Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 3 SECURITY TROUBLESHOOTING AND SOLUTIONS - Coggle Diagram
Chapter 3 SECURITY TROUBLESHOOTING AND SOLUTIONS
3.3.1 Physical Computer & Network
Equipment Protection Methods
Network infrastructure can be protected by
Secured telecommunications rooms,
equipment cabinets, and cages
Cable locks and security screws for
hardware devices
Wireless detection for unauthorized access
points
Hardware firewalls
Network management system that detects
changes in wiring and patch panels
Hardware security is to disable AutoRun feature of operating system. On Windows, AutoRun is executed first, unless it disabled. If AutoRun is not disabled, it follows the instructions in the autorun.inf file.
To disabled AutoRun in Windows XP, follow these steps:
Select Start>Run
Type regedit and click OK
Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\CDROM
Double-click AutoRun. In the Value Data text box, type 0 and click OK
Close the Registry Editor
You might have to log out and then log back in for this change to take effect.
Two-factor authencation- secured using overlapping protection techniques to prevent unauthorized access to sensitive data. There are several methods of physically protecting computer equipment:
Use cable locks with equipment.
Keep telecommunication rooms locked.
Fit equipment with security screws.
Use security cages around equipment.
For access to facilities, there are several
means of protection:
Card keys that store user data, including level
of access
Biometric sensors that identify physical
characteristics of the user, such as fingerprints or retinas
Posted security guard
Sensors, such as RFID tags, to monitor
equipment
Factors that determine the most effective security equipment to use to secure equipment and data include:
How the equipment is used
Where the computer equipment is located
What type of user access to data is
required
3.3.2 Security Hardware
To update the operating system with a service pack or security patch, follow
these steps:
Create a restore point prior to installing an update.
Check for updates to ensure that you have the
latest ones.
Download updates using Automatic Updates or
from the operating system manufacturer’s website.
Install the update.
Reboot the computer if necessary.
Ensure that the computer is operating properly.
The following Windows options allow you to control when software is updated:
Automatic- Downloads and installs updates automatically without user intervention.
Only download updates- Downloads the updates automatically, but the user is required to install them.
Notify me- Notifies the user that
updates are available and gives the option to download and install.
Turn off automatic updates- Prevents any checking for updates.
3.1.1 Troubleshooting process
Use the troubleshooting steps as a guideline to help you diagnose
and repair problems :
Identify the problem
Establish a theory of probable causes
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and Implement preventative measures
Documents findings, actions, and outcomes
3.1.2 Common problems and solutions
3.1.3 Data Backup in Windows
These are some considerations for data backups:
Frequency: Backups can take a long time. Sometimes it is easier to make a full backup monthly or weekly, and then do frequent partial backups of any data that has changed since the last full backup.
Storage: For extra security, backups should be transported to an approved offsite storage location on a daily, weekly, or monthly rotation, as required by the security policy.
Security: Backups can be protected with passwords. The password is entered before the data on the backup media can be restored.
Validation: Always validate backups to ensure the integrity of the data.
3.2.1 Malicious Software Protection
Programs
Spyware protection- Antispyware programs scan for keyloggers, which capture your keystrokes, and other malware so that it can be removed from the computer
Adware protection- Anti-adware programs look for programs that display advertising on your computer
Phishing protection- Antiphishing programs block the IP addresses of known phishing websites and warn the user about suspicious websites
3.2.2 Signature file updates
To update signature file, follow these steps:
Create a Windows Restore Point.
Open the antivirus or antispyware program.
Select the Update button.
After the programs is updated, use it to scan the computer.
When the scan is complete, check the report for
viruses or other problems that could not be treated and delete them yourself.
the antivirus or antispyware program to automatically update and run on a scheduled basis.