0% found this document useful (0 votes)
135 views9 pages

Mind Map Chapter 3

The document discusses common security problems and solutions for troubleshooting including identifying unknown assets, abuse of user privileges, and unpatched vulnerabilities. It then provides methods for backing up data on Windows systems through file history, restore points, system images, and recovery disks. Finally, it discusses malware protections using antivirus, antispyware, and adware software and remediating infected systems through signature identification patterns.

Uploaded by

Wei Ying
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views9 pages

Mind Map Chapter 3

The document discusses common security problems and solutions for troubleshooting including identifying unknown assets, abuse of user privileges, and unpatched vulnerabilities. It then provides methods for backing up data on Windows systems through file history, restore points, system images, and recovery disks. Finally, it discusses malware protections using antivirus, antispyware, and adware software and remediating infected systems through signature identification patterns.

Uploaded by

Wei Ying
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CHAPTER 3 : SECURITY

TROUBLESHOOTING AND SOLUTIONS


1.Identify the 2.Establish a theory
problem of probable cause

BASIC 3.Test the theory to


6.Document findings,
TROUBLESHOOTING determine the cause
actions, and
outcomes PROCESS

4.Establish a plan of
5.Verify full system
action to
functionality
resolve the problem and
and, if applicable, implement
implement the solution
preventive measures
COMMON PROBLEMS AND SOLUTIONS FOR SECURITY

UNKNOWN ABUSE OF USER UNPATCHED


ASSETS ON ACCOUNT SECURITY
NETWORK PRIVILEGES VULNERABILITIES

A LACK OF NOT ENOUGH IT


DEFENSE IN SECURITY
DEPTH MANAGEMENT
DATA
FULL BACKUPS
BACKUPS

DIFFERENTIAL INCREMENTAL
BACKUPS BACKUPS
METHOD 1
Backup with File History

METHOD 2
Back up Windows 10 system to a
restore point

BACKUPS METHOD 3
DATA ON Full backup Windows 10 to a
system image file

WINDOWS METHOD 4
Create Windows 10 recovery disk
with a USB/DVD

METHOD 5
Back up with cloud
Malicious Software Protections Programs

01 02 03

ANTIVIRUS ANTISPYWARE ADWARE


SOFTWARE SOFTWARE SOFTWARE

04 05

ROGUE REMEDIATING
ANTIVIRUS INFECTED
SIGNATURES FILE

The signature can identify These patterns are


Identifies a file or a file from within the file determined by analyzing
verifies the content of or be kept in a separate viruses that are
a file file or database intercepted on the
Internet and on LANs.
LOCK UP THE SERVER SET UP
ROOM SURVEILLANCE

PHYSICAL COMPUTER AND


NETWORK
PROTECT THE USE RACK MOUNT
PORTABLES EQUIPMENT PROTECTION SERVERS
METHODS

PACK UP THE
DISABLE THE DRIVES
BACKUPS
HARDWARE SECURITY

Service
Security
Packs
Patches

You might also like