Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 3 Security Troubleshooting and Solutions - Coggle Diagram
Chapter 3 Security Troubleshooting and Solutions
Security troubleshooting process
1.Identify the problem
2.Establish a theory of probable cause
3.Test your theories to determine the cause of the problem
Establish a plan of action to resolve the problem and implement the solution
5.Verify full functionality and if applicable, implement preventive measures.
6.Document your findings, actions and outcomes
Common problems and solutions for security
A windows 7 computer will not boot - Boot the computer from Windows PE media.
Telnet - A program that lets you log into to a remote computer directly through the internet
Apply data backup in window
Click Start, type backup in the Start Search box, and then click Backup and Restore in the Programs list.
Click Back up files under Back up files or your entire computer.
Select where you want to store the file backup, and then click Next.
Select the disk or disks that you want to back up, and then click Next
Select the file type or file types that you want to back up, and then click Next.
Click Save Settings, and then start the backup.
Your backup will be saved to the selected backup location.
Protection against Malicious Software
Malicious software protection program
Definition - any software designed to cause damage and brings harm to a single computer
Potential attack techniques
Spyware - secretly gathering data on an unsuspecting user, spies on the data being send and received with the purpose of sending that information to a third party
Rootkit - a collection of software tools that gives a threat actor remote access to and control over a computer or other system
Adware - malware that forces your browser to redirect to web advertisements
Ransomware - malware that encrypts your hard drive's files and demands a payment
Malicious software protection program
McAfee Secure
Malwarebytes
Norton security
Features
Malware removal and protection - recover a computer system after a malware infection
Additional features - all of the tools worked exactly as advertised such as threat prevention tools
Ease of use - products are intuitive and user-friendly for all types of users
Files Updates - Signature files or definitions are an important part of how antivirus and antimalware software works
Protection Physical Equipment
Physical computer and network equipment protection methods
Physical security activities
Don't use unnecessary interest in your critical facilities - Do not spread the personal information
Maximize structural protection - A secure room should have full height walls and fireproof ceilings
Be particularly careful with non-essential materials in a secure computer room - Careful when handling unknown object in a computer room
Protect cabling, plugs and other wires from foot traffic - Careful when handling wires
Keep a record of your equipment -Maintain up-to-date logs
Limit and monitor access to equipment areas - Always monitor the logs to avoid problems
Security Hardware
Service packs and patches - a service pack is rigorously regression tested against all other patches and known applications