ISA Unit1
ISA Unit1
Intro
Information :
is processed, structured, or organized data that provides meaning orcontext and is useful for
decision-making, understanding, or performing specifictasks.
Desktop
Setup (Desktop)
1. Assemble
2. physical damage check
3. Attach monitor to CPU and power
4. Connect kwyboard , mouse , audio devices using cables (usb, 3.5 mm) or bluetooth
5. Establish Internet connection using wifi or ethernet
6. Printers, External Drives other peripherals
7. Plug the power cord in wall outlet , also use surge protectors
8. Power On ,Open BIOS(BIOS is a program that starts a computer and manages data flow
between the computer's operating system and its
devices. It's stored on a chip on the computer's motherboard and is pre-installed.)
9. Ensure system recognizes all hardware devices
10. Install OS , Install Drivers
11. Update OS , Install essential software , Check connections
Managing Desktop
1. Keeping system updated (apps & os)
2. Upgrade hardware like RAM & drive
3. Dust cleanup
4. Uninstall waste s/w like bloatware
5. Backup data
Securing Desktop
1. For physical security, place the PC in a safe and stable environment
• Use a physical lock for the CPU case and desk to prevent tampering or theft.
• Protect against power surges, outages, and electrical damage.
2. For cybersecurity, use reputable antivirus software like Norton, McAfee, or Windows Defender
and built-in firewall
3. Password Protect All Accounts.Create complex passwords with a combination of letters,
numbers, and symbols. Use a password manager to securely store and manage passwords.
4. For online accounts, enable Two-Factor Authentication (2FA) for an added layer of security.
5. Use a VPN (Virtual Private Network) , a technology that creates a secure, encrypted connection
over the internet between your device and a remote server. It allows you to send and receive
data securely and privately, even on public networks. if accessing sensitive data over public
networks.
6. Avoid clicking on unknown links or downloading attachments from untrusted sources.
7. Use HTTPS websites for secure data transfer.
8. Create Separate Accounts. Use a standard user account for daily activities and reserve the
administrator account for system changes.
9. Enable Automatic Locking. Set the PC to lock automatically after a period of inactivity.
10. Use tools like Task Manager (Windows) or Activity Monitor (macOS) to detect unusual behavior.
11. Restore Backups. Use external backups or cloud services to restore data if compromised.
12. Automate Maintenance Tasks and schedule automatic updates, backups, and scans for
convenience.
13. Invest in Quality Hardware.Dispose of Old Hardware Securely. Wipe all data from old drives
before discarding or recycling them.
14. For Long-Term Management and Security, regularly educate yourself. Stay informed about new
threats and best practices for PC security.
15. Contact Support. For severe hardware or software issues, seek assistance from professionals or
the manufacturer.
Mobile Devices
3. Pre-install Critical Apps like Productivity tools (e.g., Microsoft Teams, Zoom) and Security apps
(e.g., VPN clients, endpoint protection).
4. Disable auto-connection to open or public networks. Configure devices to use a Virtual Private
Network (VPN) for secure remote access.
5. Use an enterprise app store to provide secure applications. Block installation of unapproved or
potentially harmful apps.
6. Ensure apps are regularly updated to patch vulnerabilities.
7. Limit app access to sensitive data like location, camera, and contacts.
8. Monitor compliance with security policies using MDM.
9. Detect jailbroken/rooted devices that pose security risks.
10. Use analytics to identify trends, such as frequent policy violations.
ClientOS
Monitoring and managing these systems involves proactive measures to detect vulnerabilities,
enforce security protocols - Monitor system performance Track CPU, memory, and disk usage to
ensure systems run efficiently and detect abnormal behavior. - Monitor all user activities - user
logins, file access, and software usage for suspicious activity. - Ensure configurations meet
regulatory standards like GDPR
The General Data Protection Regulation (GDPR) is a comprehensive data protection law that came
into effect on May 25, 2018, within the European Union (EU). It establishes guidelines for collecting,
processing, and storing personal data to protect individuals' privacy and data rights. - As per this law,
data must be processed legally and transparently, data should only be collected for specific, explicit,
and legitimate purposes, collect only the data necessary for the intended purpose, ensure data is
accurate and up-to-date, retain data only for as long as necessary, protect data from unauthorized
access or breaches. Organizations must demonstrate compliance with GDPR.
Rights of individuals under GDPR: 1. Individuals can request access to their personal data. 2.
Individuals can have inaccurate data corrected. 3. Individuals can request their data be deleted under
certain conditions. 4. Individuals can receive their data in a portable format or have it transferred. 5.
Individuals can limit how their data is processed. 6. Individuals can object to data processing,
especially for marketing. 7. Right Not to Be Subject to Automated Decision-Making (Examples - Loan
approvals or denials, Employment screening and hiring, Credit scoring, Online behavioral
advertising): Includes profiling that significantly affects them
Managing ClientOS
1. Review system logs from OS (e.g., Windows Event Viewer, Linux syslog) for errors or security
events.
2. Deploy EDR tools to identify and respond to advanced threats on endpoints.
Endpoint Detection and Response (EDR) is a cybersecurity solution designed to detect,
investigate, and respond to threats targeting endpoint devices such as desktops, laptops,
servers, and mobile devices.
EDR tools provide real-time visibility, threat detection, and automated or manual response
capabilities to address potential security incidents effectively.
The EDR tool continuously monitors these endpoints for suspicious activities.
The EDR solution collects behavioral data from endpoints. This includes processes, file
activities, user behaviors, and network connections.The data gives a real-time view of
endpoint behavior, which is essential for identifying anomalies
or threats.
Working :
The collected data is sent to a centralized database that uses:
Big Data techniques: To manage and process large volumes of data. + Machine Learning
(ML): To identify patterns, detect anomalies, and predict potential threats.
The processed information is shared with IT administrators and security analysts. Analysts can: -
Investigate threats using detailed context provided by the EDR tool or make informed decisions
about how to handle incidents. - The system provides both manual controls (for analyst-driven
actions) and automation (for
immediate response).
3. Microsoft Windows Server Update Services (WSUS) is a server role included in Windows
Server that enables administrators to manage the distribution of updates and patches released
by Microsoft for Windows operating systems, Microsoft Office,and other Microsoft software
products.
WSUS acts as an intermediary between Microsoft's update servers and client devices,
providing centralized control over the patching process.
Allows IT administrators to approve, schedule, and deploy updates across the organization's
network.
Admins can approve updates for specific devices or groups of devices, ensuring tailored
patching policies.
WSUS downloads updates from Microsoft servers once and distributes them locally,
reducing internet bandwidth usage.
4. Security Information and Event Management (SIEM) is a cybersecurity solution that provides
real-time monitoring, analysis, and
management of security events and information across an organization's IT infrastructure.
It combines two core functionalities:
It focuses on long-term storage, analysis, and reporting of log data.
Real-time monitoring and correlation of events, along with incident responses.
Aggregates logs and event data from various sources, including firewalls, servers,
endpoints, applications, and databases.
Correlates events across systems to identify patterns that may indicate potential threats
(e.g., multiple failed login attempts
followed by a successful login from a different IP address).
When a potential threat or anomaly is detected, the SIEM generates alerts for the security
team.
file:///C:/Users/mnnbt/OneDrive/Desktop/Stuudi/Data Visualization/ISA-unit1.html 6/6