CHAPTER 3 SECURITY TROUBLESHOOTING AND SOLUTIONS

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
CHAPTER 3 SECURITY TROUBLESHOOTING AND SOLUTIONS Door Mind Map: CHAPTER 3 SECURITY TROUBLESHOOTING AND SOLUTIONS

1. 3.1.3 Data Backup in Windows

1.1. Data Backups

1.1.1. A data backup stores a copy of the information on a computer to removable backup media that can be kept in a safe place.

2. 3.2 PROTECTION AGAINST MALICIOUS SOFTWARE

2.1. Malicious Software Protection Programs

2.1.1. Malware is malicious software that is installed on a computer without the knowledge or permission of the user.

3. 3.2.2 Signature File Updates

3.1. New viruses are always being developed, therefore security software must be continually updated.

4. 3.3.1 Physical Computer & Network Equipment Protection Methods

4.1. There are several methods of physically protecting computer equipment:

4.1.1. Use cable locks with equipment

4.1.2. Keep telecommunication rooms locked.

5. 3.1.1 Troubleshooting Process

5.1. The troubleshooting process is used to help resolve security issues.

5.2. Step 1: Identify the Problem

5.3. Step 2: Establish a Theory of Probable Cause

5.3.1. After you have talked to the customer, you can establish a theory of probable causes

5.4. Step 3: Test the Theory to Determine Cause

5.4.1. Test theories of probable cause one at a time, starting with the quickest and easiest.

5.5. Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution

5.5.1. After determining the exact cause of the problem, establish a plan of action to resolve the problem and implement a solution.

5.6. Step 5: Verify Full System Functionality And Implement Any Preventive Measures

5.6.1. Verify full system functionality and implement any preventive measures if needed.

5.7. Step 6: Document your findings, actions and outcomes

5.7.1. List of the tasks required to document the problem and the solution.

6. 3.1.2 Identify Common Problem and Solutions for Security

6.1. Common Problems and Solutions

6.1.1. Security problems can be attributed to hardware, software, or connectivity issues, or some combination of the three.

7. 3.3 PROTECTION PHYSICAL EQUIPMENT

7.1. 3.3.1 Physical Computer & Network Equipment Protection Methods

7.1.1. Physical security is as important as data security.

8. 3.3.2 Security Hardware

8.1. Service Packs & Security Patches

8.2. Regular security updates are essential to combat new viruses or worms.