Chapter 3
Chapter 3
BASIC
TROUBLESHOOTIN
G PROCESS
● Is the PROCESS of
identifying, planning and
resolving a problem, error or
TROUBLESHOOT fault within a software or
computer system.
?
● It ENABLE the repair and
restoration of a computer or
software when it becomes
faulty, unresponsive or acts in
an abnormal way.
● IDENTIFY
● DIAGNOSE
● SOLVE
Basic Troubleshooting Process
SIX (6) step troubleshooting process
• After you have talked to the customer, you can establish a theory of
probable causes
• Create a list of the most common causes of security problems:
Basic Troubleshooting Process
STEP 3 : Test the theory to determine the cause
• Test theories of probable cause one at a time, starting with the quickest
and easiest.
• If the exact cause of the problem has not been determined after all
theories have been tested, establish a new theory of probable cause and
test it.
Basic Troubleshooting Process
STEP 4 : Establish a plan of action to resolve the
problem
and implement the solution
• List of the tasks required to document the problem and the solution.
Common Problems & Solutions
For Security
• Security problems can be attributed to hardware, software, or connectivity
issues, or some combination of the three.
• The figure is a chart of common security problems and solutions
Common Problems & Solutions
For Security
Common Problems & Solutions
For Security
Common Problems & Solutions
For Security
Common Problems & Solutions
For Security
Others Security Problems and Solutions.
● Code injection
● Data breach
● Malware infection
● Malicious Insiders
SOLUTION FOR SECURITY
MALICIOUS INSIDER
● Setting logical access control policies to implement the principle of least
privilege.
● Monitoring the network with audit and transaction logs.
● If a malicious insider attack is detected, the insider’s access privileges
should immediately be revoked.
DATA BACKUP IN WINDOWS
● Windows backups can be done manually or scheduled to takes place
automatically.
● To successfully back up and restore data in Windows, the appropriate
user rights and permissions are required:
○ All users can back up their own files and folders. They can also back up files
for which they have the Read permission.
○ All users can restore files and folders for which they have the Write
permission.
Quick tip:
You can select the Let Windows choose option,
but if you want to make sure that everything you
want is getting backed up, the Let me choose is
the option that you want to select.
DATA BACKUP IN WINDOWS
Data Backup Steps
● Click the Next button.
● Under the "Data Files" section, check all the items as required.
● Under the "Computer" section, check the Local Disk (C:).
(If you have multiple drives, they will also appear in this list.)
DATA BACKUP IN WINDOWS
Data Backup Steps
● Check the Include a system of drives: System Reserved, (C:) option.
DATA BACKUP IN WINDOWS
Data Backup Steps
● Click the Next button.
● Click the Change schedule option.
DATA BACKUP IN WINDOWS
Data Backup Steps
● Check the Run backup on a schedule option.
● Specify the frequency, date, and time when Windows 10 should backup
your computer.
DATA BACKUP IN WINDOWS
Data Backup Steps
● Click the OK button.
● Click the Save settings and exit button.
Once you complete the steps, an initial backup of your device will be created, and then
incremental backups will be performed on the schedule you specified.
THANK
YOU
3.2 PROTECTION
AGAINST
MALICIOUS
SOFTWARE
Learning Outcomes
❖ Select Check for updates (or Virus & threat protection updates in previous versions of Windows 10).
❖ If Windows Security finds a new signature, it will download and install it.
• Note: that if you get an error message while trying to download or update a signature, you can wait
for at least one hour and try again or update signatures manually.
• Also, make sure the signature you want to download is 50 MB or larger to ensure you get the
complete signature file.
Thank You
!!!
Any questions?
3.3
PROTECTION
PHYSICAL
EQUIPMENT
LEARNING OUTCOME
01 Identify physical computer and network equipment
protection methods.
Secured telecommunications
rooms, equipment cabinets, and
cages
Hardware firewalls
01 Physical barriers
01 Natural surveillance
01 Security lighting
01 Video surveillance