FIT03.05 Explain features of network maintenance.

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Maintaining and Troubleshooting Computer Systems Computer Technology.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Concepts of Database Management Seventh Edition
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Managing a computerised PO Operating environment 1.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Hands-On Microsoft Windows Server 2008
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
1.1 System Performance Security Module 1 Version 5.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Client-Server & Peer-to-Peer Networks
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Concepts of Database Management Eighth Edition
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Robert Crawford, MBA West Middle School.  Explain how to prevent data loss  Describe how to use antivirus programs  Discuss ways of backing up data.
Computer Literacy BASICS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Blueberry Software IT Security Audit Results. Results: Good.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
history, hardware, software, safety, and computer ethics
INTERNET SAFETY FOR KIDS
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
PREVENTIVE COMPUTER MAINTENANCE. Preventive Maintenance regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Security By Duncan Hall.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
By Mr Mohammed. Objectives Describe what a client/server network is Some students will be able to explain the difference between the two networks along.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Network Management Chapter 8 Semester 3 By Roger Lewis.
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
«My future profession»
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Chapter 8 Operating Systems and Utility Programs.
How a Network Works The network in this presentation belongs to Informa Software, Maitland FL.
UNIT 19 Data Security 2.
Things To Avoid: 1-Never your password to anyone.
PLANNING A SECURE BASELINE INSTALLATION
G061 - Network Security.
Presentation transcript:

FIT03.05 Explain features of network maintenance

Network Maintenance  Keep virus definitions up-to-date (A new virus is created every couple of hours)  Defragment the hard drive (Helps create more space)  Check the case for dust and other debris once per month (Lengthens the life of Computer)  Ensure computers are plugged into a surge protector (Prevent lightening strike that could damage computer)  Servers and other essential systems should be connected to an uninterruptible power supply (UPS) device (In power lose you will have time to backup important data)

Network Monitoring  Basics of Network Monitoring  Logs—first source of diagnostic information  System audits  System optimization and improvement  Traffic issues  Fault tolerance and redundancy

Network Maintenance  System Upgrades  Software upgrades  Operating system upgrades  Hardware upgrades  Patches and up-to-date drives are best found on technical support websites  System backups  Typically stored in a storage rack in your network computer room  Restoring data

Network Security  Four major threats to the security of data on the network 1.Unauthorized access  don’t give anyone your passwords  log out if you leave your workstation 2.Electronic tampering 3.Theft 4.Intentional or unintentional damage

Computer Viruses  Boot-sector viruses  When the computer is booted, the virus executes  File infector viruses  Attaches itself to a file or program and activates any time the file is used  Anti-virus software  can be kept on the server so that it cannot be disabled by workstation users

Firewall  A system that implements and enforces an access control (or security) policy between two networks

Network Troubleshooting  Look for simple problems first, like whether cables are plugged in and devices are turned on.  Suspect things that are closely related to what errors say, like:  If you have a problem when you turn something else on suspect a problem caused by the item you just turned on  Software errors, like bad or missing.DLL files, are typically caused by software  If you can’t access the Intranet, troubleshoot the Intranet.  Use troubleshooting flowcharts to trace problems