0% found this document useful (0 votes)
14 views

Configuring Computer System and Network

Uploaded by

Richard Sugbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Configuring Computer System and Network

Uploaded by

Richard Sugbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Configuring Computer System and Network(2)

Network Security

• Computer and network security help keep data and equipment safe by giving only the appropriate
people access. Everyone in an organization should give high priority to security, because everyone
can be affected by a breach in security.
• An attack that intentionally degrades the performance of a computer or network can also harm an
organization’s productivity. Poorly implemented security measures that allow unauthorized access to
wireless network devices demonstrate that physical connectivity is not necessary for security
breaches by intruders.
• Security Attacks
• To successfully protect computers and the network, a technician must understand both of the following types of threats to
computer security
•  Physical:
• Events or attacks that steal, damage, or destroy such --- equipment as servers, switches, and wiring.
•  Data:
• Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
• Threats to security can come from inside or outside an organization, and the level of potential damage can vary greatly.
Potential threats include the following:
•  Internal: Employees who have access to data, equipment, and the
• network. Internal attacks can be characterized as follows:
• o Malicious threats are when an employee intends to cause damage.
• o Accidental threats are when the user damages data or equipment unintentionally.
•  External: Users outside an organization who do not have authorized access to the network or resources. External attacks
can be characterized as follows:
• o Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and run programs
designed to vandalize.
• o Structured attacks, which use code to access operating systems and software.
• Physical loss or damage to equipment can be expensive, and data loss can be detrimental to your business and reputation.
Threats against data are constantly changing as attackers find new ways to gain entry and commit their crimes.
Types of Computer Threats
Viruses, Worms, and Trojan Horses

• A virus is attached to small pieces of computer code, software, or document.


The virus executes when the software is run on a computer. If the virus spreads
to other computers, those computers could continue to spread the virus. A virus
is transferred to another computer through e-mail, file transfers, and instant
messaging. The virus hides by attaching itself to a file on the computer. When
the file is accessed, the virus executes and infects the computer. A virus has
the potential to corrupt or even delete files on your
• A worm is a self-replicating program that is harmful to networks. A worm uses
the network to duplicate its code to the hosts on a network, often without any
user intervention.
• A Trojan horse technically is a worm. It does not need to be attached to other
software. Instead, a Trojan threat is hidden in software that appears to do one
thing, and yet behind the scenes it does another.
Security Procedures

• Regular testing provides details of any possible weaknesses in the current security plan that should
be addressed. A network has multiple layers of security, including physical, wireless, and data.

Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software
• Virus protection software, also known as antivirus software, is software designed
to detect, disable, and remove viruses, worms, and Trojans before they infect a
computer. Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the
company.
• Enabling Windows 7 Firewall
• 1. Open Windows Firewall by clicking the Start button , and then clicking Control
Panel. In the search box, type firewall, and then click Windows Firewall.
• 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an
administrator password or confirmation, type the password or provide confirmation.
Turn Windows Firewall on or off link in Windows Firewall.
• 3. Click Turn on Windows Firewall under each network location that you want to
help protect, and then click OK.
• If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box
Data Encryption

• Encrypting data involves using codes and ciphers. Data encryption can help
prevent attackers from monitoring or recording traffic between resources and
computers. A virtual private network (VPN) is an encryption system that
protects data as though it resides on a private network.
• Port Protection
• Every communication using TCP/IP is associated with a port number. HTTPS,
for instance, by default uses port 443. A firewall is a way of protecting a
computer from intrusion through the ports.
• With port protection, the user can control the type of data sent to a computer
by selecting which ports will be open and which will be secured. Data being
transported on a network is called traffic.
How to Enable Firewall for Windows XP?

• 1. Click Start Button then choose Control Panel


• 2. Click the Network and Internet Connections option.
• 3. Then click the Network Connections option.
• 4. Double click the icon labeled “Local Area Connection”. The icon may have a number after it, for
example “Local Area Connection 5” Click on Properties button.
• 5. On the “Advance “ tab select “Protect my computer and network by limiting or preventing access
to this computer from the Internet.
• 6. Click Settings, then on the ICMP tab select “Allow incoming echo request”.
Enabling Windows 7 Firewall
• 1. Open Windows Firewall by clicking the Start button, and then click Control
Panel. In the search box, type firewall, and then click Windows Firewall.
• 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an
administrator password or confirmation, type the password or provide confirmation.
Turn Windows Firewall on or off link in Windows Firewall.
• 3. Click Turn on Windows Firewall under each network location that you want to
help protect, and then click OK.
• If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box.
Wireless Security Techniques
• Traffic flows through radio waves in wireless networks, so it is easy for attackers to monitor and attack data without
having to connect to a network physically.
• When installing wireless services, you should apply the following wireless security techniques immediately to prevent
unwanted access to the network:
• o Wired Equivalent Privacy (WEP) was the first-generation security standard for wireless network. Attackers quickly
discovered that 64-bit WEP encryption was easy to break
• o Change the default administration password.
• o Disable the broadcasting of the Service Set Identifier (SSID) to hide it from other users
• o Use MAC filtering to protect the network from other users.
• o Change the default values of the SSID by entering the setup program for the access point and renaming the SSID.
• o Update to the latest available firmware.
• o Install or activate a firewall, and adjust the settings to eliminate all traffic except the desired network settings.
• o Update to the latest available firmware.
• o Install or activate a firewall, and adjust the settings to eliminate all traffic except the desired network settings.

• An attacker can access data as it travels over the radio signal. However, you can use a wireless encryption system to
encode data and thereby prevent unwanted capture and use of the data. The following list describes the different
levels of wireless security, from most secure to least secure.
• Lightweight Extensible Authentication Protocol (LEAP): Also called EAP-
Cisco, LEAP is a wireless security protocol created by Cisco to address the
weaknesses in WEP and WPA
•  Wi-Fi Protected Access (WPA): An improved version of WEP. It was created as
a temporary solution until 802.11i (a security layer for wireless systems) was fully
implemented
•  WEP 128: An enhanced encryption protocol combining a 104-bit key and a 24-
bit initialization vector.
•  WEP 64: The first-generation security standard for wireless network.
•  No security: Although you can elect to implement no security whatsoever, you
leave your wireless network completely vulnerable to attack.
File and Printer Sharing

• File sharing is a Microsoft windows 95 and windows 98 networking component


that allows computers running windows 95 and 98 to share folders and printers
so that other client can access this.
• At end of the lesson you will be able to:
•  use the same file by some combination in file and printer sharing.

• Good luck and enjoy.


•  Share folders from PC to PC and PC to printer
• File Sharing is sharing of or offering access to digital information or resources, including documents,
multimedia (audio/video), graphics, computer programs, images and e-books. It is the private or
public distribution of data or resources in a network with different levels of sharing privileges
• You have already leraned from the past lesson about computer network and security. Now you are
going to learn how to share files using a computer and a printer.
• File sharing can be done using several methods. The most common method techniques include the
following:

•  Removable storage devices


•  Centralized file hosting server installations on networks
•  World Wide Web-oriented hyperlinked documents
•  Distributed peer-to-peer networks
Sharing Resources and Accessing Shared Resources
• 1) Open My Computer, double-click the C: drive, and create a new folder on the C: drive. Name it Shared.
Right-click the Shared folder and select Properties.
• 2) In the Shared Properties dialog box, select the Sharing tab.
• 3) Notice that the Select the Share This Folder button.
• 4) Type the Share Name. Click Apply and the computer you are linked to should be able to view your Shared
folder.
• 5) Right-click My Network Places, which should be located on your desktop. Select Properties.
• 6) Right-click your connection (look for a name like Local Area Connection) and again select Properties.
• 7) In your Local Area Connection Properties dialog box, select File and Print Sharing for Microsoft Networks
and click OK. If you don’t see an option for File and Print Sharing, click Install and select a service and then
click Add. Now select the File and Print Sharing option.
• 8) Open My Network Places- double-click the icon- and select the Entire Network option under Other Places
at the left of the window. In the main (right-hand) pane, you should see one or more options. Double-click
the Microsoft Windows Network icon.
• 9) You’re now at the main network screen, where you should see what’s called a workgroup. A workgroup is
a basic group of computers connected to the same Ethernet network. Double-click the workgroup to see all
the computers connected to your Ethernet network.
Printer Sharing
• One of the primary reasons that networks were developed was to allow groups of
computer users to share peripheral devices such as printer. Sharing a single printer
among a group of users costs much less than buying a printer for each computer.
• Setting up printer sharing is simple with Windows XP. The following steps enable a
computer to share a printer:
• Step 1. Choose Start > Printers and Faxes.
• Step 2. Right-click the printer, and choose Properties.
• Step 3. Click the Sharing tab.
• Step 4. Click the Share this printer radio button.
• Step 5. Keep or change the share name.
• Step 6. Click Apply.
• All the computers that use the shared printer must have the correct drivers installed.
Drivers for other operating systems can be installed on the print server. To connect to
the printer from another computer on the network, choose Start > Printers and Faxes
> Add Printer. The Add Printer Wizard appears. Follow the steps using the wizard
Safety Precautions

• The module outlines the potential health risks and provides an


implementing policy statement that is maintaining the required
level of health and safety in the workplace which the students will
understand very well the importance of its procedure:
•  Follow Occupational Health and Safety (OHS) Procedures in
Testing Systems and networks.
•  Test computer systems and networks in accordance with the
job requirements.
•  Accomplish technical reports on the tests conducted.
Common hazards encounter by computer technicians and users
• A hazard is a situation in the workplace that has the potential to harm the health and safety of
people or to damage plant and equipment. The situation could involve a task , chemical or
equipment used. Hazard management is a continuous process that can be used to improve the
health and safety of all workplaces.
• Physical Hazards
• One of the most common physical hazards involving computer technicians is cables running
across the floor. If someone trips ,falls, and hurts himself because because of a cable you can
across the floor, someone(you, your employer, or your customer) has a serious legal negligence
problem. If you need to temporarily run a cable across the floor, place a danger sign similar to
those “wet floor” signs used by cleaning services.
• Mechanical Hazards
• When working on electric equipment, ask yourself “ is there anyway this equipment could hurt
me?”. You might stick your hand in a computer and suddenly the paper feed arm moves, feeding,
but a piece of your finger too.
• Occupational Health and Safety is planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks.
Occupational Health and Safety is also referring to the policies, procedures and
activities that aim to protect the health safety and welfare of a people at the
workplace.
• Occupational Health and Safety standards Each student has a responsibility to
their colleagues and their organization to report and act upon any potential
workplace hazard. Students need to be aware of the type
• of hazards that are possibly present in their work environment.
• Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all
• persons in the computer and technology industries. You must identify the hazards
where you are working and decide how dangerous they are. Eliminate the hazard
or modify the risk that it presents.
Procedure
• 1. Identify the hazard.
• 2. Clear the area close to the hazard.
• 3. Partition the hazard off or clearly identify the area to protect other people from
harm.
• 4. If the hazard can be easily and safely cleared, then do so. If not…
• 5. Report the hazard to the appropriate person (such as teacher in charge,
principal etc.) to obtain assistance.
• 6. After clearing the hazard, fill out the correct documentation to assist in
identifying improved practice to reduce further incidence of hazards
• All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.
Guidelines for Testing Computer Systems and Networks
• GUIDELINES FOR TESTING CONFIGURED COMPUTER SYSTEM AND
NETWORK
• Testing Your Computer Network
• You've set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare your
network is finished: You must verify that the network works as expected. Here
are a few simple tests you can conduct to make sure your network is functional:
•  Check the physical connections. Check that the Link light — the little red or
green light next to the RJ-45 port — is lit on every computer. You must check
this light both on the computer itself and on the switch or router the computer is
plugged into. If this light is not on, you have a connection problem — most likely
a bad cable.
•  Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.
• Check the network configuration. Click the Start button, type cmd and press
Enter. Then, enter the command ipconfig /all and press Enter. This command will
spit out numerous lines of information. The line you're looking for should resemble
this: IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred) If this part of the output
does not show a valid IP address, you need to check that your IP configuration is
set correctly and that your DHCP server is working.
•  Verify that the computers can ping each other. Another basic test you should
perform is to use the ping command from a command prompt to make sure that the
computers on your network can contact one another. Do several ping tests. First,
make sure that TCP/IP is up and running by having the computer try to ping itself.
Open a command prompt and type ping local host. The output from this command
will indicate whether or not the ping was successful. Next, try to ping your servers
by name. For example, if your file server is named FileServer01, use the command
ping File Server
• Direction: Write TRUE if the statement is correct and FALSE if not.
• _____1. Installing network cables, whether copper or fiber optic, can be dangerous.
• _____2. You should wear clothing such as mini skirts, short sleeved shirt when working with toxic materials.
• _____3. A safe workplace is clean, organized and well-lit.
• _____4. Wear safety glasses if possible.
• _____5. Never stand on the top rung of the ladder. You could easily lose your balance and fall.
• _____6. No one should know that you will be working in your area.
• _____7. Cordon off the area with caution tape or safety cones.
• _____8. Wear gloves whenever possible, and dispose any waste properly.
• _____9. You should handle solvents and glues used with fiber optics with utmost care.
• _____10. Keep your working tools in safe place.
• _____11. The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of
glass that can penetrate your eyes.
• _____12. You should keep the work area full of clutter.
• _____13. Use tape to pick up small fragments and dispose them off properly.
• _____14.Use special detectors to help you tell if a fiber is energized.
• _____15. Make it sure that fire extinguisher and first aid kit be available in a workplace.
Match the meanings in column A with the terms in column B to identify the term/word being described.

You might also like