this regard, Jocata has strongly encouraged its employ-
ees to work from home and insisted on practicing health and hygiene guidelines and other safety protocols set by the
government, for keeping themselves and their families safe.
Needless to say that the pandemic has brought a profound change in terms of how we conduct our business with
more than 70% of our staff working remotely. This laid a massive emphasis on infrastructure availability, network
management, and cybersecurity.
Also, with Jocata being an ISO 2700:2013 standard organization, it is imperative that we implement and practice in-
formation security standards and controls that help us in establishing, operating, monitoring, reviewing, maintain-
ing, and continually improving our Information Security Management Systems (ISMS). These recommendations are
very useful in conducting our business smoothly without compromising on data security.
Infrastructure Availability
Jocata’s head count has grown rapidly in the last year. We are now around 500+ employees in Jocata. Increase in the
number of employees means increase in the IT ticket volumes. We ensure that any ticket raised to IT Support is re-
solved within a time frame of 2-4 hours. To achieve this target, we have spilt our IT Administration team in to two
sub-teams:
• SysOps (System Operations) SysOps DevOps
• DevOps (Development Operations) The SysOps team handles all The DevOps team handles the
the tickets related to infrastruc- tickets related to configurations,
ture requirements such as deployments, migrations, and
SysAdmin@Jocata 1 hardware and software compo- backup creations. Besides these,
Inside this issue:
Creating Tickets
Creating IT Support requests is now made easy, as
We created new Microsoft Excel templates for differ-
Jocatians can raise their requests to the SysAdmin team
ent types of IT support requests/processes, which all
either through email or YouTrack. We have automated the
the employees need to follow and update the details
IT Support Ticketing process in a way that whenever an
in the respective templates and attach the same,
employee sends an email to its@jocata.com a ticket is au-
whenever they are raising a ticket in YouTrack or
tomatically created in the YouTrack and the same is as-
sending an email to the IT Support team.
signed to either L1 or L2 member in the SysAdmin team,
in Round-robin method.
The following table lists the links to IT Support pro-
Similarly, the employees can send DevOps related re- cess templates that the employees need to use as per
quests to devops@jocata.com. The tickets get auto created their requirements.
in the YouTrack and assigned to the team members in
DevOps division.
Request Type Link to the Templates
As mentioned earlier, the team tries its best to address
and close a request within 2 to 4 hours, after it is raised.
New Server Request
However, this is not always possible.
Form
Network Management
Optimum network performance at all levels is an important aspect of our business. To ensure our network is up and
running all the time, we have deployed a network monitoring and management tool called Zabbix. Zabbix observes
every portion of our network and automatically:
• collects network performance and utilization information to support service level agreements.
• provides network health report alerting the SysAdmin team whenever the disk space is low, device status reach-
es a critical state, device temperature is too high, etc.
• determines required network modifications to improve performance and supports increasing demands.
• alerts the team when configuration changes such as adding or deleting devices from the network, modifications
in the device serial numbers, etc, are identified.
Page 3 Technology Newsletter
• Server Availability
• User Management
• Company Files and Directory Access Management
• Disk Space Management
Considering the current crisis where most of our employees are working from home, we have streamlined our VPN
Access Request process where the SysAdmin team verifies:
• credentials of the employee who raised the VPN access request
• resource for whom the VPN access is required
• reason why the resource needs VPN access
• access approvals from the server owners
Only when all these details are accurate, the team provides VPN access to the resource. Adherence to this process
ensures that we are providing right access to the right resource (Refer IT Support Process Templates).
Usage of TeamViewer
In addition to deploying VPN in all the machines, we also use TeamViewer, a remote access and remote-control
software which is used for troubleshooting the issues and for installation and uninstallation of software on differ-
ent machines, and so on.
TeamViewer offers another layer of security to our data, as it connects to the employee’s machines only through
the automatically generated unique IDs and passwords. The tool works only within Jocata’s network and the data is
transferred completely through the secured channels. Another key feature of the tool is, the TeamViewer network
servers verify the validity of the IDs of both the endpoints, before establishing a connection. (For information on
security aspects of TeamViewer refer to https://en.wikipedia.org/wiki/TeamViewer.)
Page 4 Technology Newsletter
With enough preparedness, and by having necessary infrastructure in place, deploying highly scalable and AI inte-
grated network management and security monitoring tools, streamlining the IT Support ticketing processes, imple-
menting cybersecurity guidelines to minimize data breaching activities, and also training the employees on efficient
and safe usage of Jocata assets, we, the SysAdmin team is persistent in making sure every Jocatian is working
smoothly without any hindrance while protecting our sensitive data.
T H I S M O N T H
Technology History
May 23, 1994, marks the first appearance of Java, a class-based, object-oriented programming language. It was
James Gosling who created Java, teaming up with his colleagues at Sun Microsystems Inc. (acquired by Oracle in
2010). The idea was to come out with a virtual machine and a language similar to C/C++, which could offer greater
uniformity and simplicity. Gosling’s ‘Green Team’ started the project in June 1991, adopting the file extension ‘.gt’.
Later, the project was named OAK, until eventually renaming it as ‘java’. Java is not an acronym, but a type of es-
presso bean. Hence the logo sports the picture of a coffee cup.
In 1995, Java 1.0 met its first public implementation. Java came along with a tag ‘Write Once, Run Anywhere’ due to
the cross-platform benefits such as writing source-code once and reusing it across platforms, faster development,
wider market reach, and so on. The evolution of the language over the past 25 years, from being used in digital ser-
vices such as Set-top boxes, VCRs, etc, to becoming platform-independent, robust, architectural neutral, secured,
and so on, is what differentiates Java from other compiled languages such as C++ and C. Therefore, Java is consid-
ered as one of the most successful and widely-used programming languages for creating any web application.
Work-from-home has become more popular nowadays. Most IT professionals have been working from home con-
tinuously for more than a year now because of Covid-19 pandemic and lockdown. The companies instruct their
employees to exercise precautions and follow basic security measures to maintain data privacy and security. How-
ever, working from out of office could compromise their computer to cyber-attacks unlike an office environment.
Here are a few tips that help you in preserving your organization’s data from cyber-attacks:
Browser Plugins
Browser plugins from unknown or unidentified devel-
opers can retrieve relevant information including cre-
dentials from the computer. You must avoid installing
such plugins.
Recognizing Phishing, Spear Phishing, and
Whaling Attacks Securing Web Applications with HTTP Strict
Transport Security (HSTS)
Email-based scams or malicious email attachments pro-
vide media for Phishing, Spear Phishing, and Whaling This web security policy mechanism allows web
attacks. Verifying the complete email address of sender browsers to access websites only via secure HTTPS
before opening any attachment or responding to the connections (and never HTTP). This ensures protec-
email prevents such attacks. Email received from out- tion of your websites from protocol downgrade and
side of Jocata domain usually comes with a caution. cookie hijacking attacks.
Working from home can also expose physical security of the computers. Although automatic locking is enabled in
most office computers when unattended for a pre-set time, locking the device manually prevents anyone from ac-
cessing the computer. Furthermore, storing the device in a locked cupboard or so will avoid devices from being
stolen. Practicing these measures provides a secure workspace at home as that of an office workspace.
Puzzle
Cyber Security
Across
2. An automated software testing technique which feeds random, invalid data to monitor behavior of a computer
program.
Page 7 Technology Newsletter
Puzzle (contd..)
Across (contd..)
4. A technique intended to distract hackers from a real target with a fake target (a computer or data) and make
them pursue it.
6. An Internet standard protocol that allows email clients to retrieve email messages from a remote mail server.
8. A software which secretly monitors and captures keystrokes made by user.
10. A process in which fraudsters create a fake social media account for financial gain or stealing data.
12. The inherent risk and nature in IT technologies and systems are evaluated by trained and skilled profession-
als known as IT _____.
13.The amount of data that can be transferred between two points in a network within a specific interval.
Down
1. The process of verifying a user identity, process or device before allowing the user to access resources in a
system.
3. A computer program used to test and detect issues in a target program.
5. An entity designed to securely manage data flows across connected networks from different security do-
mains.
7. A basic mechanism that denies access for the items on the list.
9. A set of software tools that disguises itself in the system and allows privileged access and control to an unau-
thorized user.
11. The percentage of time of operation or availability of a computer or a machine.