Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY TROUBLESHOOTING AND SOLUTIONS - Coggle Diagram
SECURITY TROUBLESHOOTING AND SOLUTIONS
Use the troubleshooting steps as a guideline to help you diagnose
and repair problems :
step 1; identify the problem
step 2 ; establish a theory of probable causes
step 3 ; test the theory to determine cause
step 4 ; establish plan of action to resolve to problem and implement preventative measures
step 6 ; document findings, actions, and outcomes
-Security problems can be attributed to hardware, software, or connectivity issues, or some combination of the three.
-The figure is a chart of common security
problems and solutions
common problems and solutions
-problrm symptom
-problem causes
-possible solutions
Data backups
A data backup stores a copy of the information on a computer to removable backup media that can be kept in a safe place.
some considerations;
-frequency
-storage
-security
-validation
types of backup;
-full or normal
-incremental
-differential
-daily
-copy
PROTECTION AGAINST MALICIOUS SOFTWARE
malware is malicious software that is installed on a computer without the knowledge or permission of the user.
• It may take several different programs and multiple scans
to completely remove all malicious software.
-virus protection
-spyware protection
-adware protection
-phishing protection
signature files update;
step 1; create a window restore point.
step 2; open the antivirus or antispyware program.
step 3; select the update button.
step 4; after the program is updated, use it to scan the computer.
step 5; when the scan is complete check the report for viruses or other problems
step 6; et the antivirus or antispyware program
network infrastructure can be protected by;
-secured telecommunications rooms, equipment cabinets, and cages.
-cable locks and security screws for hardware devices
this is security risk because it can automatically run a malicious program and compromise the system, so it is recommended to disabled auto-run
to disable auto run in windows XP, follow these steps
step 1; select start>Run
step 2; type regedit and click OK
step 3; navigate to HKEY_LOCAL_MACHINES/SYSTEM
step 4; double click auto-run
step 5; close the registry editor
step 6; you might have to log out and then log back in for this change to take effect.
an example of two factor authentication is using a password and a smart card to protect and asset.
For access to facilities, there are several
means of protection:
-card keys that store user data, including level of access
-posted security guard
-sensors, such as RFID tags, to monitor equipment.
security hardware
step 1; create a restore point prior to installing an update.
step 2; check for updates to ensure that u have the latest ones.
step 3; Download updates using Automatic Updates or
from the operating system manufacturer’s website.
step 4; install the update
step 5; reboot the computer if necessary
step 6; Ensure that the computer is operating properly
The following Windows options allow you to
control when software is updated:
-automatic
-only download updates
-notify me
-turn off automatic updates