TOPIC 3.0 SECURITY TROUBLESHOOTING AND SOLUTIONS

6 STEPS FOR TROUBLESHOOTING

STEP 1 : identify the problem

STEP 6 : document your findings , actions and outcomes

STEP 3 : test your theories to determine the cause of the problem :

STEP 2 : establish a theory a probable cause

STEP 4 : establish a plan of action to resolve the problem and implement the solution

STEP 5 : verify full functionality and if, applicable ,implement preventive measures

COMMON SECURITY PROBLEM INCLUDES

1) a user receiving thousands of junk emails daily

2) a rogue wireless access point is discovered on the network

3) user flash drives are infecting computers

4) windows update fails

5) system files have been renamed

MALICIOUS SOFTWARE PROTECTION PROGRAM

  • malicious software, commonly known as malware, is any software that brings harm to a computer system
  • malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits , etc. which steal protected data, delete documents or add software not approved by a user

PROTECT THE NETWORK INFRASTRUCTURE such as cabling, telecommunication equipment and network devices, with the following :

  • secured telecommunications rooms, equipment cabinets and cages
  • cable locks and security screws for hardware devices
  • wireless detection for unauthorized access points
  • hardware firewalls
  • network management system that detects changes in wiring and patch panels

EXAMPLES OF PHYSICAL THREATS

a) natural events (eg : floods, earthquakes & tornados)

b) other environmental conditions ( eg: extreme temperatures , high humidity, heavy rains, and lightning)

c) intentional acts of destruction ( eg : theft, vandalism, & arson)

d) unintentionally destructive acts ( eg: spilled drinks, overloaded electrical outlets & bad plumbing )

6 SECURITY ACTIVITIES

(1) Don't use unnecessary interest in your critical facilities

(6) limit & monitor access to equipment areas

(3) be particularly careful with non-essential materials in a secure computer room

(2) Maximize structural protection

(4) Protect cabling, plugs,& other wise from foot traffic

(5) keep a record of your equipment