![Page 1: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/1.jpg)
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss
1
![Page 2: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/2.jpg)
Making Networks Secure
2
Planning for Network Security Security Models Security Enhancements Computer Viruses
![Page 3: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/3.jpg)
Training Reduces User Errors
3
![Page 4: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/4.jpg)
Permissions Control Access to a Resource
4
![Page 5: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/5.jpg)
Use Windows NT Explorer to Set Permissions
5
![Page 6: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/6.jpg)
Modifying Group Permissions
6
![Page 7: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/7.jpg)
Common File Infectors
7
Companion Virus Macro Virus Polymorphic Virus Stealth Virus
![Page 8: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/8.jpg)
Symptoms of a Virus
8
The computer will not boot. The data is scrambled or corrupted. The computer operates erratically. A partition is lost. The hard drive is reformatted.
![Page 9: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/9.jpg)
Virus Protection Software
9
Warns of a potential virus Keeps a virus from activating Removes a virus Repairs some of the damage that a virus has
caused Keeps a virus in check after it activates
![Page 10: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/10.jpg)
Maintaining a Healthy Network Environment
10
Computers and the Environment Creating the Right Environment
![Page 11: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/11.jpg)
Environmental Extremes Affect Computers
11
![Page 12: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/12.jpg)
Include Hidden Components in Environmental Assessment
12
![Page 13: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/13.jpg)
Keeping the Computer Cool
13
![Page 14: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/14.jpg)
Industrial Considerations
14
Noise Electromagnetic interference (EMI) Vibration Corrosive and explosive environments Untrained and unskilled workers
![Page 15: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/15.jpg)
Avoiding Data Loss
15
Data Protection Tape Backup Uninterruptible Power Supply (UPS) Fault Tolerant Systems Optical Drives and Disks Disaster Recovery
![Page 16: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/16.jpg)
Causes of Network Disaster
16
Component failure Computer viruses Data deletion and corruption Fire caused by arson or electrical mishaps Natural disasters, such as lightning, floods,
tornadoes, and earthquakes Power-supply failure and power surges Theft and vandalism
![Page 17: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/17.jpg)
Data Loss Recovery
17
Tape backup systems An Uninterruptible power supply (UPS) Fault tolerant systems Optical drives and disks
![Page 18: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/18.jpg)
Reduce Network Traffic by Backing Up to a Separate Segment
18
![Page 19: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/19.jpg)
UPS as Backup Power Source
19
![Page 20: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/20.jpg)
Disk Striping Combines Areas on Multiple Drives
20
![Page 21: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/21.jpg)
Disk Mirroring Duplicates a Partition on Another Physical Disk
21
![Page 22: Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1](https://reader035.vdocuments.site/reader035/viewer/2022081516/56649efb5503460f94c0e46d/html5/thumbnails/22.jpg)
Sector Sparing or Hot-Fixing Steps
22