Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 3 SECURITY TROUBLESHOOTING AND SOLUTIONS, FATIN NUR ATHIRA…
CHAPTER 3
SECURITY TROUBLESHOOTING AND SOLUTIONS
3.1
3.1.2 Identify Common Problem and Solutions for Security
Security problems can be attributed to
Hardware
Software
Connectivity Issues
Common Problems and solutions
Problem Symptom
A user is receiving hundreds or thousands of junk emails each day.
Problem Causes
The network is not providing detection or protection for the email server from spammers
Possible Solutions
Install antivirus or an email software program that removes spam from an email inbox
3.1.1 Troubleshooting Process
Step 1. Identify the problem.
Close Ended Questions
Is your security software up to date?
Have you shared your password?
Open Ended Questions
When did the problem start?
What websites have you visited recently?
Step 2. Establish a theory of probable cause.
establish a
theory of probable causes
Create a list of the most common causes of security problems
Virus
Trojan Horse
Worm
Step 3. Test the theory to determine the cause.
Common steps to determine cause
Disconnect from the network
Update antivirus and spyware signatures
If the exact cause of the problem has not been determined after all theories have been tested,establish a new theory of probable cause and test it.
Step 4. Establish a plan of action to resolve
the problem and implement the solution.
If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause
Helpdesk repair logs
Manufacturer FAQs
Step 5. Verify full system functionality and,
if applicable, implement preventive measures.
Verify full system functionality and implement any preventive measures if needed.
Re-scan computer to ensure no viruses remain
Test newtowk and internet connectivity
Step 6. Document findings, actions, and outcomes.
List of the tasks required to document the problem and the solution.
Discuss the solution implemented with the customer
provide the customer with all paperwork
3.1.3 Data Backup in Windows
some considerations for data backups
Frequency
Storage
Security
Validation
Types of backup
Full Or Normal
Incremental
Differential
Daily
Copy
3.2 PROTECTION AGAINST MALICIOUS SOFTWARE
3.2.1 Malicious Software Protection
Programs
Virus
protection
Spyware Protection
Adware Protection
Phishing Protection
3.2.2 Signature File Updates
To update signature file, follow these steps
Step 1
Create a windows restore points.If the file you load is corrupt,setting a restore point allows you to go back to the way things were.
Step 2
Open the antivirus or antispyware program.If the program is set to execute or obtain updates automatically,you may need to turn the automatic feature off to perform these steps manually
Step 3
Select the Update Button
Step 4
After the program is updated,use it to scan the computer
Step 5
When the scan is complete,check the report for viruses or other problems that could not be treated and delete them yourself
Step 6
at the antivirus or antispyware program to automatically update and run on a scheduled basis
3.3 PROTECTION PHYSICAL EQUIPMENT
3.3.1 Physical Computer & Network
Equipment Protection Method
Netowrk infrastructure can be protected by
Secured telecommunications rooms,
equipment cabinets, and cages
Cable locks and security screws for
hardware devices
Wireless detection for unauthorized access
points
Another method of hardware security
is to disable the AutoRun feature of the operating system
to disable Autorun in Windows XP, follow these steps:
Step 1
Select Start > Run.
Step 2
Type regedit and click OK.
Step 3
Navigate to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentContrlSet\Services\Cdrom.
Step 4
Double-click AutoRun. In the Value Data text box, type 0 and click OK
Step 5
Close the Registry Editor.
Step 6
You might have to log out and then log back in for this change to take effect.
Two- factor Authentication - secured using overlapping protection techniques to prevent unauthorized access to sensitive data
Password
Smartcard
Methods of physically protecting computer equipment
Use cable locks with equipment.
ll physical alarms triggered by motion detection sensors.
For access to facilities, there are several
means of protection
• Card keys that store user data, including level
of access
Sensors, such as RFID tags, to monitor
equipment
3.3.2 Security Hardware
Patches are code updates that manufacturers
provide to prevent a newly discovered virus or worm from making a successful attack.
A Service Pack is a combination of patches and
updates.
To update the operating system with a service pack or security patch, follow these steps:
Step 1
Create a restore point prior to installing an update.
Step 2
Check for updates to ensure that you have the
latest ones
Step 3
Download updates using Automatic Updates or
from the operating system manufacturer’s website.
Step 4
Install the update.
Step 5
Reboot the computer if necessary.
Step 6
Ensure that the computer is operating properly.
The following Windows options allow you to
control when software is updated:
Automatic
Only download updates
Notify me
Turn off automatic update
FATIN NUR ATHIRA (05DDT20F1031)