Question

What is a management maintenance model? What does it accomplish? [MANAGEMENT OF INFORMATION SECURITY][Please provide a...

  1. What is a management maintenance model? What does it accomplish? [MANAGEMENT OF INFORMATION SECURITY][Please provide a long explanation for what it accomplished.] Thank you.

Homework Answers

Answer #1

Answer:-

Maintenance management is just the process keeping something maintained! Whether that’s a piece of equipment, your house, a facility, or more. I think what you might be getting at are what are the different types of maintenance?

Preventative Maintenance

Example: Scheduled maintenance. Replacing filters on an HVAC every 6 months.

Preventative maintenance (or preventive maintenance) is maintenance that is regularly performed on a piece of equipment to lessen the likelihood of it failing. Preventative maintenance is performed while the equipment is still working, so that it does not break down unexpectedly.

Breakdown or Reactive Maintenance

Example: Wait until your HVAC stops working and call a technician to come fix it.

Breakdown maintenance is maintenance performed on equipment that has broken down and is unusable. It is based on a breakdown maintenance trigger. It may be either planned or it can be unplanned.

Predictive Maintenance

Example: Having sensors installed in the HVAC machine to tell us operating efficiency and expected efficiency to tell us when we need to replace filters

Predictive maintenance (PdM) techniques are designed to help determine the condition of in-service equipment in order to predict when maintenance should be performed. This approach promises cost savings over routine or time-based preventive maintenance, because tasks are performed only when warranted.

The difference really is in being reactive or proactive. Breakdown maintenance (reactive) occurs only when a machine stops functioning while
Predictive (proactive) seeks to ensure the machine is always working through regular check ups.

Most of the time reactive maintenance takes longer for a technician to tend to as the technician has to trouble shoot what's going on. the parts needed can be extremely expensive (sometimes the entire machine needs to be replaced).

We encourage predictive because you can gauge the health of your equipment and always be informed about its well being.

What’s best you might ask? Well it depends on what you are trying to PM. See this article about predictive maintenance

Maintenance is the set of actions performed during the life cycle of an equipment in order to keep it in optimal working order. It is divided into 3 main categories: curative, preventive and predictive. The correct balance of these 3 approaches makes it possible to optimize the costs incurred in relation to the rate of proper operation.

Curative maintenance also called corrective maintenance or reactive maintenance. Comes after the detection of a problem generally observed by a user or site manager: water leakage, heating failure, elevator failure, blocked automatic gate, electrical problem, etc., the list of problems is endless. Curative maintenance consists of restoring the equipment to working order. The challenge is then to treat the emergency by assigning the repair to the person closest to the place of intervention and most likely to respond. Yuman accelerates your curative maintenance interventions through planning, mapping, assets and mobility management for the technicians in the field.

Preventive maintenance: it is the periodic and anticipated control and maintenance of equipment (e. g. weekly, every 6 months, every year, every 300 hours of use) in order to reduce the probability of failure or breakdown. Avoid operating interruptions or malfunctions that may cause discomfort or even danger to residents and users. In this area, it is essential to respect the frequency of the planned visits. But the large volume of interventions to be carried out, the territory to be covered, the size of the teams can quickly become a real brain twister. Yuman will handle this complexity for you by managing the equipment list, maintenance ranges, maintenance plans, skills, teams, load/capacity. Generating, planning and allocating interventions will become child's play. We will come back to the best practices of preventive maintenance in detail in a future article.

Predictive maintenance consists of the precise monitoring of equipment, via sensors and the transmission of technical data directly from the machine to the cloud, in order to anticipate failures as much as possible and mitigate technical problems before they occur. Machine monitoring makes it possible to adjust the timing of the intervention as closely as possible, in order to reduce costs as much as possible and to carry out "just in time" maintenance to avoid interruptions in operation while limiting travel. The ultimate in maintenance, so to speak. This is the domain of the IoT (Internet of Things). The alerts triggered go directly to Yuman and can either directly trigger the intervention of a technician or allow remote diagnosis and arbitration.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
cultural diversity What is Terror Management Theory (TMT)? How does the theory provide an explanation for...
cultural diversity What is Terror Management Theory (TMT)? How does the theory provide an explanation for racism and intergroup conflict. Provide an example.
1- In your own words, discuss why information security is a management issue. What is management...
1- In your own words, discuss why information security is a management issue. What is management able to do that technology can not? 2- Why do employees constitute one of the greatest threats to information security? 3-What is the difference between a threat and an attack?
Please research the process of setting up a Security Program within a medium sized organization. Provide...
Please research the process of setting up a Security Program within a medium sized organization. Provide a list with short description of the most important 20 things to accomplish during this process. write in your own words.
We've covered Privacy and now we will cover security. What does information security entail? What are...
We've covered Privacy and now we will cover security. What does information security entail? What are some ways to maintain the security of health information? In regards to healthcare and HIPAA
In what ways does the Bank of Canada provide security to the banking system?
In what ways does the Bank of Canada provide security to the banking system?
please explain what does this question mean and give an example. " Provide information on key...
please explain what does this question mean and give an example. " Provide information on key variables of interest. Refer back to the conceptualization section of CH 6 lecture "Defining and Measuring Concepts"
What are the functions of (A) photosystem I and (B) photosystem II? please provide a detailed...
What are the functions of (A) photosystem I and (B) photosystem II? please provide a detailed explanation of each and any important similarities or differences. This is a biochem question so think along those lines when answering. Thank you!
What does it mean to run command as an elevated user? How do you accomplish this?...
What does it mean to run command as an elevated user? How do you accomplish this? List four types of information that the ipconfig command with the /all parameter provides that the ipconfig command without the parameter does not. What type of server resolves a domain name to an IP address?
What of these areas are the most important for Information Security: Technology, Processes, People, Policy, and...
What of these areas are the most important for Information Security: Technology, Processes, People, Policy, and Risk Management? Why? Why needs to be compelling arguments not opinion. (references please)
We know that TCP does not provide security services, but it can be enhanced with TLS...
We know that TCP does not provide security services, but it can be enhanced with TLS to do that. Answer the following: [ / 4] a) Does TLS operate at the transport layer or the application layer? b) Where does an application developer should write the TLS code? c) What security services TLS can provide? d) To what layer of the OSI protocol stack TLS belongs?
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT