Lesson 3 Computer Protection

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Lesson 4 Computer Maintenance
Baltic High School Classroom Connections Presentation.
This presentation is intended to assist you in troubleshooting basic problems that can occur with hardware and software. NOTE: This presentation contains.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Unit 3- Maintaining & Protecting Hardware.  Identify the importance of protecting computer hardware from theft and damage.  Explain how to protect data.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS.
1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
CB Warm-up Get the sheet from the front table and answer these questions. rbasics/14http://
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
David white. List objectives for the chapter identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that.
By: Marideth Bradley. OBJECTIVES Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can be performed.
A COMPUTER is an electronic device. Every computer performs 4 general operations: 1. Input 2. Process 3. Output 4. Storage.
Data Security GCSE ICT.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 3 Evaluating, Purchasing,
Elizabeth Wilmoth Period 2.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
Unit 4- Maintaining & Protecting Hardware.  Identify the importance of keeping a computer clean.  Explain what is needed to clean a PC.  Identify the.
Security and backups GCSE ICT.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Physical Security Concerns for LAN Management By: Derek McQuillen.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
COMPUTER SAFETY AND CARE
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
Chapter 6 Protecting Your Files
Lesson 3 Computer Protection
Computer Literacy BASICS
Chapter 2: Introduction to Lab Procedures and Tool Use
Electronic Plan By Ben Smithers and Dana Natov
USB flash drive A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Chapter 4: Overview of Preventive Maintenance
Chapter 1 Getting Started
Types of Computers & Computer Hardware
Run Standard Diagnostic Tests
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Personal Computers and Applications
Chapter 6 Purchasing and Maintaining a Computer
Lesson 4 Computer Maintenance
Lesson 3 Computer Protection
Upgrading Your PC: Flash Memory and Gathering User Information
Part 3.
Revision of Simple troubleshooting
Best Practices for Computer Security and Maintenance
Computer troubleshooting
COMPUTER SAFETY AND CARE
Computer Literacy BASICS
1.00 Examine the role of hardware and software.
G061 - Network Security.
Presentation transcript:

Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition Morrison / Wells

Objectives Protect computer hardware from theft and damage. Safeguard data. Identify environmental factors that can damage computers. Protect computers from power loss or fluctuation. Identify common computer hardware problems. 2 2

Protecting Computer Hardware from Theft and Damage Theft and damage of computer hardware is a serious problem many organizations face. Effects of theft and damaged hardware and equipment: capital loss of equipment related down time until it is replaced losing sensitive and confidential information through theft or damage could have long-term consequences 3 3

Protecting Computer Hardware from Theft and Damage (continued) In addition, apply the following safeguards to help protect computer hardware from theft: Use security locks and/or tabs to secure the equipment to the desk or other furniture. Attach an alarm that will sound if the equipment is moved from its designated location. Mark all equipment with an identification tag or symbol that can be traced. Insure the equipment. Use a designated schedule to back up data to a separate system. 4 4

***Quick Recap*** What is one effect damaged hardware or equipment has on a business or an individual user? What are some safeguards to help protect against theft or damage?

Safeguarding Data In most instances, hardware can be replaced when it is stolen or damaged. Data, on the other hand, is a critical component of most businesses and is not easily replaced. The risk and severity of data theft is increasing due to four predominant factors: The value of data stored on computers. Massive amounts of confidential data being stored. Increased use of mobile devices outside a secure network. Increased proficiency of data hackers and thieves. 6 6

Safeguarding Data (continued) Encryption is a secure process for keeping confidential information private. The data is scrambled mathematically with a password or a password key and is unreadable until it is decrypted. Data Backup: Even saved data can be lost or corrupted by equipment failure, software viruses hackers, fire or water damage, or power irregularities. 7 7

Safeguarding Data (continued) Data Backup (continued): Backup procedures should place priority on files that would be difficult or impossible to replace or reconstruct if they were lost, such as a company’s financial statements, important projects, and works in progress. Because data is so valuable, you must back up important files regularly to removable disks or some other independent storage device. 8 8

Safeguarding Data (continued) After backup, people and businesses need to keep the storage media in a separate location away from their backed up computers. 9 9

***Quick Recap*** Why is backing up data very important for a business or individual person? Where does a business or person need to keep data once it is backed up?

Identifying Environmental Factors that Can Damage Computers Computer equipment and its data are also subject to hazards associated with improper use. Environmental factors such as temperature, humidity, and electrical fields also can contribute to hardware and software damage. Temperature: A temperature range of 68 to 75 degrees is optimal for system reliability. 11 11

Identifying Environmental Factors that Can Damage Computers You should not operate computer equipment in a room where the temperature exceeds 85 degrees. Humidity: A high level of humidity can cause computers to short circuit, resulting in the loss of data and damage to hardware. For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point. Environments that require high reliability should have a humidity alarm. 12 12

Identifying Environmental Factors that Can Damage Computers (cont.) Water Damage: Modern computer systems contain a cut-off device that is triggered if sprinklers turn on. If a computer suffers water damage, make sure it is completely dry before restoring the power. Storage devices and printouts can be damaged or destroyed by water. Water damage may also occur from flooding or broken pipes. 13 13

Identifying Environmental Factors that Can Damage Computers (cont.) Magnetic Fields and Static Electricity: A single spark from static electricity can damage the internal electronics of a computer. Grounding prevents damaging a computer with a static electrical spark. Computer rooms should have tile floors and antistatic carpet to reduce static electricity. Hard drives are sensitive to magnetic fields. Do not store magnets directly on a computer. 14 14

Identifying Environmental Factors that Can Damage Computers (cont.) Physical Damage: Prevent damage to desktop computers by arranging equipment so it is stable and cannot fall or be knocked over. Notebook computers are more prone to physical wear and tear because they are portable. Most portable systems are insulated with shock absorbing material. Transport devices with care, such as in padded cases. 15 15

Identifying Environmental Factors that Can Damage Computers (cont.) Poor Maintenance: One of the best ways to cut down on computer repair is through preventive maintenance. Follow a monthly maintenance schedule to keep computer devices in good working order. For example: for a mechanical mouse, remove the ball and clean it periodically. 16 16

***Quick Recap*** What type of environmental hazard would cause a computer to short circuit and lose data? _________ can be reduced by monthly preventative maintenance.

Protecting Computers from Power Loss and Fluctuation An unexpected power outage can wipe out any data that has not been properly saved. Secure electric cords so that they cannot be disconnected accidentally. Protect computers from power spikes with a surge suppressor. - Lower end surge suppressors wear out and need to be replaced sooner. 18 18

Protecting Computers from Power Loss and Fluctuation (continued) An uninterruptible power supply (UPS) can prevent data loss due to power outages. A UPS contains a battery that temporarily provides power if the normal current is interrupted. 19 19

Protecting Computers from Power Loss and Fluctuation (continued) A UPS provides additional time for a user to save data and shut down properly. Two types of UPS systems: Standby Power Systems (SPS): monitors electrical power and switches to battery if it detects a problem. Online UPS Systems: constantly provides power even when you are using electricity. 20 20

***Quick Recap*** This option switches to battery power if it detects a problem in the electricity? If not protected by a __________, a computer or other electronic device may be damaged by spikes in electricity.

Identifying Common Computer Hardware Problems Computer equipment and stored data are subject to computer hardware issues. “Crashed” hard drive Damaged media Printer and monitor problems Loss of network or Internet connectivity General failure You can solve many problems on your own, while others may require a professional. 22 22

Identifying Common Computer Hardware Problems (continued) Crashed Hard Drive: Hard drives can stop working if they become overheated, are dropped or shaken, become worn out, or are infected with a virus. To evaluate the condition of the drive: Use a boot disk to determine if the drive is readable. Use diagnostic and data recovery programs to locate and recover bad sectors. Use a data recovery service. 23 23

Identifying Common Computer Hardware Problems (continued) Damaged Media: Hard drives and other media eventually fail. In many instances, you can recover data. First, move the damaged media to a secure environment. Second, inspect or test the media to determine what type of damage has occurred. The type of damage determines the type of recovery method to use. Another option is to locate a disaster data recovery company to recover data from the computer. 24 24

Identifying Common Computer Hardware Problems (continued) Printer Problems: Paper jams stop printers from printing a file. Using the wrong paper or using wrinkled or torn paper can cause a paper jam. Faded images could mean one of three things: The toner is low or out. The print density is set too low. Economy mode printing is turned on. 25 25

Identifying Common Computer Hardware Problems (continued) Printer Problems (continued): If ink or toner comes off the paper when touched, look for three possible causes: The fuser assembly might be damaged or need to be replaced The toner cartridge could be defective Some toner may have spilled into the printer. 26 26

Identifying Common Computer Hardware Problems (continued) Display Problems: The hardware of a display consists of two elements: the monitor the video card. To troubleshoot a display problem: Check that the power cord is plugged in and the monitor cable is connected to the computer. Verify that the monitor is turned on and settings are correct. Update the video driver. 27 27

Identifying Common Computer Hardware Problems (continued) Inoperable Hardware Devices: When a hardware device does not work, it could be a software problem, an electrical problem, or a mechanical problem. A small program called a driver instructs the operating system on how to operate specific hardware. Other causes are incorrect installation of the software or hardware failure. 28 28

Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet Connectivity: Common causes of connectivity problems: The network provider’s system is not working properly. Network adapters and switch ports do not match. The network adapter is incompatible with the motherboard or other hardware components. 29 29

Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet Connectivity (continued): Troubleshooting options: Use the DOS ping command to test connectivity and isolate hardware problems and mismatched configurations. 30 30

Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet Connectivity (continued): 31 31

Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet Connectivity (continued): Verify that other computers on the same network and those plugged into the same switch are also experiencing network connectivity problems. Restart the router. Check the computer’s network card or board and verify it is using appropriate settings as indicated by the manufacturer. 32 32

Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet Connectivity (continued): Try another network cable. If you are using a wireless router within a home, beware of signal interference from other home appliances. 33 33

***Quick Recap*** What is one reason for ink or toner to come off of the paper when touched? This software program instructs the operating system on how to operate specific hardware.