Coc2 Edited Css Computer System Servicing
Coc2 Edited Css Computer System Servicing
SETTING-UP COMPUTER
Module Title : NETWORKS
Welcome!
Remember to:
When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
List of Competencies
No Unit of
. Competency Module Title Code
Installing and
Install and configure configuring
ELC724331
1.
computer systems computer systems
MODULE CONTENT
MODULE DESCRIPTOR:
Computer networks.
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
11. Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.
16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network des
17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network des
20. Final inspections are undertaken to ensure that the configuration done on
MODULE DESCRIPTOR:
Computer networks.
CONTENTS:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
● Cables and connectors. These link together the computers, printers, servers
and other equipment on your network.
● A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.
● A wireless access point (optional). This will extend your wireless network if
the router is incapable of offering coverage in certain parts of the building.
● An internet connection. This could be a faster fibre connection or dedicated
leased line.
● A hardware firewall. This creates a secure barrier between your network and
the internet, blocking security threats. Networks sometimes include an on-
site network server which runs central applications, acts as an email server and
provides file storage.
Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in
meeting rooms or common areas. It's also useful for offering internet access to
visitors, with many routers including a separate 'guest' network for the purpose.
Wireless routers start at around £70.
RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer
networking equipment
UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.
CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.
WIRE STRIPPER
LAN TESTER
ROUTER
SWITCH HUB
BAY RACK
PATCH PANEL
a board in a switchboard,
computer,
or other device with a number of
electric sockets that may be
connected
in various combinations.
Modular box
A modular PC is a computer that has
individually-housed components,
which are interconnected but separately
removable for service or upgrading. .
While Piston is upgradable, modules
are not actually individually housed,
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099
2 COMPUTER DESKTOP
RACEWAY or SLOTTED
COMPUTER TABLE
SELF-CHECK 1.1-1
Steps / Procedure:
Assessment Method:
Demonstration
LEARNING OBJECTIVES:
Coaxial Cable
It has a single copper conductor in the middle. A
plastic layer provides insulation between the
braided metal shield and center conductor. The
metal shield blocks outer interference from
motors, fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal
obstruction though it is complex to install. It can
handle great cable lengths between network
devices than the twisted pair cable. The two
types of coaxial cables are thin coaxial and thick
coaxial.
RJ45 and CAT 6 are the most widely recognized innovations out there with regards
to organize cabling. As system cabling masters, Dimtech comprehends the
significance of utilising the right cabling.
Our network cabling work consents to all statutes, directions, and models. This is
vital on the grounds that numerous suppliers will utilise shabby, substandard
cabling which does not follow national norms. Ensure your system establishment is
100% consistent and converse with Dimtech today.
STRAIGHT THROUGH
TYPE A TYPE B
NOTED:
Materials Needed:
2 RJ45
1 meter Network Cable – UTP cable
Tools Needed:
Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)
Position all eight wires according to its assigned pins in the RJ45
Position all wires. Make sure that all are in proper pin assignment
Make sure that the cut is even and small enough for the RJ45
POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable
1. Select the cable to be tested and make sure it is not plugged to any electrical
power and free of any packaging or tangled with other cables, to prevent false
reading.
2. Visually inspect the cable for damage. If cable is broken or torn it should be
replaced.
3. Plug the network cable into the appropriate port on the cable tester, and then
connect the other end of the cable to the remote.
4. Switch the tester on to test your cable. The tester will show results, and if
applicable, will indicate what the potential problem is
PC to PC
Networking
Requirements:
1. Two Computers
with compatible O.S.
and Ethernet adapter.
2. Cross Over Cable
SELF-CHECK 1.1-2
Steps / Procedure:
Assessment Method:
Demonstration
YE N
CRITERIA S O
Did you……
Wear your ppe
Unroll the required length of network cable and add a little extra
wire, just in case.
Carefully remove the outer jacket of the cable
Inspect the newly revealed wires for any cuts or scrapes that
expose the
Untwist the pairs so they will lay flat between your fingers.
Repeat all of the above steps with the other end of the cable
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Wireless
Configuration (WZC), also
known as Wireless Auto
Configuration, or WLAN
AutoConfig, is a wireless
connection management
utility included with Microsoft
Windows XP and later operating
systems as a service that
dynamically selects a wireless
network to connect to based on a
user's preferences and various
default settings.[1][2] This can be
used instead of, or in the absence
of, a wireless network utility from
the manufacturer of a computer's
wireless networking device. The drivers for the wireless adapter query
the NDIS Object IDs and pass the available network names (SSIDs) to the service.
The service then lists them in the user interface on the Wireless Networks tab in
the connection's Properties or in the Wireless Network Connection dialog box
accessible from the notification area. A checked (debug)[3] build version of the
WZC service can be used by developers to obtain additional diagnostic and
tracing information logged by the service.
Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you
need to cover, or have lots of walls in your home, you’ll need a router that offers
the option of upgrading antenna(s) with high gain types - if not supplied in the
box. If more than one wireless device will be connecting at the same time at
different speeds, a MiMo type router is recommended, otherwise the speed for all
devices will drop the highest supported by all at that time.
● All modern routers should support 802.11n, or Wireless-N). This is the
most stable, offers the fastest speeds and is backwards compatible with
older standards such as 802.11g.
3.Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game console
or TV, you can connect them to the router via Ethernet.[3] This will result in a
more stable and faster connection, and doesn’t require any extra configuration.
4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings.
You can disconnect this computer afterwards if you want to connect wirelessly.
You can also connect your laptop wirelessly for the first time, the wifi network
name and the default password will be printed on the router's label
PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network,
and the device will be connected to the router's wi-fi connection, not
the internet. To connect the router to the internet, with some internet providers
(i.e. GTPL in India), it is required to register router's MAC address to the internet
service provider's website.
● MAC of the router can be found printed on router or in the documents etc.
2.Go to the internet service provider's website. Type ip address Log in with
the username and password provided by the internet service provider and go to
MAC address update option. one can see their existing laptop / computers MAC
address there. Add the router's MAC address there and save it. This process
means that the router is authorized to use the internet provide by the broadband
company.
1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.
3.Open the Wireless Settings. When you log in to your router, you will be
taken to the router’s main menu or status screen. There will be several options to
choose from. The Internet section can usually be left at default settings, unless
you received specific instructions from your internet service provider. The
Wireless section will allow you to set up your wireless network.
4.Enter a name for your wireless network. In the Wireless section, you
should see a field labeled SSID or Name. Enter a unique name for your wireless
network. This is what other devices will see when scanning for networks.
● Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.
3. Choose
a security method. Choose from the list of available security options. For
the best security, choose WPA2-PSK as the encryption method. This is the
most difficult security to crack, and will give you the most protection from
hackers and intruders.
4. Save
your
settings. Once you are finished naming and securing your wireless
network, click the Apply or Save button. The changes will be applied to
your router, which may take a few moments. Once the router has finished
resetting, your wireless network will be enabled.
2. Enter your wireless passphrase. Once you enter the passphrase, your
device will be automatically connected to the wireless network. The network will
be stored in your devices memory and will automatically connect whenever you
are within range.
● For detailed instructions on selecting and joining a wireless network for
your specific computer, tablet, or smartphone, follow this guide.
3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more.
See the following guides for instructions for your specific device.
SELF-CHECK 2.1-1
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
Assessment Method:
Demonstration
YE N
CRITERIA S O
Did you……
Wear your ppe
LEARNING OBJECTIVES:
Network Connectivity
What is a Network?
A network consists of two or more
computers that are linked in order
to share resources (such as
printers and CDs), exchange files,
or allow electronic
communications. The computers
on a network may be linked
through cables, telephone lines,
radio waves, satellites, or infrared
light beams.
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network.
Services provided can include printing and faxing, software hosting, file storage
and sharing, messaging, data storage and retrieval, complete access control
(security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse,
or a laptop, with with integrated keyboard, display, and touchpad. With the
advent of the tablet computer, and the touch screen devices such as iPad and
iPhone, our definition of workstation is quickly evolving to include those devices,
because of their ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are
guided by needs. For example, a group of servers might be located in a secure
area, away from humans, and only accessed through the network. In such cases,
it would be common for the servers to operate without a dedicated display or
keyboard. However, the size and speed of the server's processor(s), hard drive,
and main memory might add dramatically to the cost of the system. On the
other hand, a workstation might not need as much storage or working memory,
but might require an expensive display to accommodate the needs of its user.
Every computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or
wirelessly. Wireless access to a wired network is made possible by wireless
access points (WAPs). These WAP devices provide a bridge between computers
and networks. A typical WAP might have the theoretical capacity to connect
hundreds or even thousands of wireless users to a network, although practical
capacity might be far less.
Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary
(desktops) are also usually connected by a cable to the network, although the
cost of wireless adapters has dropped to the point that, when installing
workstations in an existing facility with inadequate wiring, it can be easier and
less expensive to use wireless for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.
communications networks like the Internet. To users, however, a WAN will not
appear to be much different than a LAN.
DIAGRAM NETWORK CONNECTIVITY
ROUTER
ROUTER
SWICTH HUB
FOURTH:
CONNECT
SWITCH HUB TO
PATCH PANEL
PATCH PANEL
SWICTH HUB
PATCH PANEL
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is
handled automatically if you're using a router. Think of an IP address as a
mailing address. Each computer on the network needs a unique IP address so
that information sent across the network reaches the correct destination.
Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.
A. Click Start
B. Right-click
Network
and click
Properties
(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second
octets of the IP address you had provided (such as 192.168) and
use 001.001 for the other two bytes)
M. Provide the Preferred DNS server address (we use 127.0.0.1 for
our example) and the Alternate DNS Server address (we leave ours
empty)
N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
ESSAY: write the correct definition in your whole sheet of pad paper
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
7.Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.
Assessment Method:
Demonstration
Click the Ethernet link at the top of the window. You'll see this
next to
"Connections." Click Properties.
Click OK. This will save the settings for that computer. This
computer is now configured on your network with a unique IP
address.
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:
Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets
back. By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the
two computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:
Ping 127.0.0.1
If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23
Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:
These replies indicate that you have successfully sent data to the other
machine and received it back.
If, on the other hand, the ping command returns Request timed out, the
packets either didn't make it to the other computer or they were not
returned. In either case, you have a problem with your cabling, network
adapter, or the TCP/IP protocol setup.
You can use ping to determine which computers can send to which other
computers on your LAN or across wide area networks (WANs) or the
Internet. ping works when given a computer's IP address or its network
name.
NOTE
If you enter a computer name, and ping can't determine the computer's IP
address, the problem isn't necessarily a wiring problem—it could be that the
DNS or WINS name lookup systems are not working correctly. Try using an IP
address with ping in this case to help determine what the problem really is.
Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a
ping tool is built into most operating systems that works in much the same
way. You issue the ping command along with a specific URL or IP address.
Your computer sends several packets of information out to that device, and
then waits for a response. When it gets the response, the ping tool shows
you how long each packet took to make the round trip—or tells you there
was no reply.
It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.
And it pretty much doesn’t matter what operating system you’re using. Pull
up a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the
Terminal app on macOS or any Linux distro. Once you get to using the actual
command, it works the same everywhere.
In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.
At the prompt, type “ping” along with the URL or IP address you want to
ping, and then hit Enter. In the image below, we’re pinging
www.howtogeek.com and getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next
four lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.
At the bottom, you’ll see a summary that shows how many packets were
sent and received, as well as the minimum, maximum, and average response
time.
And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.
When the ping tool does not get a response from whatever devices you’re
And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those
advanced switches.
If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
Now that you know how to use the command, here are some interesting
things you can do with it:
Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices,
you’ll need to turn off that setting to allow pings through the firewall.
The list above uses a kind of outside-in approach, where you ping the
furthest destination first, and then work your way in to the more local
devices. Some people like to work inside-out by pinging the loopback
address first, then their router (or another local device), and then an internet
address.
And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
Assessment Method:
Demonstration Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099
Check the physical connections. Check that the Link light — the
little red or green light next to the RJ-45 port — is lit on
every computer
LEARNING OBJECTIVES:
ipconfig
If your computer can't communicate with others on your LAN, after you
check the Event Log and Device Manager, use the ipconfig command-line
utility to see whether your computer has a valid IP address. Check other
computers on the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:
ipconfig /all
Windows IP Configuration
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)
● Host name—This should be set to the desired name for each computer.
If you can correspond with some computers but not others, be sure that
the ones that don't work are turned on and correctly named. Make sure
that you don't have two computers with the same name, and that none
of the computer names is the same as the workgroup name.
● IP address—This should be set appropriately for your network. If your
LAN uses Internet Connection Sharing, the address will be a number in
the range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the
IP address is correct. Networks with cable/DSL sharing
routers usually use numbers starting with 192.168.x where x is a number
from 0 to 15.
Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems
with DHCP-based (automatic) IP address assignment.
NOTE
Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in
NOTE
None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers,
change that computer's name.
Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of
that window, click Manage Network Settings. Then, right-click your Local
Area Connection icon (or the appropriate wireless connection icon) and select
Properties.
So, how do you protect devices from the prying eyes of the hackers?
altogether, but this has been among one of the main reasons why hackers
are easily able to attack to the systems because of weak password and
accessibility to access points.
All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.
Most offices as well as households have been using CCTV cameras to keep
their home or office secure and are attached to the home or office network to
view them anytime and anywhere. But this can be dangerous at times.
If the CCTV hooked up with the system is not encrypted strongly than
hackers can easily view your updates of home or office and steal prime
information. Hackers could get all the insights of your office and household
and can make a right move at the right time.So it is very important to keep it
secure with username and password which may not be guessed. You can
have an alarm and security features if any unknown device hacks into it to
keep your system safe.
2. Set the router access password. Anybody who gains access to the
router configuration settings can disable the security you have set up. If
you forget the password, most routers have a hardware reset that will
restore all of the settings to factory defaults. The best option is to use a
random sequence of the maximum length of characters - you only have to
type that once, so it is not a big thing. When you connect to the router via
LAN cable while setting it up, you can copy and paste the password onto
the router and onto your local setting, so you never need to type it again.
Use a secure password. Don't use easily guessed passwords for your
WPA2 or router access passwords, such as "ABC123", "Password", or a
string of numbers in order. Use something hard to guess that contains
both upper and lowercase letters as well as numbers. Special characters
such as !@#$% are not supported by some routers. The longer the key,
the better, although the WPA2 key has a minimum and maximum length.
Try to make a little mental effort -- good passwords might be hard to
remember, but they are harder to crack.
If you use a weak key then even WPA and WPA2 can be easily cracked
within a day using a combination of special precomputed tables and
dictionary attacks. The best way to generate a secure key is to use an
offline random number generator or write the entire alphabet in
uppercase and lowercase and numbers 0-9 on separate pieces of paper,
mix the paper up and randomly pick up pieces and return them, mixing
them up again each time; each character you pull out becomes a
character in your key. You can also try throwing a pair of dice and using
the resulting numbers as your password.
5. Disable remote login. The first router worm brute forces its way into
the router in this manner. Most default usernames are set to Admin. It
isn't hard for a virus/worm to crack the password if the username is
known. The good thing is that routers normally have this disabled by
default. Be sure to confirm that it is disabled when you first set up your
router and periodically thereafter. If you need to update your router
setting remotely, only set up access for the time you are going to be
connected.
6. Disable wireless administrating. Finally, change the setting that
allows administrating the router through a wireless connection to 'off'
(meaning that you need to connect with a LAN cable for administration).
This disables any wireless hacking into the router.
7. Update your software regularly. Regular software updates are one of
the most effective steps you can take to improve the overall
cybersecurity posture of your home networks and systems. Besides
adding new features and functionality, software updates often include
critical patches and security fixes for newly discovered threats and
vulnerabilities. Most modern software applications will automatically
check for newly released updates. If automated updates are not available,
consider purchasing a software program that identifies and centrally
manages all installed software updates. (See Understanding Patches and
Software Updates.)
8. Remove unnecessary services and software. Disable all unnecessary
services to reduce the attack surface of your network and devices,
including your router. Unused or unwanted services and software can
create security holes on a device’s system, which could lead to an
increased attack surface of your network environment. This is especially
true with new computer systems on which vendors will often pre-install a
large number of trial software and applications—referred to as
“bloatware”—that users may not find useful. The Cybersecurity and
Infrastructure Security Agency (CISA) recommends that you research and
remove any software or services that are not being used regularly.
9. Adjust factory-default configurations on software and
hardware. Many software and hardware products come “out of the box”
with overly permissive factory-default configurations intended to make
them user-friendly and reduce the troubleshooting time for customer
service. Unfortunately, these default configurations are not geared
towards security. Leaving them enabled after the installation may create
more avenues for an attacker to exploit. Users should take steps to
harden the default configuration parameters to reduce vulnerabilities and
protect against intrusions.
10. Change default log-in passwords and usernames. Most network
devices are pre-configured with default administrator passwords to
cautious user and familiarize yourself with the most common elements of
a phishing attack.
27. Use a security-focused DNS service provider. By default, your
router will be configured to forward Domain Name System (DNS) requests
to your ISP, which means you have to trust your ISP to maintain a secure
DNS lookup service. Since DNS acts as the internet’s phone book, locating
the IP addresses of the websites you want to visit, hackers commonly
target it to direct users to malicious websites in a way that’s typically
hard to spot. Companies like Google, Cloudflare, OpenDNS (Cisco) and
others offer publicly available DNS resolvers that are security-focused and
even have encrypted versions.
SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
the password, most routers have a hardware reset that will restore all of the
settings to factory defaults.
Steps / Procedure:
Assessment Method:
Demonstration