P1-P2-M1-D1-D2.

Slides:



Advertisements
Similar presentations
The Ultimate Troubleshooter TUT July 26, 2005 Lorain County Computer Computer Users Group Users Group.
Advertisements

Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
Potential risks of installing or upgrading software
Let’s Talk About Cyber Security
Computer security Viruses Hacking Backups
P3, M2,M3,M4.
Upgrading Software CIT 1100 Chapter4.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
With experience you can develop the skills needed to clean and maintain your computer, and diagnose and resolve basic problems that may occur when using.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
The Death of Windows XP End of the line for venerable operating system Dr. Jan Vanderpool
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Comparing functions and features of operating systems.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Ashita Srivastava ISM High Five Corporations Chain of fast food restaurants Using Windows XP for clients and Windows Server 2008 Needs a robust.
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
IT Security for Users By Matthew Moody.
Introducing… …taking desktop computing to the cloud making business effortless!
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Advantages and Disadvantages
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Networks.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Mr C Johnston ICT Teacher
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
Small Peer-Peer PC Network No dedicated (full- time) server User PCs supply services to each other So user PCs act both as clients and as servers.
Optimization Written by: Tim Keyser Georgia CTAE Resource Network 2010.
Understand why software needs installing or upgrading
A Feature-Based of IT Automation using Remote Control on Safe Mode Developed By: Fernando Perez Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Learning Outcomes 1. Know software installation processes 2. Be able to prepare for software installation 3. Be able to install and configure software.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Remote Support Remote Support World leading Online Computer Support with iGennie on and get Online Technical Support, Online Computer Help,
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Mr L Challenor ICT Teacher
Chapter 6 Application Hardening
People used to install software on their computers
Malware aka- malicious software By: Ken Fogel
Firewalls.
Call to Fix QuickBooks Error
LO2: Understand Computer Software
King Saud University- College OF Applied Studies
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
King Saud University- College OF Applied Studies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Bethesda Cybersecurity Club
Presentation transcript:

P1-P2-M1-D1-D2

P1 Describe the potential prompts that initiate the installation of new or upgraded software Problems with the existing system. Unstable software that leads to system crash Software no longer supported by manufacturer – so no user support & updates for it. Security issues with the current software – leading to malicious attacks. Current software incompatible with the new operating system. Additional functionality required: such as strong parental control that was lacking in Windows XP and that is now available in Windows Vista or 7. Another example upgrading your antivirus program to a full internet security suite that will include firewall and anti spyware.

New hardware requiring new or upgraded software New hardware requiring new or upgraded software. What is the software called to install when you attach a new hardware. To fix bugs- that will reduce the system to crash or hang. Company Policy: a company may have a policy that only certain software can only be installed. When new installations and upgrades will be carried out

Lets brainstorm and check the internet for some answers: M1 Explain the advantages and disadvantages of installing and upgrading software Lets brainstorm and check the internet for some answers: Look at the prompts to get further ideas: Think about cost, any restrictions, security, stability, training, usability, performance

D1 – Justify to the managers why installing their anti virus software would be advisable Just because there is a prompt for change, it doesn’t mean that an organisation will agree to the change going ahead. Installing & upgrading software is often expensive cost of the software Additional cost such as training, ‘down-time’ needed to install the software. Therefore it is important to have a good business case showing that the benefits outweighs the costs of the new software or upgrade. Benefits such as – greater efficiency, improved systems security. Use the factors you have learnt from other units on how viruses and worms can affect the operations of a business to support your answer.

P2 – Describe the potential risks of installing or upgrading software ‘Down-time’ – when the current system will be inactive while installing Incompatibility issues : imagine what would happen to your existing files when you switch from Windows to Linux

How would the above factors affect the business operations? D2 – Evaluate the potential risks of installing and upgrading software and explain how the risks could be minimised Down-time – careful planning would be required. Think about the best time to install. What kind of resources would be stopped when you install a system on a server for example? Incompatibility issues: switching OS, upgrading Ms word 2003 – 2007 files could not be opened. How would the above factors affect the business operations?

D2 – How risks can be minimised? Backups Installing at low risk times Incremental installation: you can install on a few Pc’s, evaluate and test for any problems, then gradually installing the rest – benefits, the business can still run their operations.