IT Fundamentals Notes - 5.FINAL
IT Fundamentals Notes - 5.FINAL
Workstation = desktop
Benefits of desk tops - Basic design can be modified or upgraded to suit a purpose
Server – a computer that provides services to any other computer, usually a powerful computer
supporting large amounts of users. Servers make use of copies and backups making them FAULT
TOLERENT
Benefits: Size and weight, Integrated input devices (mouse and keyboard)
Internet of Things refers to any device that can be connected to a network, smart homes , cars.
Home automation
Setting up a PC system
Prerequisites to set up a pc :
– Correct environment (right temp and no dust or humidity), Safe physical installation, no
exposed wires or tripping hazards , Is the system healthy and ergonomic to use.
Ergonomic Concepts
Navigating an os
The main function of the os is to provide a stable environment from different software applications
to work and run. The os provides the applications access to the hardware.
When started up the computer preforms a Power-on Self-Test ( POST ) to ensure that the main
components are working.
The TASK VIEW button can also be clicked to view a list of running apps.
Recognizing Desktop icons
Shortcuts – looks like a file icon but has a small arrow in the bottom left corner.
First types of operating systems like Microsoft Disk Operating system (DOS) used Command line
interface(CLI) or simple menu systems. This evolved into the GUI ( Graphical user interface)
Kernel - The kernel is a computer program at the core of a computer's operating system and
generally has complete control over everything in the system. It is the portion of the
operating system code that is always resident in memory and facilitates interactions
between hardware and software components.
The OS is built from a kernel of core functions with additional driver software and system utility
applications.
The os is responsible for identifying the components and loading the drivers needed for the
components to work.
A function of the os is to allow the user to monitor system health and performance.
This functionality allows the user to monitor component performance and determine if a
component is over worked and needs to be upgraded or if the component is faulty.
Data Management
Additional functionality of the os is for a user to interface with its Data management (can read ,
write or modify files and other items stored on the device.)
Mobile os:
- Designed for handheld devices , examples are ( apple ios and Android )
- Cannot uninstall and reinstall mobile os as it can only run for the system it was designed
for.
Server os :
Commercial os – user must purchase a license to install and can only use the os on a particular
device. The source code is kept hidden
Open Source – the code used to design the os is freely available, this means that developers are free
to make changes to the way the os works
Embedded OS
Embedded systems are typically static environments, pc’s are dynamic environments
An embedded os is designed for a very specific purpose , these systems mainly preform accurately
time sensitive tasks.
Firmware
Firmware is embedded software. Firmware provides all the necessary functionality for interacting
with the device hardware.
2 types of firmware
- The basic Input/Output System ( BIOS ) : the standard set of instructions that operates
the essential components of the PC
- Unified Extensible Firmware Interface (UEFI) is a modern firmware interface that
replaces the traditional BIOS, providing a more flexible and secure way for computers
to start up and interact with hardware during the boot process.
Virtualization
Virtualization means that a computer can run multiple different Operating systems at the same
time.
- A computer that provides the necessary resources ( CPU , GPU and RAM)
- A hypervisor ( Virtual Machine Monitor VMM) manages the virtual machine
environment and facilitates the interaction with the host hardware
o A Type 1 ( “bare metal” ) hypervisor is installed directly onto the computer and
interacts with the hardware directly
o A type 2 hypervisor runs as a software application within the host os , this
means that the host os retains its control over the virtual environment.
- Guest Operating systems ( or Virtual Machine), the number of operating systems is
limited by the hardware capacity or by the hypervisor.
Uses of virtualization :
- Virtual Labs , create a virtual os to analyses or test viruses as it cannot infect the original
os
- Support legacy software applications, if host computers have been upgraded some
software might be outdated and incompatible.
- Development environments – test software under a different os
- Training – people can be trained to use a live os with out disrupting the original
working os.
- Windows 10 pro and enterprise have virtual hypervisors built in
Microsoft Windows
Windows 10 was made in 2015 and is the “last” version of widows , all new versions will come as
updates.
Windows Editions:
Microsoft has developed versions of windows for phones ( Windows CE, windows phone 7 and
windows phone 8 )
Main differences between these and any other os is that this os is only compatible with their
devices
Apple ios
Is the operating system for apple iPhone and iPad , updates are free.
Chrome OS
Derived from linux , this OS is designed to run on only Chromebooks and Cromeboxes(CHROME OS
IS FOR CHROME DEVICES) ( designed for the budget market )
Android
File Explorer
This PC
Network
This is a container for any network servers that a computer is connected to.
Control Panel
- Touchscreen
- Voice control and narration
- Visual alternatives for sound
- On screen keyboards
- Magnifier
- Display Settings
Browser Controls
Back – BACKSPACE
Stop – ESC
Refresh – F5
Management Interfaces
Task Manager – is the utility that allows users to shut down non responsive programs
Service Management
Virtual Memory/Pagefile
This is when the os loads more data than what the ram can handle , this causes the computer to use
the fixed disk to supplement the ram needed, this is called PAGEFILE or VIRTUAL MEMORY, virtual
memory is configurable.
Disk Management
This is windows GUI tool to format mass storage devices( disks and USB Drives ) and to manage
partitions.
Partions allow a single disk to be divided into multiple different logical areas.
When you type the command and press enter , the shell executes the command, displays
associated output.
There may be more than one Command line interface included with an os , for example windows
CMD and PowerShell.
Access Control means that a device or information stored can only be accessed by an authorized
person.
The account created during the setup is a local Admin, this account comes will all privileges like
saving to any file path, and configuring settings.
The principle of Least Privilege is that users should only have sufficient permissions required to
preform tasks necessary to them and no more.
User Account control prevents malware and other malicious acts from taking place with full
privileges, this is called a protected SANDBOX. When a user needs to exercise administrative rights
they are asked to enter the relevant credentials.
To Create a new account , Open Settings > Accounts > Family and other people > Add
someone else to this PC
Users can manage their own accounts from Settings > Accounts
- Repair
- Replace
- Ignore
-
Troubleshooting PC issues
Step 1 – inspect physical device for damage , cables, ports or any peripherals
Step 2 - When starting up , look for lights or listen for indication that components are working. None
of these = power issue.(no noise or lights = power issue).
Step 3 - if the problem is between the computer and peripherals check cables and connections , if
that isn’t the issue the drivers might be the issue.(last option is driver is the issue).
Getting Support
Don’t attempt solutions that are beyond your expertise. Use the vendors website to find the Set up
or maintenance guide. You will need the product code for this.(vendor guide needs product code).
When you contact support a ticket will be opened. They require the following information:
Unicode
Investing in Security
Data and information is an asset , we protect this asset with security controls.
This figure called RETURN ON SECURITY INVESTMENT is the measure used to compare the cost of
the security compared to the possible loss.
Security Controls
`This is a control to ensure data is only accessible to persons with the correct authorisation.
Examples:
- Backup, this means copies of important data the can be accessed quickly if needed
- Access Control , this Is to ensure only the correct people can access information , this is
done by using the following:
o Permissions – assign permissions to users or groups
o User restrictions, like restricting users to read only.
o Data Encryption - this means data is encoded in a way that only the person with
the correct key can see. Even if someone obtained the data it would be
unreadable.
o Firewalls - on a network firewalls control how the host and network
applications interact.
Intellectual Property
Copy Right
- Is the legal protection granted to specific types of work , detailing the rights of the
owner such as publication distribution or sale.
- Copyright does not apply to an idea that is not actualized , nor does it apply to names
phrases or titles.
- Copyright lasts for a number of years after the owners death , anywhere between 15
and 70 years ---++++++++++++++++++++++
Trademarks
Copyright doesn’t apply to names , so companies will trademark their name and\or logo
- A Legal protection for some kind of invention , these must be applied for and are not
automatic, however the idea doesn’t need to be made in reality. (can be on an idea)
-
Digital Products
Examples:
Group use/site License – Instead of buying individual licenses for every computer in a business, you
can by group licenses.
Concurrent Licenses - this restricts the software to a set number of users on the platform at one
given time.(Netflix restricting 5 users).
Client Access License ( CAL ) - this is a license bought for software to be installed on a network
server for unlimited user interaction , this is done so the software does not need to be installed on
every machine.
Database Concepts
- Databases support a wider variety of Datatypes and have methods in place to reinforce
this datatype.
- Databases can manage tables and create
- Scaling in size is less costly using databases , if you need to double the size of a flat file
this could cost double the price, this does not apply to databases
- Databases provide better access control and authorization systems.
Database Structures
Relational Databases
Each record in a database table needs to be unique, this is done by using a primary key , one
field in the table is a unique key asssociated to that specific record.
If this unique primary key is used as a field in another table this is referred to as the foreign
key.
The structure of the database in terms of the fields defined in each table and the
relationships between primary and foreign keys is referred to as the SCHEMA
Constraints
- Garbage in Garbage Out ( GIGO ) , this is the concept used to teach people to make sure
the values entered into a database conform and are consistent with what information
the fields are supposed to store.
- Constraints can be added to enforce a specific data type, for example:
o Primary keys have constraints ensuring each record must be unique ‘
o Other constraints could be that a field cannot be left blank or null
o You can define the structure of the data type like an ID number or telephone
number
- Unstructured data has no rigid formatting, like a word doc , images and text files
- Typically, Much easier to create
- These can store a much larger variety of data types that a relational database can
Data Definition Language ( DDL ) is used to Create , edit or delete databases or tables
- Create
- Alter Table
- Drop
- Create Index
Data Manipulation Language (DML) is used to Insert, update, delete or select records in a table.
Hardware
Memory ( RAM )
- Front Side Bus = Bus between CPU and RAM, must be as fast as possible.
Network
Motherboard Components 8
This comes with some built in processors , sockets, and slots for upgradeable components.
The built in components usually include : Graphics , Video , and Network adaptors
Processors
A Microprocessor is a programmable integrated circuit ( this consists of purified silicon doped with
a metal oxide , usually copper or aluminium. This process creates millions of transistors and signal
pathways which provide the electrical on/off states that are the basis of the Binary System.
Features Of Processors
- The Control Unit fetches the Next instruction and in turn executes it itself or passes it
to the Arithmetic Logic Unit ( ALU ) or Floating-Point Unit ( FPU ).
The advantage of 64-bit is the ability to use more system memory. 32-bit systems are limited to
addressing up to 4 GB – 64-Bit systems can address 256 Terabytes ( or More )
BIOS vs UEFI
Ports are used to connect peripheral devices and cabling to the computer.
- HDMI
- DVI
- SATA
- USB
- RJ-45 Network
- Audio Ports
Graphics Devices
The variety of colour options for a display is measured in colour /bit depth
HD display Cables
Input Devices
Mouse:
- Mechanical Mouse has a physical ball that gets rolled on a firm surface, this in turn
moves the mouse pointer on the screen.
- Optical Mouse, this uses LEDs to detect movement over a surface.
- Laser Mouse, this uses an infrared laser which gives greater precision than an optical
mouse.
Configuring Peripherals
These devices can be configured using the windows built in drivers or using the vendors own driver.
Radio frequency ID (RFID) is a means of tagging and tracking objects using specifically encoded tags
, when an RFID reader scans a tag , the tag responds with the information programmed to it.
These tags can either be unpowered that only responds when scanned at a close range ( 25m ) or
can be powered with an active range of 100m
Near Field Communications ( NFC ) – is a peer to peer version of RFID. NFC device can work as both
a tag and reader. NFCs exchange information between devices
Networking Interfaces
Most Pcs come with network adaptors or Network Interface Cards ( NIC )
- Telephone cables are used to connect fax machines , they use twisted pair cabling with
an RJ-11 Connection.
- This is smaller than an Ethernet RJ-45 port , so one will never use the wrong port
- This cable is used to connect modems to the DSL port on the telephone master socket
- This means when you connect a new device, windows identifies it and tries to install a
device driver for the device.
- Devices connected via the USB port are Hot-Swapable, meaning they can be added or
removed while the system is running(Hot-Swappable).
- When plug and play doesn’t work, try and locate the driver on the windows Update
website, if no driver is available there, you will need to obtain one from the product
manufacturer.
- To uninstall a driver, usually start by uninstalling the software package used to install
the driver
- Alternatively, Open Device Manager ( use Start + X ) > locate the device > Right Click >
Uninstall
Display Devices
Touch Screens
- Used for input , typically used in the absence of a physical keyboard and mouse
- Capacitive touchscreens , this means a touch screen with the correct software can
support multitouch events , such as rotating and zooming.
Digital Projectors
Display Settings
Screen Resolution
Configuring a touchscreen
- Configured using the Tablet PC Settings and Pen and Touch apps.
- The Tablet PC Settings allow you to calibrate the display and set orientation options.
- Pen and touch settings will allow you to configure gesture settings , such as hold down
to right click.
This refers to ports used to play and record Audio and Video using different inputs and outputs.
There are both analogue and digital ports out there , analogue signals need to be converted into
digital and this can reduce quality.
Audio Card
- This is the card used to process audio signals and provide an interface for connecting
equipment.
- This chip comes embedded on the motherboard but an expansion card might be
installed as an upgrade to make better quality recordings.
Printer Types
a scanner is an imaging device designed to create a digital file from a page or document.
Types of scanners
System Memory
DRAM
- Dynamic Ram stores each data bit as an electrical charge within a single bit cell
SDRAM
- SDRAM is synchronized to the system bus. It has a 64-bit data bus. This results in a
bandwidth of 528Mbps.
- Uses the Dual Inline Memory Module (DIMM) slot
- This is an updated version of SDRAM featuring double pumped data transfers. This
means with a bus speed of 100Mhz the ram = 1600Mbps
HDD
SSD
- SSD, can upgrade to HDD this makes use of no moving parts , this is possible due to
flash memory
-
Optical Drives
- Compact Disks ( CDs), Digital Video Discs or Digital Versatile Discs (DVDS), and Blue-ray
Discs (BDs)
- CDs – 700mbs
- DVD – 17GB
- CD-R , uses Write once Read Many ( WORM ) media.
DVD Media
Blu-Ray Discs
For the OS to be able to read and write to a drive it must be partitioned and formatted with a file
system.
Partitioning means to divide a disk into logically separated storage areas, this improves the
performance of the disk.
On the Primary disk one of the partitions must be made active, this is referred to as the system
partition, used to boot the computer. – this is hidden from file explorer and doesn’t have a drive
letter associated with it.
- File Allocation Table (FAT), this is typically used for older 32bit windows files with a
maximum file size of 4GB and a max Partition size of 32 GB
- New Technology File System (NTFS), this uses 64bit allowing for Partitions of 2TBs
- FAT32 is used for USBs
- Compression, the file system can automatically reduce the size of the stored data
without losing data.
- Encryption, this file system can automatically encrypt data in a file when it is saved, to
access this partition you will need a password or a key.
- Permissions, these file systems maintain an n Access Control List for each file or folder
object.
- Journaling, these file systems will track changes and who made them, this means the
journal can be used to recover files in the event of sudden data loss.
- Limitations, in terms of size and their max capacity of individual file sizes.
-
File Attributes and Permissions
Attributes include Name, date created, accessed or Modified, Its size, its description and one of the
following: (RASH)
Txt. Basic text format with no binary information linking the file to a particular software application
Rt
f. Rich Text Format, generic file format for sharing documents between different word processing
applications
ODF. The open Document format , XML based specification – this is better than RTF
Presentation Software
Ppt/pptx.
Bmp.
Mp4
Mp3
M4a.
Flac. Free Lossless Audio Codec
Executable Files
Exe.
Msi. This is a windows installer file ( used to install and uninstall applications )
Compression Formats
Zip.
Tar
Rar. This is the proprietary format is used by the WinRAR compression Program.
7z. This is the format used by the open source 7-ZIP compression Utility
Gz.
Network Components
A network is 2 or more computer systems linked together by some form of communication medium
that enables the computer systems to share information. 30
- Network Clients: are computers and software that allows users to request resources
shared by a server
Network Media
- Wired data connections use copper or other cabling to transmit signals ( such as
Ethernet )
- Wireless (Wi-Fi) data connections use radio signals to transmit data over the air
Addressing And protocols
- Network signals must be packaged in such a way that each host is able to understand
them.
- Each host also needs to have the ability to recognize the location of other hosts on the
network.
- The above functions are provided in a network protocol.
- A network protocol identifies each host on the network using a unique address.
- It also identifies a PACKET Structure
- A PACKET generally consists of a header ( indicating the protocol type, source address,
destination address … ect ) and a PAYLOAD ( the data ).
This is the primary protocol of the internet and the worldwide web.
- Link or Network Interface Layer: responsible for putting frames onto the physical
network. This layer doesn’t contain a TCP/IP. Data at the link layer is packaged in a unit
called a frame.
- Internet Layer: encapsulates packages into Internet Datagrams and deals with routing
between different networks, 3 key protocols are used at this layer :
o Internet Protocol (IP) this is the main protocol in the TCP/IP suite it is
responsible for logical addressing and routing of packets between hosts and
networks
o Address Resolution Protocol ( ARP) this is used for hardware address
resolution. Each host has a link usually called the Media Access Control (MAC)
address. To deliver packets this local MAC must be resolved to a logical IP
Address using ARP.
o Internet Control Message Protocol (ICMP) sends messages and reports on
errors regarding packet delivery.
- Transport Layer: These protocols provide communication sessions between computers,
each application is identified as the Transport layer by a PORT Number, using the
following 2 protocols:
o Transport Control Protocol (TCP): provides connection orientated delivery. This
means that the delivery is reliable and that packets are delivered in the correct
sequence.
o User Diagram Protocol(UDP): provides connectionless delivery, there is no
guarantee that the packets will arrive in the correct sequence.
Application Layer: the top-level architecture contains protocols that provide the
communications formats for exchanging data between hosts, such as transmitting an email
message or requesting a web page.
Internet Protocol
IP Packet Structure:
IP Addresses
An IP Address is a 32-bit binary value, to make this easier for configuration it is expressed as 4
decimal numbers separated by full stops ( ig. 172.30.15.12)
- The network Number (The Network ID), this number is common to all hosts on the
same IP network.
- The Host Number(host ID), this unique number identifies a host on a particular
network or logical subnetwork.
To differentiate between the Network ID and Host ID portions within an address each host must be
configured with a network prefix length or subnet mask, this combined with the IP address is used
to determine the identity of the network to which the host belongs.
Mac Addresses
- Frames use a different addressing method than IP. At the data link layer, each host is
identified by the address of its network interface.
- The MAC address is assigned to the network adaptor at the factory.
- This is a 48 bit hexadecimal number , often displayed as 6 groups of 2 hexadecimal digits
with a colon or hyphen as a separator or no separator is used.
- If 2 systems are to communicate using IP, the host sending the packet must map the IP
Address of the destination host to the hardware address of the destination host.
- ARP helps the computers on a local network find the MAC address of the destination
computer using the IP address.
Routing
- If the destination IP address is a local one (same network ID as the source), the host
uses ARP messaging to discover the local destination host. If the network IDs are
different, the sending host uses ARP messaging to discover a router on the local
Segment and uses that to forward the packet. The router forwards the packet to its
destination possibly via immediate routers.
- This means that if the receiver is not on the same network , the host will use ARP to
locate which router the receiver belongs to, and send the packets either directly or via
a path of other routers until it reaches the receiver.
The host name can be combined with information about the domain in which the host is located to
produce a Fully Qualified Domain Name (FQDN)
HTTP
HTML
- HTTP is usually used to serve HTML web pages, which are plain text files with code tags
describing how the page should be formatted.
- A web browser can interpret these tags and display the text and other resources
associated with the page such as picture or sound files.
SSL/TLS
- Secure Sockets Layer ( SSL ) , the reason SSL was invented was due to the lack of encryption
or authentication between the server and client.
- Transport Layer Security ( TLS ) , was developed from SSL.
- SSL/TLS is closely associated with HTTP , creating HTTPS/ HTTP over SSL or HTTP Secure
- is a messaging system that can be used to transmit text messages and binary file
attachments encoded using Multipurpose Internet Mail Extensions (MIME).
- Email can involve the use of multiple protocols.
- MAPI ( Message Application Programming Interface)
- Simple Mail Transfer Protocol ( SMTP) 3
- 3
- 6./7\455
- MX ( Mail Exchanger)
- Post Office Protocol v3 ( POP3)
- Internet Message Access Protocol (IMAP) u
Configuring Email
- To configure an email account, you will need the username, password and default email
address, plus incoming and outgoing server addresses and protocol types from the ISP.
- The Type of equipment used in homes and in small businesses are often described as
SOHO( Small Office, Home Office)
- A SOHO network us typically based around a single multifunction device.
- This type of network device can perform the following functions:
o Switch , connects 4 or 8 computers together in an Ethernet LAN using RJ-45
network ports and twisted pair cabling
o Access Point (AP) – creates a Wifi wireless network ( WLAN) between computers
and mobile devices equipped with suitable adaptors and also switches
communications between the wired and wireless networks
o Internet router/modem – connects the wired and wireless network clients to the
internet via a WAN link
Fiber Optic
- Cable Access TV ( CATV ) service , these networks are often described as Hybrid Fiber
Coax ( HFC ) as they combine Fiber optic core network with coax links to
custo0me0000.r premises equipment.
- The cable router is interfaced to the computer through an ethernet adapter and then to
the cable network by a short segment of coax, terminated using an F-Connector
- Cable based on the Data Over Cable Service Interface Specification (DOCSIS) version 3.0
supports downlink speeds of up to about 1.2Gbps. Most service providers packages do
not offer this kind of speed however, 100Mbps is the typical premium package.
When an ethernet is connected to your PC you will see 1 of 3 icons appearing in the bottom right
corner:
- A red Cross on the icon indicates that either the cable isn’t connected correctly , the
cable is broken or the router is broken.
- A yellow alert on the icon means that the link has not been configured correctly with
the Ip address information AND cannot connect to the internet
- The Plain icon, means that everything is working, and you are connected to the internet
- The IP address information is usually configured by the router, using a service called the
Dynamic Host Configuration Protocol ( DHCP ). You would need to investigate the
settings on the adapter or the switch / router.
Microwave Satellite
- Satellite systems provide larger coverage than what can be achieved with other
technologies.
- The microwave dishes are aligned to orbital satellites that can relay signals between
sites directly or via another satellite.
- Satellite TV has a large wide spread use , this allows for domestic Internet connectivity,
this is expanding into satellite internet for communities where DSL cables are less
available.
- Satellite connections experience severe latency problems as the signal has to travel
thousands of miles more than terrestrial connections, this creates a delay 4-5 times
longer than usual
- To create a satellite connection the ISP installs a satellite dish at the customers
premises and aligns it with the orbital Satellite. The Satellites orbit the equator(
northern hemisphere the satellite dish will point south.)
- The antenna is connected via coaxial cabling to a DVB-S (Digital Video Broadcast
Satellite) modem. This can be installed in the PC as an expansion card or as an external
box connected via USB or ethernet port.
Cellular Radio
- Cellular data connections use radio transmissions but at a greater range than WiFi,
- A cell phone makes a connection using the nearest available transmitter. These
transmitters have an effective range of 8km
- Cellular radio works in the 850MHz and 1900 MHz frequency (in America)
- 900 and 1800 MHz frequency (in the rest of the world)
There are many different cellular Internet Service types (3G , 4G, 5G ) – support for a particular type
is dependent on the local Cell Tower.
- GPRS/EDGE (General Packet Radio Services/Enhanced Data Rates for GSM Evolution) is
a precursor (BEFORE) to 3G
- Evolved High Speed Packet Access (HSPA+), 3G signals.
- CDMA200/Evolution Data Optimized (EV-DO) are the main 3G standards.
- Long Term Evolution (LTE) standard 4G signal
- LTE Advanced (LTE-A) – this aims for 300Mbps but is about 40MBps.
A typical SOHO network appliance provides 4 wired ethernet ports. This is the reason most SOHO
networks rely heavily on Wi-Fi (only 4 wired ethernet ports).
Wireless networking is understood to be the Institute of Electrical and Electronic Engineers 802.11
standards for Wireless LANs (WLAN) AKA WIFI. There are several versions of this standard starting
with legacy 802.11a & 802.11b
- To configure an Access Point you need to connect a PC to a LAN port on the SOHO router
- Find the routers IP address (the SOHO routers set up guide)
- Enter the IP address into a browser.
- Enter the Username and password listen on the user guide.
- Use the SYSTEM page to change passwords and permissions.
SSID
- Service Set ID
- This is the visible network name.
- Change this to make your network uniquely identifiable.
- The further the distance > The Weaker the signal > The lower the data Transfer rate.
- The distance between the wireless client and the access point determines the of signal.
- Each Device determines an appropriate data rate based on the quality of the signal
using a mechanism called Dynamic Rate Switching/Selection (DRS)
- The rate of data transfer is determined by the 802.11 standard. If the signal is weak the
data transfer rate will reduce to preserve a more stable connection.
- Radio signals experience a lot of interference due to dense materials or anything
exhibiting a radio signal (Wi-Fi, motors, microwaves … etc.)
- Bluetooth can be interfered by its not often due to the 2.4Ghz signal and its
modulation technique.
- An enterprise network uses the same components as a SOHO network, but these
components are separated and multiplied.
- On an enterprise, network switches, access points and routers will be used.
This works in the same way SOHO works but on a bigger scale.
- This network can support more devices than a consumer level one.
- Switches and Access points can provide 1000s of connections, this is inefficient.
- The ports are divided into groups using a technology called Virtual LAN ( VLAN)
- Each VLAN is associated with a different subnet.
- Communications between different VLANs must go through a router.
- To reduce risk of data leaks or interceptions on these networks use a Security Enabled
Protocol (SSL/TLS)
When using a public workstation:
-Clear the Cache before shutting down/logging off and don’t allow passwords to be cached.
Malware Threats- Web browsers are the most exploited point for infecting systems with Malware
or for stealing information.(websites are where most malware is from)
Malware may be able to infect your computer cause it isn’t up to date, leaving vulnerabilities
available to exploit. This is avoidable by installing the latest security updates and using safe
browsing practices.
HTTP is limit.
preferred in terms of it serving content other than text and images. Many Websites use active
content to play video or add animated and interactive features. There are many ways of creating
this content :
- Scripting , scripts can run on the server or on the client side. Usually done in Java Script
- Add-ons , these are mini apps that work within the browser, this can be used to extend
or change the functionality of the browser.
- Flash/Silverlight- provide interactive web applications and video. The browser must
have one of these plug ins installed to view this content.
- Java(fully featured programming language)- used to develop complex web applications.
Java applications require the Java Virtual
- Most sites will use Server-side scripting, meaning that code runs on the server to
display the page you are looking at.
- Most websites rely on client-side scripting, (can be disabled).
Managing Add-ons
- Extensions- these can run scripts to interact with the pages you are looking at.
- Plug-ins- these are designed to play embedded content in a web page.
Themes- these change the appearance of the browser using a custom image and colour
schemes.
All Add-ons should be digitally signed by the developer to indicate that the code is as
published.
Cookies
- A cookie is a plain text file created by a website when you visit it. The purpose of cookies
is to store session information so the website can be personalised for you.
- This information is referred to as Personally Identifiable Information (PII)
Cookies have:
- The site can record more info than you know about.
- Information can be shared with other sites.
- Cookies cant contain malware, but malware can access cookies.
- Spyware and adware can use cookies to track what sites you use to display targeted ads
- Cookies should self-expire , but some sites set this date very far in the future.
- Confidential information such as passwords should be stored in a secure cookie only
readable under the SSL/TLS session it was created in.
Pop-Up Windows
- +There are setting options to set what cookies to accept and how long to keep them.
Disabling AutoFill and Clearing Browser Cache
- Another privacy issue is that passwords and usernames can be saved into forms,
anyone using a public computer should have the knowledge to clear this.
- In privet mode the browser doesn’t store cookies or temporary files and doesn’t add
pages to the history list.
- When web browsers communicate with a secure HTTPs server the browser accepts the
servers digital certificate to use its public key to encrypt communications.
- Public keys are linked to privet keys, therefore a public key cannot be used to decrypt
the encrypted message.
- The privet key is used to decrypt messages, this is referred to as Asymmetric Encryption.
- Having a certificate is not in itself any proof of identity. The browser and server rely on
third party Certificate Authority (CA).
- This framework is called Public Key Infrastructure (PKI)
- If the certificate is trusted the browser will show a padlock icon in the Address Bar.
- If the certificate is highly trusted the address bar is coloured green.
- If the certificate is untrusted or invalid the address bar will be coloured red/maroon.
Enabling a Firewall
- A firewall restricts access to a computer or network to a defined list of hosts and
applications. Basic packet filtering firewalls works based on filtering network data
packets as they try to pass in or out of the machine.
Types of Firewalls
On networks with firewalls monitoring and controlling all traffic passing between the local
network and the internet clients might be forced to use a proxy server.
- The proxy server can be configured as a firewall and apply other types of content
filtering rules.
- Share the printer via windows, an admin can share any locally installed printer via its
Sharing tab in the Properties dialog.
o Locally installed means that Windows communicates with the print device
directly over the relevant port.
o disadvantage =both the PC and Printer must be switched on for this to work.
-Use a hardware print server
o Some printers come embedded with print servers. This allows client computers
to connect with them over the network without having to go via the server.
o If the printer supports wired connections, it needs to be attached to a switch or
home router via an RJ-45 cable. Same applies for Wi-Fi if it isn’t supported.
- for Windows to connect to a network and share resources the computers must have an
appropriate client software installed.
- Windows Client Software is installed by default.
-any file/folder can be shared with other computers(If the network location & firewall settings have
been configured)
Browsing Network Shares and Drives
When a folder has been shared, the host computer will be visible on the network.
- You can access a shared folder by its UNC ( Universal Naming Convention ) in the
address bar.
- A UNC is comprised of a double back slash (\\) followed by the server name and then a
single slash and the shared folder name. \\kvserver\clients
The sharing options mentioned above refer to computers on the same network. If you want to make
resources available on .0.0.2, you need to make use of a hosted storage solution.
- HTTP can use Hyperlinks to other documents as well as web pages, hyperlinks can point
to any type of file, this means a web server can host any type of file download.
- The FTP is used to upload and download files between clients and servers.
- Like HTTP, FTP has no encryption methods but can use them.
Cloud Computing
Backups
When you consider a storage solution, you should also consider backups of data and configuration
settings.
Backup Considerations:
- Keep at least one back up in a different location to the computer, this prevents loss of
data due to physical threats (fire, flood etc…).
- Keep the back up in a secure location.
- Keep more than one copy of the data.
- Make backups regularly.
- Locally attached Storage, use hard disks or flash drives attached to the local PC or
server.
- Network Attached Storage, this allows multiple machines to make backups in the same
place.
- Offsite/ Cloud based, back up over the internet to a cloud-based storage solution.
When you do a backup not all files are backed up, but the critical data such as personal information
might be stored in system settings files, when these are backed up the same level of security should
be in place to protect this data. C=
Database Backups
- One method of this is called replication, this provides redundancy in the event of loss of
data
- Every database has a transaction Log it is important to include this in the back up as this
allows for roll backs in the transactions
OS Backups
Windows Backup
- Backup and Restore (Windows 7), enables you to preform selective, scheduled and ad-
hoc backups.
- File History (Windows 8 and 10) enables automated backups, as files are modified, the
versions are tracked and backed up automatically.
- Settings > Update and Security > Backup
One should select the type of backup and what files to include, then one will need to define
a schedule for these backups will run and how frequently this occurs.
On a SOHO network, backups are usually scheduled for overnight, and business will typically
do this once a day.
It is important to test that backups work correctly. An example of why this is important is if
you have been making regular backups for months but all of them exclude an extremely
important file.
o Error detection, problems with the backed-up media or configuration can cause
backups to fail.
o Configuration, when setting up a new job it is wise to check that all expected
data has been backed up.
o Test Restore, this means users can test backups by restoring it to a test file that
doesn’t overwrite the current data.
Using a Mobile Device
Gesture Based Interaction
Modern mobile devices use capacitive touchscreens. These capacitive displays support multitouch,
meaning that gestures can be interpreted as events and responded to by software in a particular
way.
Kinetics can refer either to operating a device by moving it around or using a camera in the
device to recognise your hand movements.
Mobile devices use accelerometers and gyroscopes to detect when the device is moved,
and it uses this to switch between landscape and portrait modes.
This is an important interface for controlling mobile devices using natural language
requests. (Siri, Google Now , Microsoft’s Cortana )
All but the earliest versions of mobile device OS had full device Encryption.
- All data on the device is encrypted, but the key is stored on the device, meaning that to
wipe the device all that is needed to be done is to wipe the key from the device and all
00other data will become useless.
- Email data and any apps using the “Data Protection” option are also encrypted using a
key delivered from the user’s passcode.
- Apps are installable programs that extend the functionality of the mobile device. An
app must be written and compiled for a particular mobile Operating System (Apple IOS,
Android , or Windows).
- Third Party developers can create apps for IOS using Apples Software Development Kit
(SDK). He SDK can only be installed and run on a computer using macOS. Apps must be
submitted to and approved by Apple before they are released to users.
- Android app model is more relaxed, with apps available from both google play and
third-party sites, such as Amazon app store. The SDK for Android apps is available to
install on Linux, Windows m and macOS Development machines.
- Apps are supposed to run in a sandbox and have only the privileges granted by the user.
Network Connectivity
Airplane mode
Most airlines prevent passengers from using radio-based devices while onboard. A device can be put into
airplane mode to comply with these restrictions.
Email Configuration
- These settings are configured on the phone in the same way you would set up a mail account on
a pc.
- IOS:
o Settings > Mail > Contacts > Calendars > Add Account
- Android:
o Settings > Accounts
Mobile device synchronisation refers to copying data back and forth between a PC and Phone.
- This can be used to share email, calendar, and contacts with a locally installed application.
- Setting up an “over the air” server or cloud service sync for email is generally easier.
- IOS can sync with a pc via the iTunes program. The device must be connected to the pc via a USB
to Apple Lightning Cable or Wi-Fi Link.
- Android based phones are set up to sync with Google Gmail email and calendar/ contact
manager services.
Remote Backup
Devices can store gigabytes of data but if bandwidth is sufficient, it is feasible to use a cloud storage provider.
This can allow files to be shared and synchronised between multiple devices.
- Confidentiality Concerns :
o Snooping, this is any attempt to get access to information on a host or storage device (
Data at rest ) that you are not authorized to view. An attacker might steal a password or
find an unlocked workstation with a logged-on user account or possibly install spyware
on the host.
o Eavesdropping/wiretapping, this is snooping on data or telephone conversations as
they pass over the network. Snooping on traffic passing over a network is often called
sniffing. It can be easy for an attacker to “tap” a wired network or intercept unencrypted
wireless transmissions. Networks can use segmentation and encryption to protect data
in transit.
o Social Engineering/dumpster diving, this means getting users to reveal information or
finding printed information.
Integrity Concerns
- Integrity means that data being stored and transferred has not been altered without
authorization. Some integrity attacks include:
o Man-in-the-middle (MitM) , this is where a host sits between two communicating
nodes , and transparently monitors , captures and relays all communications between
them. This attack might be able to change the messages exchanged between a sender
and receiver without them realising.
o Replay(voice recording), when a host captures another hosts response to some server
and replays that response to gain unauthorised access.
o Impersonation(guesses to password), this is when an attacker tries to figure out a
password or other credentials to gain access to a host.
Availability Concerns
Availability - (keeping the server available to work on) means keeping a service running so that authorised
users can access and process data whenever necessary.
- Denial Of Service (DoS), this is any situation where an attacker targets the availability of a
service. A DoS attack might tamper with a system or try to overload it in some way. On the web,
a Distributed Denial of Service (DDos) uses hosts compromised with bot malware to launch a
coordinated attack against a web service. The size of the botnet determines how easily the
attacker can overwhelm the service.
- Power Outage, it is common for data corruption to occur when a computer is turned off vs shut
down.
- Hardware Failure, if a component in a server fails then the server often fails. If an HDD breaks its
likely to lose that data. Use backups to help this issue.
- Destruction, physical damage to servers can stop services or lose data. (Fire, Terrorism , coffee
spill )
- Service Outage, anyone using a 3rd party service like cloud storage have the vulnerability of this
service failing.
The following Access Control methods help guard the above threats.
- Authentication(2fa) means one or more methods of proving that a user is who they say they are
and associates that person with a unique computer or network user account.
- Authorisation means creating one or more barriers around the resource such that only
authenticated users can gain access.
- Accounting(log book) means when and by whom a resource was accessed.
Social Engineering - Social Engineering refers to means of getting users to reveal confidential information or
obtaining unauthorised physical access to a resource.
Impersonation - The most classic impersonation attack is for an attacker to phone into a department, claim
they have to adjust something on the users system remotely and get the user to reveal their password.
Trust and Dumpster Diving - This refers to obtaining documents that a company has thrown away.
Identity Fraud
- This can mean either compromising someone’s computer account or masquerading as that person.
- This is often done by means of social engineering, by getting someone to reveal their logon or
other secure information through a phishing attack.
- This is also possible through careless transmission, storage, and disposal of Personally
Identifiable information (PII).
Shoulder Surfing
- This refers to stealing a password or PIN by watching the user type it in (over their shoulder ,
CCTV, or binoculars)
-Social Engineering is best defeated by training users to recognise and respond to these kinds of situations.
-Users should learn to lock their workstations and mobile devices when leaving them unattended.
Business Continuity
-Most organizations are reliant on the availability of their apps and data to continue trading.
-Without continuous access to these apps and data, most organizations cannot function properly.
-Fault Tolerance are systems that contain additional components to help avoid Single points of Failure.
-Most contingency plans depend on providing redundancy at both hardware component and system level.
-If a component or system fails redundancy means that the service can failover to the backup either
seamlessly or with minimum interruption.
Data Redundancy
Combining hard disks into an array of disks can help to avoid service unavailability due to one or more disks
failing. The Redundant Array of Independent disks (RAID) has evolved to offer many different fault tolerance
solutions.
-RAID 1, AKA disk mirroring. This makes 2 copies of the data, and the system can use both disks or just one in
the event of a failure.
-AID 5, known as striping with parity. At least 3 disks are combined into a single logical drive. Data is written
in stripes across all disks in the set. A calculation is preformed to determine PARITY information. The parity
data is written to a different disk with each write operation. In the event of a single disk failure, the parity
information in each stripe can be used to determine the missing data. But if 2 disks fail the whole array will
fail.
Network Redundancy…start here.
Servers are useless without network connection. Due to the cheap cost of network cards, often servers have
multiple cards. These are used as a fault tolerance and as a team of cards (adaptor teaming). This provides
LOAD BALANCING.
Network Cabling should be designed to allow for multiple paths between various servers. This ensures that if
one part fails the rest remains functional. (Redundant connections)
Power Redundancy
Network appliances and servers require a stable power supply to operate. Spikes in voltages or black outs can
interrupt this power.
Power Redundancy means deploying systems to ensure that equipment is protected against these events
and that operations can either continue uninterrupted or be resolved quickly.
- Dual Power Supplies, enterprise servers are often provisioned with 2 power supply units (in case
one fails).
- Redundant Circuits, critical infrastructure might provision multiple power circuits in the event of
one failing.
- Uninterrupted Power Supply (UPS), this is a large battery that can continue to provide power to
connected devices for short periods of time (gives users a waring of power failure, or gives the
system time to reset itself)
- Backup Power generator, UPS cannot provide power indefinitely. A generator can provide
redundancy in these events.
Disaster Recovery
- Prioritization, this means figure out which systems are the biggest priority and develop plans to
restore these systems before any else are restored.
- Data Restoration, using restorations or a backup. Use integrity checks for this as data is possibly
corrupted.
- Restoring Access, once all systems are up and running, slowly restore user access and monitor all
is working in accordance with standards (make sure everything is working fine).
Security Devices
Device Hardening refers to a set of policies that make mobile and workstation computers more secure.
Malware
- This is a term that is used to describe any malicious software threats and tools designed to
vandalize or compromise computer systems.
Computer Viruses - Viruses are programs designed to replicate and spread amongst computers.
- Program Viruses, these are sequences of code that insert themselves into another executable
program or script, when the application is executed the virus code becomes active.
- Macro Viruses, these viruses affect Microsoft Office Documents exploiting the macro
programming language “Visual Basic for Applications” (VBA) used to automate tasks.
- Worms, memory-resident viruses that replicate over network resources, such as email, by
exploiting faults in software programs.
Trojans (condoms make you think your doing good/safe but they have malicious intent)
This is a malware that pretends to be a useful application but has hidden malicious intent.
- Many trojans function as a backdoor application, once installed this gives the attacker the ability
to install other software , delete or corrupt files ect..
Spyware
Spyware is a program that monitors user activity and sends the information to someone else (key loggers)
Ransomware
Ransomware is a type of malware that tries to extort money from the victim.
- Visiting “unsavoury” websites with an unpatched browser, low security mode and no anti-virus
software.
- Opening links in an unsolicited email.
- Infection from another compromised machine on the same network.
- Executing a file from unknown origin (mostly email)
- Becoming a Victim to a “zero day” exploit (malware unknown to anti-virus)
Anti-virus software
- Anti-virus is software that can detect malware and prevent it from executing.
- Anti-Virus works by either using a database of known virus patterns (called definitions ,
signatures , or patterns) or by heuristic identification ( meaning that the software uses
knowledge of the behaviour of viruses and blocks the behaviour.
- Some major vendors include : Symantec, McAfee , Sophos , Kaspersky
- This reduces performance somewhat but is considered essential for effective protection against
malware.
- When the computer accesses a file, the anti-virus scans this file and blocks access to it if it
detects anything suspicious.
Scheduled Scans
- A User can perform a full computer scan, this can inspect more files then an on access scan.
- This uses a lot of performance and is best when their computer is not being used intensively.
Quarantining and Remediating Infected Systems
- Worms can propagate over networks; upon detection it is best to first disconnect network links.
- A user can adjust anti-virus settings for the action to take upon detection of malware
Windows Defender
-This is built in anti-virus that combines anti-malware software and a windows firewall to prevent threats.
Spam
Phishing is a technique for tricking a user into revealing confidential information by requesting it in an
official-looking email. The email will contain a link to a counterfeit site or a site that has been compromised.
Pharming(123 movies pop ups) attempts to redirect web traffic to a counterfeit page, usually by corrupting
the way the computer resolves the website name in the web address to the IP address of a particular server.
Anti-Spam
Most email software comes with a built-in filter for junk email. You can set how aggressive the filter is in
terms of blocking messages, configure sender “Whitelists” and “Backlists”.
When installing new software applications or drivers, it is important to obtain the setup files from a Legitimate
source, these include :
Patch Management
-Patch Management is an important maintenance task to ensure that PCs operate reliably and securely.
-A Service Pack (SP) is a collection of previous updates but may also contain new features and functionality.
Application Updates
- Applications are more vulnerable than windows itself, as they are less likely to be patched and
often rely on the user to make the updates.
Driver Updates
2 types of drivers :
Access Controls
- An Access Control System is a set of technical Controls that govern how subjects may interact
with objects.
- Subjects in this sense are users or software processes or anything else that can request and be
granted access to a resource.
- Objects are the resources.
- Access Control Lists (ACL), this is a list of subjects and the rights or permissions they have been
granted on the object.
- Identification, creating an account or ID that identifies the user or the process on the computer
system
- Authentication, proving that a subject is who or what it claims to be when it attempts to access
the resource.
- Authorization, determining what rights or permissions subjects should have on each resource
and enforcing those rights.
- Accounting, tracking authorized and unauthorized usage of a resource or use of rights by a
subject.
The more permissions that you allocate to more users, the more you increase the risk that a privilege will be
misused.
- Least Privilege, this means that a user should be granted rights necessary to preform their job
and no more.
- Implicit Deny, this means that unless there is a rile specifying that access should be granted, any
request for access is denied.
Authorization Access Models
- Discretionary Access Control (DAC), stresses the importance of the Owner. The owner is
originally the creator of the resource, though ownership can be assigned to another user. The
owner is granted full control over the resource, meaning that he or she can modify its ACL to
grant rights to others
- Role -Based Access Control (RBAC) adds an extra degree of administrative control to the DAC
model. Under RBAC, a set of organizational roles are defined and users allocated to those roles.
- Mandatory Access Control (MAC), is based on the idea of security clearance levels. Rather than
defining access control lists on resources, users can only access the data on their clearance level
or below.
- The accounting part provides an audit log of how users have authenticated to the network and
used their access privileges.
- Accounting is an important part of ensuring non-reputation(mark kv).
- Non-repudiation is the principle that the user cannot deny have performed some action. (Apart
from logging, several mechanisms can be used to provide non repudiation)
-Video, surveillance camera can record who goes in or out of a particular area.
o Biometrics, strong authentication can prove that a person was genuinely operating
their user account and that an intruder had not hijacked the account.
o Signature, similarly, a physical or digital signature can prove that the user was an
author of a document (they cannot deny writing it).
o Receipt, issuing a token or receipt with respect to some product or service is proof that
a user requested that product and that it was delivered in a timely manner.
Authentication Factors - Authentication is the process of ensuring that each account is only operated by its proper user .
Different authentication technologies are categorised as: Something you know(Such as a password),
Something you have(such as a smart card) , or Something you are(such as a fingerprint)
- An authentication product is considered strong if it combines the use of more than one
authentication data type.
- Single Factor Authentication systems can easily be compromised.
- Two Factor Authentication combines something like a smart card or biometric mechanism with
“something you know”.
Single Sign On
Single Sign On (SSO) = a user only must Authenticate to a system once to gain access to all its resources.
Uses of Encryption - Encryption is an ancient technique for hiding information. Someone obtaining an
encrypted document, or Cipher Text, cannot understand that information unless they possess a key.
Symmetric Encryption
In Symmetric Encryption, a single Secret Key is used to both encrypt and decrypt data. If the key is lost or
stolen, the security is breached.
- The main problem with symmetric encryption is secure distribution and storage of the key.
- The Main benefit of Symmetric encryption is speed, this uses less processor and system memory
than asymmetric encryption.
- Early Ciphers used between 32- and 64-bit keys. Currently 1024 bit keys would be used.
Asymmetric Encryption
In asymmetric encryption, or Public Key Cryptography , a Secret Privet Key is used to decrypt Data.
A mathematically related Public Key is used to encrypt data, The public key can be widely distributed to anyone
with whom the host wants to communicate, because the Privet Key cannot be derived from the public key.
- This is used mostly for authentication technologies such as digital certificates and digital
Signatures, and key exchange.
- Key Exchange is where 2 hosts need to know the same symmetric encryption key without any
host finding out what it is.
Digital Signatures
Public/Private key pairs can use the reverse encryption/decryption relationship to SIGN messages.
- The User will use their private key wrapped in a digital certificate to the message recipient. The
Fact that the public key embedded in the certificate can decrypt the signature proves that the
sender signed it, because the encryption must have been performed with the linked private key.
Cryptographic Hashes
- You take a variable amount of information, and the hash function converts it to a fixed length
string.
- A Cryptographic hash is designed to make it impossible to recover the original data from the
hash and ensure that no two pieces of information produce the same hash.
- This can be used to prove that a message has not been tampered with:
o For example, when creating a digital signature, the sender computes a cryptographic
hash of the message and then encrypts the hash with his or her private key. When the
recipient receives the message and decrypts the hash, the recipient computes its own
version of the message and compares the 2 values to confirm they match.
- The most common cryptographic hash algorithms are SHA-1, SHA-2 (Secure Hash Algorithm) and
MD5 (Message Digest)
Data States
- Data at Rest, this state means that the data is in some sort of persistent storage media.
o In this state it is possible to encrypt the data using whole disk encryption , mobile
device encryption , database encryption and file or folder level encryption.
- Data in Transit, this is the state when data is transmitted over a network
o Such as communicating with a webpage via HTTPS or sending an email.
o In this state data can be protected by a Transport Encryption protocol, such as Secure
Sockets Layer (SSL)/ Transport Layer Security (TLS)
A VPN connects the components and resources of 2 private networks over another public network or
connects a remote host through the internet or any other network.
It uses special connection protocols and encryption technology to ensure that the tunnel is secure, and the
user is properly authenticated.
Even if credentials are only transmitted with cryptographic protection, an attacker might be able to use
password cracking software to decipher it. This type of software uses different methods to obtain the
password from a cryptographic hash:
- Dictionary, the software matches the hash to those produces by ordinary words found in a
dictionary- could also include any other words or simple phrases that people might naively use
as passwords(pet name company name).
- Brute Force, the software tries to match the hash against one of every possible combination it
could be.
- Length , a longer password is more secure. (9-12 characters for a normal password, 14+ for
admin accounts)
- Complexity
o No Single words, its better to use words , numbers, and punctuation in a combination)
o No obvious phrases in simple form, birthday, user name , job title and so on.
o Mix upper and lowercase
- Memorability - passwords that are random and too complex are hard to remember , causing
users to write these passwords down , rather use something memorable and incorporate
numbers and symbols.
- Maintain Confidentiality - don’t write passwords down or share them.
- History/Expiration - change your password periodically.
- Reuse across sites - many users don’t want to remember passwords for many different sites and
resort to using the same password for everything. This is unsecure.
Password Managers/Filters
A Password policy should balance using strong passwords and memorable passwords. Ensuring that the user
selects memorable passwords and do not resort to reusing them across sites or writing them down.
Password Reset
A reset mechanism allows a user who has forgotten their password to reset it by using “What do you know”
authentication like security questions, another method is to set up a contact method and back up method to
use “What you have” authentication.
Human Resources (HR) is the department tasked with recruiting and managing people.
Personnel management policies can be conceived as applying in three phases.
o Recruitment (Hiring) - locating and selecting people to work job roles, Security issues
include screening and background checks.
o Operation (Working) - HR communicates the importance of security and is responsible
for correct training of employees in this regard.
o Termination - voluntarily or involuntarily, termination is a difficult process with
numerous security implications.