1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

GCSE ICT Networks & Security..
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Chapter 7: Physical & Environmental Security
Lesson 4 Computer Maintenance
1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Lesson 30 Computer Safety and Ethics
Preparing for Power Outages Like any other part of the infrastructure, electrical power to the campus can fail, either as an isolated incident (e.g., tripped.
CIT In this chapter you will learn how to:  Care for the external parts of the computer  Describe methods for keeping the inside of the case problem-free.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Everything your business needs to know but probably doesn’t.
Lesson 5 Computer-Related Issues
9 - 1 Computer-Based Information Systems Control.
Lesson 9 Computer Troubleshooting
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Unit 3- Maintaining & Protecting Hardware.  Identify the importance of protecting computer hardware from theft and damage.  Explain how to protect data.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS.
1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Lesson 10 Operating System Customization
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
By: Marideth Bradley. OBJECTIVES Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can be performed.
Data Security GCSE ICT.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
Lesson 8 Operating Systems
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 3 Evaluating, Purchasing,
Unit 4- Maintaining & Protecting Hardware.  Identify the importance of keeping a computer clean.  Explain what is needed to clean a PC.  Identify the.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Lesson 4 By: Matthew Cheser. Objectives Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Operating Systems Morrison / WellsCLB: A Comp Guide to IC 3 3E 1 Morrison / Wells.
Safe Lab Procedures and Tool Use
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 5 Computer-Related Issues Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 8 Operating Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 1 Computers and Computer Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
A+ Computer Repair Lesson 9 Problems Causing Power Events.
Chapter 6 Protecting Your Files
Lesson 3 Computer Protection
Computer Literacy BASICS
Chapter 2: Introduction to Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
UNIT 19 Data Security 2.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Lesson 3 Computer Protection
Chapter 6 Purchasing and Maintaining a Computer
Lesson 4 Computer Maintenance
Lesson 3 Computer Protection
Lesson 10 Operating System Customization
Lesson 5 Computer-Related Issues
Computer Literacy BASICS
Presentation transcript:

1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 222 Objectives Identify the importance of protecting computer hardware from theft and damage. Explain how to protect data. Identify environmental factors that can cause damage to computer hardware and media. Identify how to protect computer hardware from power loss and fluctuation. Identify common problems associated with computer hardware.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 333 Vocabulary backup data theft driver encryption humidity ping power spikes surge suppressor uninterruptible power supply (UPS)

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 444 Introduction As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important. There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 555 Protecting Computer Hardware from Theft and Damage Theft of and damage to computer equipment is a serious problem. Safeguards include: – Physically secure equipment – Use security locks – Mark equipment with identification mark – Insure the equipment – Back up data to a separate system Employees using company computers for personal use can be a type of theft.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E Data Protection Data is a critical component of businesses. The risk and severity of data theft is due to: – The value of data stored on computers – Confidential and private data being stored – Increased use of laptops outside a secure network – Increased proficiency of data hackers and thieves Encryption is a secure process for keeping confidential information private. 666

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E Data Protection (continued) Data Backup: Because data is so valuable, you must back up important files regularly. Backup procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost. Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site. 777

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 88 Environmental Conditions Computers require the right balance of physical and environmental conditions to properly operate. 8 Temperature: A temperature range of 68 to 75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 99 Environmental Conditions (continued) Humidity: A high level of humidity can cause computers to short circuit, resulting in the loss of data and damage to hardware. For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point. 9

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 10 Environmental Conditions (continued) Water Damage: If a computer suffers water damage, make sure it is completely dried out before you restore the power. Magnetic Fields and Static Electricity: A single spark from static electricity can damage the internal electronics of a computer. Have grounding protection. 10

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 11 Environmental Conditions (continued) Maintaining Equipment: Cut down on computer repair through preventive maintenance. Create a monthly maintenance schedule and follow it regularly. Physical Damage: Prevent damage to portable computers due to physical shock by transporting devices with care, such as in padded cases. 11

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 12 Power Loss and Power Fluctuation Issues An unexpected power outage can wipe out any data that has not been properly saved. Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy. 12 Surge suppressors can protect against power spikes. Surge suppressor

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 13 Power Loss and Power Fluctuation Issues (continued) One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS). 13 A UPS contains a battery that temporarily provides power if the normal current is interrupted.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 14 Hardware Issues You can resolve or prevent many hardware issues by proper planning and training. Crashed Hard Drive: To evaluate the condition of the drive: – Verify the cable is not damaged and is plugged in – Use a boot disk to determine if drive is readable – Use diagnostic and data recovery programs – Use a data and recovery service 14

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 15 Hardware Issues (continued) Damaged Media: Hard disks and other media eventually fail, but often you can recover the data. First, move it to a secure environment, then inspect or test it to evaluate the damage. The type of damage determines the type of recovery method to use. 15

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 16 Hardware Issues (continued) Printer Problems: Paper jams are one of the more common problems. 16 Display Problems: The majority of display problems are caused by incorrect, corrupted or missing video drivers.

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 17 Hardware Issues (continued) Inoperable Hardware Devices: Could be a software, electrical, or mechanical problem. A small program called a driver instructs the operating system on how to operate specific hardware. Loss of Network or Internet Connectivity: Means people cannot communicate or work effectively. 17

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 18 Summary In this lesson, you learned: Computer equipment needs to be protected from theft and damage Back up data frequently and consistently to avoid losing important information. The right balance of physical and environmental conditions are required for computers to operate properly. 18

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 19 Summary (continued) High humidity, water, and electric/magnetic fields can damage computer equipment. Preventive maintenance reduces equipment repair needs. Electrical power failure can destroy data and equipment. Surge suppressors can protect against power spikes. 19

Lesson 3 Morrison / WellsCLB: A Comp Guide to IC 3 3E 20 Summary (continued) Computer centers are vulnerable to problems such as a crashed hard disk, damaged media, printer and display problems, inoperable hardware devices, and loss of network and Internet connectivity. 20