Chapter 16: Advanced Security. IT Essentials: PC Hardware and Software v4.0. Chapter 16 Objectives. 16.1Outline security requirements based on customer needs 16.2Select security components based on customer needs 16.3Implement customer's security policy
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Chapter 16: Advanced Security
IT Essentials: PC Hardware and Software v4.0
16.1Outline security requirements based on customer needs
16.2Select security components based on customer needs
16.3Implement customer's security policy
16.4Perform preventive maintenance on security
A security policy includes a comprehensive statement about the level of security required and how this security will be achieved.
A collection of rules, guidelines, and checklists:
Identify hardware and equipment that can be used to prevent theft, vandalism, and data loss.
Security applications protect the operating system and software application data.
Compare the cost of data loss to the expense of security protection, and then determine what tradeoffs are acceptable.
Consider the following factors when deciding on security components:
Depending on the situation, more than one technique may be required.
Encryption methods include:
Physical access control devices
Two-factor identification methods for access control
Two primary security settings include:
Run software scanning programs to detect and remove the malicioussoftware.
Windows XP update options:
Step 1Gather data from the customer
Step 2Verify the obvious issues
Step 3Try quick solutions first
Step 4Gather data from the computer
Step 5Evaluate the problem and implement the solution
Step 6Close with the customer
Description of problem by the level-one helpdesk
Here are some open-ended questions that a level-two
technician might ask to gather more information from the
customer in this scenario:
Based on the information given by the customer to the
open-ended questions, these conclusions can be
Here are some closed-ended questions that a level-two technician might ask to gather more information from the customer in this scenario:
From the answers to these questions, you determine that the customer is experiencing a wireless connection problem. Therefore, focus your efforts on a problem with wireless connectivity in the office.
Examine the most obvious causes of a problem.
Results of quick solutions:
So the problem is probably a configuration issue.
Determine the MAC address of the computer:
No resolution to the problem has been found at this point.
The problem is most likely to be found in the
configuration of the wireless access point security
1.What do you know now?
2. Determine possible solutions
3. Implement the best solution
Now that you understand the troubleshooting process, it
is time to apply your listening and diagnostic skills.
Let’s see what you have learned . . .
Q: A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
A:stateful packet inspection
Q:Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter?
A:ports and protocols
Q:A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
Let’s see what you have learned . . .
Q:As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method?
Q:Which simple wireless configuration technique can make the network invisible to unauthorized users?
A:disable SSID broadcasting
Q:What are programs that scan for keyloggers and other malware so it can be removed from the computer?