1 / 15

Lesson 3 Computer Protection

Lesson 3 Computer Protection. Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition. Morrison / Wells. Introduction. As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important.

damisi
Télécharger la présentation

Lesson 3 Computer Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lesson 3Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition Morrison / Wells

  2. Introduction • As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important. • There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks. 2 2

  3. Protecting Computer Hardware from Theft and Damage • Theft of and damage to computer equipment is a serious problem. Safeguards include: • Physically secure equipment • Use security locks • Mark equipment with identification mark • Insure the equipment • Back up data to a separate system • Employees using company computers for personal use can be a type of theft. 3 3

  4. Data Protection • Data is a critical component of businesses. • The risk and severity of data theft is due to: • The value of data stored on computers • Confidential and private data being stored • Increased use of laptops outside a secure network • Increased proficiency of data hackers and thieves • Encryption is a secure process for keeping confidential information private. 4 4

  5. Data Protection (continued) • Data Backup: • Because data is so valuable, you must back up important files regularly. • Backup procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost. • Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site. 5 5

  6. Computers require the right balance of physical and environmental conditions to properly operate. Temperature: A temperature range of 68 to 75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room. Environmental Conditions 6 6

  7. Humidity: A high level of humidity can cause computers to short circuit, resulting in the loss of data and damage to hardware. For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point. Environmental Conditions (continued) 7 7

  8. Water Damage: If a computer suffers water damage, make sure it is completely dried out before you restore the power. Magnetic Fields and Static Electricity: A single spark from static electricity can damage the internal electronics of a computer. Have grounding protection. Environmental Conditions (continued) 8 8

  9. Maintaining Equipment: Cut down on computer repair through preventive maintenance. Create a monthly maintenance schedule and follow it regularly. Physical Damage: Prevent damage to portable computers due to physical shock by transporting devices with care, such as in padded cases. Environmental Conditions (continued) 9 9

  10. An unexpected power outage can wipe out any data that has not been properly saved. Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy. Power Loss and Power Fluctuation Issues • Surge suppressors can protect against power spikes. Surge suppressor 10 10

  11. One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS). Power Loss and Power Fluctuation Issues (continued) • A UPS contains a battery that temporarily provides power if the normal current is interrupted. 11 11

  12. You can resolve or prevent many hardware issues by proper planning and training. Crashed Hard Drive: To evaluate the condition of the drive: Verify the cable is not damaged and is plugged in Use a boot disk to determine if drive is readable Use diagnostic and data recovery programs Use a data and recovery service Hardware Issues 12 12

  13. Damaged Media: Hard disks and other media eventually fail, but often you can recover the data. First, move it to a secure environment, then inspect or test it to evaluate the damage. The type of damage determines the type of recovery method to use. Hardware Issues (continued) 13 13

  14. Printer Problems: Paper jams are one of the more common problems. Hardware Issues (continued) • Display Problems: • The majority of display problems are caused by incorrect, corrupted or missing video drivers. 14 14

  15. Inoperable Hardware Devices: Could be a software, electrical, or mechanical problem. A small program called a driver instructs the operating system on how to operate specific hardware. Loss of Network or Internet Connectivity: Means people cannot communicate or work effectively. Hardware Issues (continued) 15 15

More Related