15
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Morrison / Wells

Lesson 3 Computer Protection

  • Upload
    damisi

  • View
    65

  • Download
    1

Embed Size (px)

DESCRIPTION

Lesson 3 Computer Protection. Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition. Morrison / Wells. Introduction. As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important. - PowerPoint PPT Presentation

Citation preview

Page 1: Lesson 3 Computer Protection

1

Lesson 3Computer Protection

Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition

Morrison / Wells

Page 2: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E222

Introduction

As the use of computers has grown in volume and importance, protecting computer systems and the information they hold has become increasingly important.

There are many issues of computer maintenance, the risks of computing, and the measures that can be taken to minimize those risks.

Page 3: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E333

Protecting Computer Hardware from Theft and Damage

Theft of and damage to computer equipment is a serious problem. Safeguards include:– Physically secure equipment– Use security locks– Mark equipment with identification mark– Insure the equipment– Back up data to a separate system

Employees using company computers for personal use can be a type of theft.

Page 4: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E

Data Protection

Data is a critical component of businesses. The risk and severity of data theft is due to:

– The value of data stored on computers– Confidential and private data being stored– Increased use of laptops outside a secure network– Increased proficiency of data hackers and thieves

Encryption is a secure process for keeping confidential information private.

444

Page 5: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E

Data Protection (continued)

Data Backup: Because data is so valuable, you must back up

important files regularly. Backup procedures should place a priority on files

that would be difficult or impossible to replace or reconstruct if they were lost.

Have secure backup procedures that include a regular schedule for backing up designated files and storing the backup files off site.

555

Page 6: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E66

Environmental Conditions

Computers require the right balance of physical and environmental conditions to properly operate.

6

Temperature: A temperature range of 68 to

75 degrees is optimal for system reliability. A separate thermostat can monitor temperature and humidity levels in a computer room.

Page 7: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E77

Environmental Conditions (continued)

Humidity: A high level of humidity can cause

computers to short circuit, resulting in the loss of data and damage to hardware.

For optimal performance, the relative humidity of the computer room should be above 20 percent and below the dew point.

7

Page 8: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E88

Environmental Conditions (continued)

Water Damage: If a computer suffers water damage, make

sure it is completely dried out before you restore the power.

Magnetic Fields and Static Electricity: A single spark from static electricity can

damage the internal electronics of a computer. Have grounding protection.

8

Page 9: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E99

Environmental Conditions (continued)

Maintaining Equipment: Cut down on computer repair through

preventive maintenance. Create a monthly maintenance schedule and follow it regularly.

Physical Damage: Prevent damage to portable computers due

to physical shock by transporting devices with care, such as in padded cases.

9

Page 10: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1010

Power Loss and Power Fluctuation Issues

An unexpected power outage can wipe out any data that has not been properly saved.

Protect electronic devices from power spikes, which are short, fast transfers of electrical voltage, current, or energy.

10

Surge suppressors can protect against power spikes.

Surge suppressor

Page 11: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1111

Power Loss and Power Fluctuation Issues (continued)

One option for preventing data loss due to power outages is to install an uninterruptible power supply (UPS).

11

A UPS contains a battery that temporarily provides power if the normal current is interrupted.

Page 12: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1212

Hardware Issues

You can resolve or prevent many hardware issues by proper planning and training.

Crashed Hard Drive: To evaluate the condition of the drive:

– Verify the cable is not damaged and is plugged in– Use a boot disk to determine if drive is readable– Use diagnostic and data recovery programs– Use a data and recovery service

12

Page 13: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1313

Hardware Issues (continued)

Damaged Media: Hard disks and other media eventually fail,

but often you can recover the data. First, move it to a secure environment, then

inspect or test it to evaluate the damage. The type of damage determines the type of

recovery method to use.

13

Page 14: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1414

Hardware Issues (continued)

Printer Problems: Paper jams are one of

the more common problems.

14

Display Problems: The majority of display problems are caused

by incorrect, corrupted or missing video drivers.

Page 15: Lesson 3 Computer Protection

Le

sso

n 3

Morrison / Wells CLB: A Comp Guide to IC3 3E1515

Hardware Issues (continued)

Inoperable Hardware Devices: Could be a software, electrical, or mechanical

problem. A small program called a driver instructs the

operating system on how to operate specific hardware.

Loss of Network or Internet Connectivity: Means people cannot communicate or work

effectively.15