SECURITY TROUBLESHOOTING AND SOLUTION

马上开始. 它是免费的哦
注册 使用您的电邮地址
SECURITY TROUBLESHOOTING AND SOLUTION 作者: Mind Map: SECURITY TROUBLESHOOTING AND SOLUTION

1. PROTECTION PHYSICAL EQUIPMENT

1.1. security patches

1.2. service packs

1.2.1. Packs and patches are interim releases of the operating system and some application.

1.2.2. Service pack is rigorously regression tested against all other patches and known applications.

1.3. security hardware

1.4. Examples of Physical threats

1.4.1. natural disasters (floods, earthquake, and tornados

1.4.2. Other environmental conditions (e.g., extreme temperatures, hifg humidity, heavy rains)

1.4.3. Intentional acts of destruction (e.g., theft, vandalism)

1.4.4. Unintentionally destructive acts (e.g., spilled drinks,overloaded electrical outlet.)

1.5. Physical Security activities

1.5.1. Dont use unnecessary interest in your critical facilities.

1.5.2. maximize structural protection.

1.5.3. Be particularly careful with non-essential materials in a secure computer room.

1.5.4. Protect cabling, plugs and other wires from foot traffic.

1.5.5. Keep a record of your equipment.

1.5.6. Limit and monitor access to equipment areas.

2. MALICIOUS SOFTWARE PROTECTIONS PROGRAMS

2.1. what is malicious software?

2.1.1. any malicious program that causes harm to a computer system or network

2.2. run virus and spyware scanning to detect and remove unwanted software

3. PROTECT AGAINST MALICIOUS SOFTWARE

3.1. MALICIOUS SOFTWARE PROTECTIONS PROGRAMS

3.1.1. spyware protection

3.1.2. virus proctection

3.1.3. ADWARE PROTECTIONS

3.1.4. PHISING PROTECTION

3.1.5. rogue antivirus

3.1.6. remediating infected

3.2. SIGNATURES FILE UPDATES

3.2.1. virus,spyware and adware detection programs look for patterns in the programming code of the software in a computer

4. BASIC TROUBLESHOOTING PROCESS FOR SECURITY

4.1. Identify the problem

4.1.1. A list of open and closed-ended questions is useful

4.2. Establish a theory of probable cause

4.2.1. List out the common problems

4.3. Test your theories to determine the cause of the problem

4.3.1. Determine the cause of the problem

4.4. Establish a plan of action to resolve the problem and implement the solution.

4.5. Verify full functionality.

4.5.1. Perform a full re-scan of the computer

4.6. Document your findings, actions, and outcomes

4.6.1. log can be useful for future reference

4.7. COMMON PROBLEMS AND SOLUTION FOR SECURITY

4.7.1. unknown assets on the network

4.7.1.1. there are many businesses that don't have a complete inventory of all of the it assets that they have tried into their network

4.7.2. abuse of user account privileges

4.7.2.1. 60% of all attackers were carried out by insiders

4.7.3. unpatched security vulnerabilities

4.7.3.1. the more often the exploit is used ,the more likely it is to get discovered and patched

4.7.4. a lack of defense in depth

4.7.4.1. just how much damage this attacker will be capable of depends on how the network ia structured

4.7.5. not enough it security management

4.7.5.1. when it happens,critical cybersecurity alerts may get missed ,and succesful attacks may not be eliminated intime to minimize damage

4.7.6. data backup in windows

4.7.6.1. loaing data because of a computer problem or a hard disk crash is discouraging