11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2 IT Essentials: PC Harware and Software Companion GuideThis chapter reviews the types of attacks that threaten the security of computers and thedata contained on them. A technician is responsible for the security of data and computerequipment in an organization. The chapter describes how you can work with customers toensure that the best possible protection is in place.Risks to computers and network equipment come from both internal and external sources.Risks include physical threats, such as theft or damage to equipment, and data threats, suchas the loss or corruption of data.After completing this chapter, you will meet these objectives:■■■■■Outline security requirements based on customer needsSelect security components based on customer needsImplement a customer’s security planPerform preventive maintenance on securityTroubleshoot securityOutline Security Requirements Based onCustomer NeedsAn organization should strive to achieve the best and most affordable security protectionagainst data loss or damage to software and equipment. Network technicians and the organization’smanagement should work together to develop a security policy to ensure that dataand equipment have been protected against all security threats. A security policy includes acomprehensive statement about the level of security required and how this security will beachieved.You might be involved in developing a security policy for a customer or organization. Whencreating a security policy, you should ask the following questions to determine security factors:■■■Is the computer located at a home or a business? Home computers generally aremore vulnerable to wireless intrusion than business computers. Business computershave a higher threat of network intrusion, because of users abusing their access privileges.Is there full-time Internet access? The more a computer is exposed to the Internet,the greater the chance of attacks from other infected computers. A computer accessingthe Internet should include firewall and antivirus solutions.Is the computer a laptop? Physical security is an issue with laptop computers. Thereare measures to secure laptops, such as cable locks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!