FLOOR CANDY.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Operating System Customization
Security+ Guide to Network Security Fundamentals
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Initial Findings  Secure all contracts with third party vendors immediately  Develop a strong understanding of the ‘Flow of PHI’ within and outside of.
System Implementation
Incident Response Updated 03/20/2015
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
With Special Guest Host: Vanna White  Shake Weight!  Potty Patch!  A new Ford Pickup!  Review for INFS 3220 Final (Legal Disclaimer: Shake Weight,
Chapter Three OPERATING SYSTEMS.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Hands-On Microsoft Windows Server 2008
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Lesson 34: Web Site Publishing and Maintenance. Objectives Perform site testing Use a staging/mockup server to test a site Compare in-house Web site hosting.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Module 15 Managing Windows Server® 2008 Backup and Restore.
1 Chapter 7 Operating Systems & Utility Programs.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
Chapter 2 Securing Network Server and User Workstations.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Module 11: Designing Security for Network Perimeters.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Systems Analysis & Design 7 th Edition Topic 9.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Computer Security By Duncan Hall.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
«My future profession»
Critical Security Controls
Data and database administration
Introduction to Operating Systems
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Lesson 16-Windows NT Security Issues
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Test 3 review FTP & Cybersecurity
Bethesda Cybersecurity Club
Presentation transcript:

FLOOR CANDY

Floor Candy 1) What types of maintenance has the IT staff performed? 2)What types of maintenance will they perform if new features are added?

Corrective Maintenance Diagnose and fix logic errors Maintain proper configuration settings Debug program code Install current drivers

Required for adding new features Adaptive Maintenance Required for adding new features Adding online capabilities Adding support for mobile devises Providing new data entry screens Installing links to Web site Creating an employee portal

Perfective Maintenance Required to improve performance Optimize user desktop settings Install more powerful network server Update or replace outdated hardware Write macros to handle repetitive tasks Compress file system

Maintenance Release Methodology For adding new functionality and enhancements Major corrections implemented immediately Additions implemented as a Maintenance Release

Physical Security • Secure computer rooms • Install video cameras and motion sensors. • Activate BIOS-level passwords, boot-level passwords, or power-on passwords.

Network Security • Check if connections are encrypted, with special attention to wireless networks. • Check if a virtual private networks is used. • Assure that system firewalls are installed and operating properly

Application Security • Disable all unnecessary applications and services. • Review the configuration for each application to identify any potential security holes.

File Security • Document all file permissions to assure that appropriate access is available ONLY to authorized users.

User Security • Determine whether search engines might allow unauthorized users to retrieve private data or passwords. • Analyze password protection policies and procedures to assure that passwords are case-sensitive, have a minimum length, and a limited duration. • Test the firm’s defenses to a social engineering attack

Procedural Security • Establish clear managerial policies and controls. • Stress employee responsibility for security.

Should Floor Candy consider replacing the new system? Yes!