Group 9
Thian Yan Cheng
Ignatius Lee Khay Vhin
Terrens Bin Chew Bee Hock
Khiew Jung Huat

  1. How to apply Data Backup in windows?
  1. Identify Malicious Software protections programs.

Anti-virus program

anti-spyware program

Anti-adware programs

Antiphishing programs

block the IP addresses of known phishing websites and warn the user about suspicious websites

runs automatically in the background and monitors for problems. When a virus is detected, the user is warned, and the program attempts to quarantine or delete the virus.

scan for keyloggers, which capture your keystrokes, and other malware so that it can be removed from the computer

look for programs that display advertising on your computer

manually

scheduled to takes place
automatically.

1.Click Start windows icon, click Computer and then double-click the drive where you currently have Windows 7,Click Start windows icon, click Computer and then double-click the drive where you currently have Windows 7,

2.Open the Users folder, and then open the user folder that contains the files that you want to back up

3.Copy the necessary folders from the user folder to a network location or to removable media.

1.Open Settings.
2.Click on Update & Security.
3.Click on Backup.
4.Under the "Looking for an older backup" section, click the Go to Backup and Restore option.
5.Under the "Backup" section, click the Set up backup option on the right.
6.Select the removable drive to store the automatic backups.
7.Click the Next button.
8.Under the "What do you want to backup?" section, select the Let me choose option.

9.Click the Next button.
10.Under the "Data Files" section, check all the items as necessary.
11.Under the "Computer" section, check the Local Disk (C:). (If you have multiple drives, they will also appear in this list.)
12.Check the Include a system of drives: System Reserved, (C:) option.
13.Click the Next button.
14.Click the Change schedule option.
15.Check the Run backup on a schedule option.
16.Specify the frequency, date, and time when Windows 10 should backup your computer.
17.Click the OK button.
18.Click the Save settings and exit button.

5. Signature File Update

6. Physical computer and networking equipment Protection method

Signature files or definitions are an important part of how antivirus and antimalware software works.
These files contain information about different viruses and malware, which is used by the software to detect, clean, and remove detected threats.
If you haven’t updated these files, then your antivirus software isn’t nearly as effective and will be more vulnerable to attack

How to update your signature files:

  1. Go to setting > Update & Security > Window Security > Virus & Threat Protection.


  2. Check for updates ( or Virus and threat protection updates in previous versions of Windows 10).


  3. Under Security intelligence, select Check for update.


  4. If Windows Security finds a new signatures, it will download and install it.


  5. The update completes with the new signatures. Keep these point in mind.

Physical Computer

1. Set password on your computing devices
Although it is not impossible to pass a password protection on your computer, it adds a useful layer of protection and will buy you some time to locate and recover the device.
2. Always backup your file
If your device is stolen or damage, that doesn't mean you will lose all of your data if you backup your files. Regular backups are the ultimate defense again theft of your files.
3. Use tracking software to help get your stolen device
There are a lot of applications that you can find online to help you to track your stolen device.
4. Encrypt your sensitive data
Storing data in encrypted file prevents anyone exploiting your data is your computer is stolen

Networking equipment

1. Firewall
A firewall is a method of network security that prevents the computer network from users that are not authorized to have access to a network. Firewalls can either be hardware or software or both. It acts as a barrier between unauthorized Internet users and private computer networks connected to the Internet. It blocks the message, viruses, hackers if they do not have authorized access and do not meet the security criteria as per requirement. Any message entering or leaving private computer networks connected to the Internet especially Intranet pass through the firewall. Firewall than checks each message and block if found unauthorized.

2. Biometric System
A Biometric system is one of the most secure systems as it provides high security to the computer network. This system verifies the user’s identity based on some important characteristics that are physiological and behavioral features. Physiological features include face, eyes, fingerprints, hand. Behavioral features include voice, signature, etc.

Types of firewall techniques:

  1. Packet Filter
  2. Application-Level Gateway
  3. Circuit-Level Gateway
  4. Stateful Inspection Firewall (NGFW)
  5. Proxy Server

3. Authentication
Authentication is the process of recognizing or identifying a user’s identity whether it is true, real, or not. It’s simply a verification of claim whether you are who you say you are or not. There are many authentication methods available nowadays like password authentication that includes using a password, physical authentication that includes the scannable card or smart card or digital certificate, biometric authentication that includes signatures and fingerprints, or visual identification, and many more.

  1. DESCRIBE SECURITY HARDWARE



       Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system.
    

SERVICE PACKS
-A combination of patches and updates.

STEP TO UPDATES OS WITH A SERVICE PACK OR SECURITY PATCH

SECURITY PATCHES
-Patches are code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attacks.

STEP 1
-Create a restore point prior to installing an update.

STEP 2
-Check for updates to ensure that you have the latest ones

STEP 3
-Download updates using Automatic Updates or from the operating system manufacturer's website

STEP 4
-Install the update

STEP 5
-Reboot the computer if necessary

STEP 6
-Ensure that the computer is operating properly.

  1. Identify common problems and solutions for security.
  1. Describe the security troubleshooting process.

Step 1. Identify the problem.

Step 2. Establish a theory of probable cause.

Step 3. Test the theory to determine the cause.

Step 4. Establish a plan of action to resolve the problem and implement the solution.

Step 5. Verify full system functionality and, if applicable, implement preventive measures.

Step 6. Document findings, actions, and outcomes.

i.Unknown Assets

The easiest fix for this is to conduct a review of all the devices on your network and identify all of the various platforms they run. By doing this, you can know what all of the different access points are on your network and which ones are most in need of security updates.

ii. Abuse of User Account Privileges

if your company uses a policy of least privilege (POLP) when it comes to user access, you can limit the damage that a misused user account can do. In a POLP, every user’s access to the various systems and databases on your network is restricted to just those things that they need to do their jobs.

iii. Unpatched Security Vulnerabilities

The easiest fix for this problem is to maintain a strict schedule for keeping up with security patches. Also, gradually changing the programs and operating systems on your network to make them the same can simplify this process. For example, if every system is Windows-based or Mac-based (rather than a hodgepodge of Mac, Windows, Linux, etc.), then you only have to keep track of Mac OS or Windows OS security patch schedules and alerts.

iv. A Lack of Defense in Depth

If the network is structured with strong segmentation to keep all of its discrete parts separate, then it’s possible to slow down the attacker enough to keep them out of vital systems while your security team works to identify, contain, and eliminate the breach.

v. Not Enough IT Security Management

Best cybersecurity solutions in place and have enough people in place to properly manage those solutions. This is because can eliminated in time to minimize damage.