0% found this document useful (0 votes)
79 views

Css Content

1. Policies and procedures provide guidelines for organizations and employees to follow to achieve compliance and efficiency. They establish rules of conduct and define consequences for violations. Effective policies and procedures require enforcement. 2. Network security policies protect systems and data, inform all audiences of rules and mechanisms, and consist of governing, technical, and end-user components. Testing ensures functionality, configuration, concurrency, and peak load performance. 3. Maintenance and troubleshooting procedures include safety protocols, tools and equipment for diagnostics, cleaning systems, and addressing defects to prevent failures.

Uploaded by

api-614165709
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Css Content

1. Policies and procedures provide guidelines for organizations and employees to follow to achieve compliance and efficiency. They establish rules of conduct and define consequences for violations. Effective policies and procedures require enforcement. 2. Network security policies protect systems and data, inform all audiences of rules and mechanisms, and consist of governing, technical, and end-user components. Testing ensures functionality, configuration, concurrency, and peak load performance. 3. Maintenance and troubleshooting procedures include safety protocols, tools and equipment for diagnostics, cleaning systems, and addressing defects to prevent failures.

Uploaded by

api-614165709
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

1.

ENTERPRISE POLICIES AND PROCEDURES

What are policies and procedures?


• A policy is a set of rules or guidelines for your organization and employees to follow
in or to achieve compliance. A procedure is the instructions on how a policy is
followed.

Why do you need to enforce policies and procedures?


- Policies and procedures are helpful for making your workplace run
more efficiently, but they are only effective if you enforce them.
- Policies and procedures are essential part of any organization.
Togethet policies and procedures provide a roadmap for a day to day
operations.

NETWORK SECURITY CONCEPT AND POLICIES


SECURITY POLICY
•Protects people and information
• Set the rules for expected behavior
• Authorize staff to monitor, probe, and investigate
• defines the consequence of violations.
REASON FOR HAVING SECURITY POLICY ARE AS FOLLOWS:
• To inform users, staff, and manegers
• To specify mechanism for security
• To provide a baseline
<THERE ARE TWO AUDIENCE UNDER SECURITY POLICY>
INTERNAL AUDIENCE
• MANAGERS AND EXECUTIVE
•DEPARTMENTS AND BUSINESS UNITS
• TECHNICHAL STAff
• END USERS

EXTERNAL AUDIENCE
•PARTNERS
•CUSTOMERS
• SUPPLIERS
•CONSULTANT AND CONTRACTORS.
THERE ARE THREE SECURITY POLICY COMPONENTS:
GOVERNING,TECHNICHAL POLICIES AND END USER POLICIES

GOVERNING- Good governance assures us of many things including that it


reduces risk and prevents fraud and unscrupulous behavior.
TECHNICAL- Security staff members use Technical policies as they carry
out their security responsibilites for the system.
END USERS- This document covers all security topics important to end
users.
2. TESTING PROCEDURES
Network testing
- Is a testing is a broad means of testing security controls across a
network to identify and demonstrate vulnerability and determine risk.
Testing goals
- Testing goals that are focus of the individual tests. Those tests can be
based on:
•Functional. • Concurrency
•configuration
TEST BED
- A test it is an environment for a specified test. A test bed includes the
hardware/software and configuration/ provisioning.
TWO KIND OF TEST BED

•LOGICAL TEST BED


- A logical test bed depicts all the Elements and configuration required
For the test.

•PHYSICAL TEST BED


It indicates which elements are used in the test, and a test task can be really run
on the test bED.
NETWORK TESTTING TYPES

CONCURRENCY TESTING

• describes how you can test two clients using the same server.
Your goal is to encounter faulty read write locks, software
deadlocks, or other concurrncy problems.

CONFIGURATION TESTING PROCEDURE:


• Describes how you can test that every possible client platform
that can operate with every possible server platform.
FUNCTIONAL TESTING
• Describe how you can test the functional operation of a single
instance of an application.
PEAK LOAD TESTING
• Describe how to place a load on the server for a sjort time to
emulate the heaviest demand that would be generated at peak
user times.
3. PROCEDURES IN PLANNING AND PREPARING MAINTENANCE
AND DIAGNOSE OF FAULTY CONPUTER AND NETWORKS
SYSTEMS AND NETWORK TESTING.

OHS POLICIES AND PROCEDURES


Occupational health and safety policies and procedures.
- Refers to the law, policies, procedures, and activities that aim
to protect the health, safety, and welfare of all people at the
work place.

12 OHSP
•Do not work alone
•Always unplug the computer
• take away any liquid near your working erea
•Be carefull with tools.
• Always grounr or discharge yourself before touchiny any
part of the computer.
•Do not use excessive force
•Clean the erea before and after using it
•Hold the components on the edge
• Make sure that the pins are properly alligned
•Always wear (PPE)
•Contigency measures during workplace
• use brush, compressed air in cleaning computer system.
COMMON TOOL, EQUIPMENT AND TESTING DEVICES

LAN CARD
•this computer circuit board or card
that is installed in a computer so that
it can be conected to a network.

SERVER
• It is a part of network. It is a special
computer that user on the network
can acess to carry out particular job.

HUB/PORT
• It is a connector on the back of a
computer or other device. Aport is
either a serial port or a parellel port.

MODEM
•The modem is a device that allows a given computer to share data or
otherwise a device which let computers exchange information.

SCANNER
• it is an input device that read text or
illustration printed on paper, translate the
information into form thata computer can
use.

4. MAINTENANCE OF COMPUTER SYSTEM AND NETWORKS

TROUBLESHOOT OPERATING SYSTEM:


• Operation system problems can result From a combination of
hardware, Application, and configuration issues. Computer
technicians must be able to Analyze the problem and determine the
Cause of the error to repair the operating System. This process is
called Troubleshooting.

STEPS IN TROUBLESHOOTING OPERATING SYSTEM.


Step 1: Gather Data from the Customer.
Step 2: Verify the Obvious issues.
Step 3: Try quick Solutions first
Step 4: Gather Data from the Computer.
Step 5: Evaluate The problem and Implement Solution.
Step 6: Close with The customer

6.Systems and networks

PERSONAL PROTECTIVE EQUIPMENT (PPE)

• Refers to PROTECTIVE CLOTHING, Helmets, goggles, or other gear


Designed to protect the wearer’s Body or clothing from injury by
Electrical hazards, heat, chemicals, And infection, for job-related
Occupational safety and health Purposes.
GOGGLES
• A large spectacles, with shields Around the rims, for protecting the
Eyes from dust, excessive light, Wind, etc.
RUBBER SOLE SHOES
• A special type of shoes used to prevent Electrical shock and for
waterproofing And insulating purposes.

APRON
• A garment worn over the front of the Body as a protection for one’s
cloth.
FACE MASK
• A covering for the face to prevent the Inhaling or absorbing dust and
other Chemicals.
GLOVES
• The covering material with a separate sheath for each finger used
for Hand protection.

ANTI-STATIC AND SAFETY PRECAUTIONS


• Static electricity is the discharge of Electricity between two objects
with Different electrical potential.
• Humans can’t feel a static shock until it Is several thousand volts
strong, but it Takes less than 30 volts to fry a Sensitive computer
component, such as A stick of RAM or a processor.

CLEANING COMPUTER SYSTEM


• Whether you’re here to learn how to “clean up” a cluttered or
infected hard Drive, or physically clean your computer’s Parts, read on
for an easy, step-by-step
Guide.
• Cleaning system files is a software job for Reputable system, utilities
software that You can acquire online by downloads.

CLEANING COMPUTER SYSTEM


• If vents are not kept clean and get Clogged with dust and fibers, the
CPU can overheat and cause Crashes, malfunctions and damage.To
clean it out, you’ll need to open Your computer’s case. For cabinet,
Hardware cleaning you need physical Efforts, not software.

1.)KEEP YOUR COMPUTER UP TO DATE


• Mac OS and Windows both release Regular security and stability
updates For your operating system.
2. CLEAR INTERNET DATA
• As you browse the Internet, your computer collects bits and pieces
of Information that can eventually build up to the point that they
cause Performance issues, especially on older and slower machines.
5. CHECK FOR ADWARE AND MALWARE
• Adware and malware are types of programs that can compromise
your Computer’s performance and create security weaknesses. There
are Specialized free programs designed to find and erase adware and
spyware.
6. CHECK FOR VIRUSES AND OTHER IMMEDIATE THREATS
• The best way to defend your Computer against truly malicious
Threats is with a powerful antivirus Program.
7. Run maintenance on your hard drive
Most computers made within the last several years take care of these
tasks
Automatically, but you’re always free to take care of them yourself if
you Want.
8. Remove unwanted programs
If you have extra programs, you remove them easily on Windows by
using
The Programs and Features (newer) or Add/Remove Programs (older)
Control panel.

HARDWARE CLEANING

Gather supplies
To safely and efficiently clean your Computer, you’ll need a few
inexpensive Items.
Clean dust from your computer
Computers are also a dust collector. Blow the dust out. The exterior of
the Case can be wiped down with a damp cloth. Be careful about
using Household cleaners, as they can easily destroy circuit boards.
Computers Need cleaning every day
Clean up your cabling, and everything else too
Open the case take it outside blow the dust out. The exterior of the
case can Be wiped down with a damp cloth. Be careful about using
household Cleaners, as they can easily destroy circuit boards.
Computers need cleaning Every day
Clean the vents
Start with cotton swabs or a pair of tweezers, and remove all of the
larger
Dust bunnies and other.
5. DEFECTS IN COMPUTER SYSTEM AND NETWORKS
COMPUTER NETWORKS
• Computer networks do Not work in isolation.A single network is
One of the many Components that are Interconnected to Ensure that
essential Services are available On request all the Time.
Defects in Computer system.
• However, hardware and Software faults can cause Some errors and
a likely System failure if the error Is not contained. Some Software is
needed so That clients and servers Can Communicate on How to share
resources On a network.
ALWAYS REMEMBER:
• As a computer Administrator. Your Main objective, with Your
operating system, Should be to keep it Online and functioning
Correctly. But you can Only do this if you know What the most
common Computer problems are.

COMMON COMPUTER PROBLEMS


• SOFTWARE PROBLEM
• HARDWARE PROBLEM

SOFTWARE PROBLEMS

ERROR IN CONFIGURATION
When you initially set up your System, the load balance that The
network could handle at that Time was small compared to Now.
When the demand for Resources increases, you can Either adjust the
configuration To match the existing resource Demands and
complexities that Come with network growth.
WRONG SETUPS OF USER CREDENTIALS
Wrong user credentials on Server software will cause Problems when
it comes to
Sharing or accessing resources. The biggest issue caused by this Is that
a user cannot logon to The system and his account Remains locked
out until the Problem is sorted out.
PROTOCOL ISSUE
Transmission control protocols and Other TCP/IP based protocols may
Have bug that will halt or slow Down the delivery of packed. Data
Packets being transported via Internet Protocol may fail to reach Their
destinations because of Packet collisions. Frequent Collisions affect
data transfer from One host to another. Running Repair tools from
within the server Software utilities can resolve such An issue.
SECURITY FLAWS
Failure to set up security Features for your system leaves it Open to
threats from malicious Attackers. Malware can also Change the
registry settings and Leave the system open to attacks And hacking.
Some of this Interconnectivity issues can be Sorted out by installing an
Intelligent switch or router that Listens to incoming connections And
blocks suspicious sites.
Slow Connectivity
If there’s one thing that Frustrates an employee, then it’s Slow
connectivity over a Network. PCs can grind to a halt And even the
simplest task can Take an age to complete. It’s Often caused by large
file Transfers, so a limit should be Put in place on the size that is
Permitted.
IP Conflicts
Each PC on your network should Have a unique IP address such as
209.85.255.255, but sometimes two PCs can be assigned the same IP
Address. And this can create major Connectivity issues for both
parties. Sometimes these conflicts will work Themselves out, but you
can help Speed up the process. Restarting the Router is the simplest
approach as it Should assign new IP addresses to Every PC on the
network.
UNABLE TO CONNECT TO LOCAL PRINTER
Printers on a network tend to be Shared by multiple users, but
Occasionally an error can arise that Leaves people unable to access
the Printer. This problem is often caused By a sharing issue whereby
different Security settings between PCs and the Printers fail to agree
with each other. When this occurs, it’s recommended That you check
firewall settings and That your Windows network adapters Have
printer sharing enabled.
WEAK WI-FI SIGNAL
If you rely on wireless Connections in your Organization then you will
be Aware of the issues caused a Weak signal. This can often Be caused
by environmental Issues such as the presence Of a microwave or even
the Layout of an office. It’s Important to eliminate these Factors to
identify the cause Of the fault. Alternatively, The connection issues
could Be caused by outdated Firmware, so make sure all Updates are
installed.
HARDWARE PROBLEMS

BLANK MONITORS
A blank monitor is the most Common computer problem. Most
people who work with Computers might have dealt With such a non-
working blank Monitor at least once. In such Cases, first and foremost
is to Check the supply cord and Power systems. Sometimes, The video
cable might be Loosened. Just push the video Cable and place it again,
it Should help you now.
MOUSE PROBLEMS
The mouse is used for a Variety of purposes, such As playing games or
Opening files, and Moreover, it facilitates Easy navigation, thus easy
Access to your data. The Most common problems Related to the
mouse Include failure to move, Connection problems, Freezing on the
screen, or Damage to the mouse.
Jumpy Mouse
Jumpy Mouse! Sounds strange Right? A jumpy mouse is just a Muted
mouse i.e., cannot be Scrolled. If you have a track and Ball mouse,
then simply turn it Over and open the ball container And remove the
excess debris and Clean the dirt that lines the rollers. For an optical
mouse, eliminate the Dust that has collected around the Optical
sensor.
SMARTPHONE WILL NOT SYNCH WITH PC
In order to ensure backup of Your sm
6. PREVENTIVE MAINTENANCE OF COMPUTER SYSTEM AND
NETWORK
PREVENTATIVE MAINTENANCE FOR COMPUTERS
• Like many other pieces of Technology, computers see Constant wear
and tear from Being used. Simple things like Downloading files,
clicking on Harmful sites by accident, and Allowing dust to settle on
the Keyboard can build up to the Computer slowing down and
Possibly being unusable.
ROUTINE MAINTENANCE
• Routine maintenance refers to simple activities Associated with the
general upkeep of a computer Which take only a few minutes and
should be part of The routine of computer uusage
A COMPUTER MAINTENANCE SCHEDULE
• Use this checklist to stay up-to-date with the Tasks you should do
daily, weekly, monthly, Quarterly, and yearly to keep your computer
Functioning at its best.

DAILY
Virus/Adware/Spyware Scans
Delete internet temp files
Delete Windows temp files

WEEKLY
Windows Update
Check for Other Software Updates
Java
Flash
Antivirus/Adware Software
Adobe
Data backups
Empty the desktop Recycle Bin
Delete cookies
MONTHLY
Run Disk Cleanup
Run Disk Defragmenter
Uninstall unused program
QUARTERLY
Clean the keyboard
Clean the mouse
Dust the computer monitor

TO CLEAN THE LCD:


• Turn off the computer or display. You may Need to turn off the
computer in order to Turn off some Apple displays.
• Dampen a clean, soft, lint-free cloth or Paper with water only.
• Wipe the screen. Do not spray liquid Directly on the screen.
Caution:
• Isopropyl alcohol is a flammable liquid.
• Never spray or pour any liquid directly on the LCD Panel.
• Do not clean the screen while the computer is on.
• Shut down the computer.
• Disconnect power to the system or monitor.
• Wipe the LCD screen gently with a soft, dry cloth.
• If any marks remain, moisten the cloth with LCD Cleaner, and then
gently stroke the cloth across The display in one direction, moving
from the top Of the display to the bottom.
NOTICE:
• Do not use any of the following chemicals or Any solutions that
contain them: acetone, Ethyl alcohol, toluene, ethyl acid, ammonia,
Or methyl chloride. If you have a different Chemical or solution and
are not sure Whether it is suitable, do not use it. Using any Of the
chemicals in the previous list may Cause permanent damage to the
LCD screen. Some commercial window cleaners contain Ammonia and
are, therefore, unacceptable.

You might also like