Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.

Slides:



Advertisements
Similar presentations
Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
Advertisements

Configuring Home Network With OpenDNS
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Information about the computer By Sophia and Christina C.
Comprehensive IT Consulting Services an innovative approach to business.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Duties of a system administrator. A system administrator's responsibilities typically include:
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Managing Computerised Offices Operating environment
“A New Level” Redesigning the Network and Rebuilding Two New Computer Labs for Harambee Ministries By Josh Kammerer.
Common Devices Used In Computer Networks
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
University of Management & Technology 1 Operating Systems & Utility Programs.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
What is wireless computer networking? Wireless networks maintain communication channels between computers by using radio waves and/or microwaves. Wireless.
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Chapter 2 Securing Network Server and User Workstations.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
 Understand the desktop environment and what it is made up of.  Know how to manage the desktop environment  Use the desktop environment with ease.
NETWORKING & SYSTEM UPDATES
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
6/14/20161 System Administration 1-Introduction to System Administration.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Network Security.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
TCSEC: The Orange Book.
Online Canon Printer Support & Customer Services
Chapter 6 Application Hardening
Networking and Health Information Exchange
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Information Technology (IT) Department
Introduction to System Administration
Introduction to System Administration
Introduction to Operating Systems
Webroot Antivirus As far as you all know that Webroot is a reputed brand in the international Security software market. It’s provides excellent.
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
Contact Norton Antivirus | Norton Antivirus Support UK
Networking for Home and Small Businesses – Chapter 2
Network Models, Hardware, Protocols and number systems
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 2
Computer Concepts Module 3
Presentation transcript:

Personal System Administration CS5493

SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.

Personal SA Every individual who owns a computer potentially becomes an SA. It is becoming common for a home computing system to consist of more than one computer. Home computing systems can be networked (wired or wireless)

Some of the SA Duties: Install software – Applications – Security/Maintenance software Keep the OS up-to-date Keep software up-to-date Data protection – Backups – Implement other security measures

SA Duties Finding solutions to problems with the computing system Define how the system is used by controlling access to: – The computing system – Applications – Internet – Data

System Configuration: Getting Started Determine how the computing system will be used. Determine who the user are and their needs. Acquire the hardware and software required to meet the usage criteria (for the purpose of our discussion, assume the system is custom built by the SA). Determine how the system will be maintained and secured

How to Configure A Secure Computer Install the OS using a secure copy of the OS. Install and activate Security Software Connect to the internet Update Security Software Update the OS with patches, fixes, etc. Install apps Update the apps Scheduling updates

Advanced Activities Uninstalling unwanted (unused) applications started by the OS during boot Remove annoying applications Configuring a secure user environment – Separate accounts – Browser – Other apps – Implementing access controls

…Beyond Configuration Replacing hardware & software Upgrades to hardware and software Backups

Wireless Security To Broadcast or not to … your SSID Trusted MAC addresses Password access and Encryption etc

Other Security Issues Power (UPS, surge protection, & power conditioning) HVAC (ventilation & AC) Backup RAID? Physical security

The End

In-Class Exercise: 21 st Century Home Computer System

Spec the System Determine how a computer would be used in a home: – Wireless network – Home entertainment system Music Movies Games – Education – Communication ( , phone, etc)

Etc. Determine the users and their needs – Children – Adults