11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Fundamental Security 3Technicians need to understand computer and network security. Failure to implement propersecurity procedures can affect users, computers, and the general public. Private information,company secrets, financial data, computer equipment, and items of national security areplaced at risk if proper security procedures are not followed.Explain Why Security Is ImportantComputer and network security help keep data and equipment safe by giving only theappropriate people access. Everyone in an organization should give high priority to security,because everyone can be affected by a lapse in security.Theft, loss, network intrusion, and physical damage are some of the ways a network orcomputer can be harmed. Damage or loss of equipment can mean a loss of productivity.Repairing and replacing equipment can cost the company time and money. Unauthorizeduse of a network can expose confidential information and reduce network resources.An attack that intentionally degrades the performance of a computer or network can alsoharm an organization’s production. Poorly implemented security measures that allow unauthorizedaccess to wireless network devices demonstrate that physical connectivity is notnecessary for security breaches by intruders.A technician’s primary responsibilities include data and network security. A customer or anorganization may depend on you to ensure that their data and computer equipment aresecure. You will perform tasks that are more sensitive than those assigned to the averageemployee. You may have to repair, adjust, and install equipment. You need to know how toconfigure settings to keep the network secure, but still keep it available to those who needto access it. You will ensure that software patches and updates are applied, antivirus softwareis installed, and antispyware software is used. You may also be asked to instruct userson how to maintain good security practices with computer equipment.Worksheet 9.1.0: Security AttacksIn this activity, you use the Internet, a newspaper, or magazines to gather information tohelp you become familiar with computer crime and security attacks in your area. Be preparedto discuss your research with the class. Refer to the worksheet in IT Essentials: PCHardware and Software Labs and Study Guide, Third Edition. You may complete this worksheetnow or wait to do so until the end of the chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!