Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 7, Password - protect your computing devices.
Always backup files
…
Group 7
Describe the security troubleshooting process.
-
-
-
Step 5:
Verify full system functionality and, if applicable, implement preventive measures.
-
Step 6:
Document findings, actions, and outcomes.
-
Computer technicians must be able to analyze a security threat and determine the appropriate method to protect assets and repair damage.
-
Identify common problems and solutions for security.
Problem Causes
- A hacker issuing commonly available wireless hacking tools to crack the encryption.
- The network is not providing detection or protection for the email server from spammers.
- Visitors are not being monitored properly or user credentials have been stolen to enter the building.
- A user has added a wireless access point to increase the wireless range of the company network.
Possible Solutions
-
-
Disconnect and confiscate the unauthorized device.
• Enforce security policy by taking action against the person responsible for the security breech.
• Upgrade to WPA2 Encryption.
• Add MAC address filtering for older clients that do not support WPA2.:
Problem Symptom
- An unknown printer repair person is observed looking under keyboards and on desktops.
- An unauthorized wireless access point is discovered on the network.
- A user is receiving hundreds or thousands of junk emails each day.
- A wireless network is compromised even though 128-bit WEP encryption is in use.
-
-
Rasyidah Binti Roslan
-
A collection of updates and fixes, called patches, for an operating system or a software program. Many of these patches are often released before a larger service pack, but the service pack allows for an easy, single installation.
-
A change applied to an asset to correct the weakness described by a vulnerability. This corrective action will prevent successful exploitation and remove or mitigate a threat's capability to exploit a specific vulnerability in an asset.
- Password - protect your computing devices.
- Always backup files
- Use tracking software to help get your stolen device back
- Don't tempt thieves with unattended mobile devices, particularly in public places.
- Encrypt sensitive data.