0% found this document useful (0 votes)
9 views49 pages

Harar Poly Technic Collage

Download as doc, pdf, or txt
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 49

HARAR POLY TECHNIC COLLAGE

Ethiopian TVET-System

INFORMATION TECHNOLOGY SUPPORT SERVICE


Level II

Learning Guide #3

Unit of Competence: Care for Network and Computer Hardware


Module Title: Caring for Network and Computer Hardware
LG Code: ICT ITS2 M04 LO1-04
TTLM Code: ICT ITS2 TTLM4 0312

LO1: Identify computer hardware components

LO1- Introduction to computer hardware


Instruction

This learning guide is developed to provide you the necessary information regarding the
Following content coverage and topics –

 Purposes and general requirements of peripheral devices


 System development life cycle
 Planning for client needs
 Analyzing client requirements
 Designing and verifying client requirements
 Warranty and support agreements.

This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –

 Identify and confirm client peripherals in accordance with organizational standards.


 Document the client requirements and peripherals in line with organizational standards and
findings are reported to the appropriate person.
 Verify the client requirements with appropriate person in line with organizational standards and
reporting procedures
 Ensure client support expectations are covered by vendor and support services.

Learning Activities

1. Read the specific objectives of this Learning Guide.


2. Read the information written in the “Information Sheet 1”.
3. Accomplish the “Self-check 1” in page 7.
4. Submit your accomplished Self-check 1. This will form part of your training portfolio.
5. Read and perform the “Operation Sheet” in page 8.
6. Read the information written in the “Information Sheet 2”.
6. Accomplish the “Self-check 2” in page 16.
7. Submit your accomplished Self-check 2. This will form part of your training portfolio
8. If you earned a satisfactory evaluation proceed to LAP Test.
However, if your rating is unsatisfactory, see your teacher for further instructions.
9. Do the “LAP test” in page 17 (if you are ready) and show your output to your teacher.

*Your teacher will evaluate your output either satisfactory or unsatisfactory. If


unsatisfactory, your teacher shall advice you on additional work. But if satisfactory
you can proceed to the next topic.

Information Sheet – 1 Internal and External hardware peripherals

Overview of Internal and External hardware peripherals

Hardware

Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices
include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice,
printers, and scanners etc.

The internal hardware parts of a computer are often referred to as components, while external hardware devices
are usually called peripherals. Together, they all fall under the category of computer hardware. Software, on the
other hand, consists of the programs and applications that run on computers. Because software runs on
computer hardware, software programs often have system requirements that list the minimum hardware
required for the software to run.

Note: Peripheral devices are the devices that are attached to the computer’s system unit

1. Internal hardware peripherals

Introduction

Computer Hardware is the physical part of a computer, as distinguished from the computer software that executes
or runs on the hardware. The hardware of a computer is infrequently changed, while software and data are
modified frequently. The term soft refers to readily created, modified, or erased. These are unlike the physical
components within the computer which are hard.

When you think of the term computer hardware you probably think of the guts inside your personal computer at
home or the one in your classroom. However, computer hardware does not specifically refer to personal
computers. Instead, it is all types of computer systems. Computer hardware is in embedded systems in
automobiles, microwave ovens, CD players, DVD players, and many more devices. In 2003, only 0.2% of all
microprocessors sold were for personal computers. How many other things in your house or your classroom use
computer hardware?

Inside Computer
The motherboard is the body or mainframe of the computer, through
which all other components interface. It is the central circuit board
making up a complex electronic system. A motherboard provides the
electrical connections by which the other components of the system
communicate. The mother board includes many components such as:
central processing unit (CPU), random access memory (RAM),
firmware, and internal and external buses.

Components directly attached to the motherboard include:

 The central processing unit (CPU) performs most of the calculations which enable a computer to
function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink
and fan. Newer CPUs include an on-die Graphics Processing Unit (GPU).
 The chip set mediates communication between the CPU and the other components of the system,
including main memory.
 RAM (random-access memory) stores resident part of the current running OS (OS core and so on) and
all running processes (application parts, using CPU or input/output (I/O) channels or waiting for CPU or
I/O channels).
 The BIOS includes boot firmware and power management. The Basic Input Output System tasks are
handled by operating system drivers. Newer motherboards use Unified Extensible Firmware Interface
instead of BIOS.
 Internal buses connect the CPU to various internal components and to expansion cards for graphics and
sound.

Central Processing Unit¶

The Central Processing Unit (CPU; sometimes just called processor) is a machine that can execute computer
programs. It is sometimes referred to as the brain of the computer.
There are four steps that nearly all CPUs use in their operation: fetch, decode, execute, and writeback. The first
step, fetch, involves retrieving an instruction from program memory. In the decode step, the instruction is broken
up into parts that have significance to other portions of the CPU. During the execute step various portions of the
CPU, such as the arithmetic logic unit (ALU) and the floating point unit (FPU) are connected so they can perform
the desired operation. The final step, writeback, simply writes back the results of the execute step to some form of
memory.

Power supply

Inside a custom-built computer: the power supply at the bottom has its own cooling fan.

A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power for the
internal components of the computer. Some power supplies have a switch to change between 230 V and 115 V.
Other models have automatic sensors that switch input voltage automatically, or are able to accept any voltage
between those limits. Power supply units used in computers are nearly always switch mode power supplies
(SMPS). The SMPS provides regulated direct current power at the several voltages required by the motherboard
and accessories such as disk drives and cooling fans.

Removable media devices


CD (compact disc)

The most common type of removable media, suitable for music and data.

o CD-ROM Drive - a device used for reading data from a CD.


o CD Writer - a device used for both reading and writing data to
and from a CD.

DVD (digital versatile disc)

A popular type of removable media that is the same dimensions as a CD


but stores up to 12 times as much information. It is the most common
way of transferring digital video, and is popular for data storage.

o DVD-ROM Drive - a device used for reading data from a DVD.


o DVD Writer - a device used for both reading and writing data to
and from a DVD.

o DVD-RAM Drive - a device used for rapid writing and reading


of data from a special type of DVD.
Blu-ray Disc

a high-density optical disc format for data and high-definition video. Can
store 70 times as much information as a CD.

o BD-ROM Drive - a device used for reading data from a Blu-ray


disc.
o BD Writer - a device used for both reading and writing data to
and from a Blu-ray disc.

HD DVD (short for High-Definition/Density DVD)

Is a discontinued high-density optical disc format for storing data and high-
definition video. Supported principally by Toshiba, HD DVD was envisioned
to be the successor to the standard DVD format. However, in February 2008,
after a protracted high definition optical disc format war with rival Blu-ray
Disc, Toshiba abandoned the format, announcing it would no longer develop
or manufacture HD DVD players or drives. However, the HD DVD physical
disk specifications (but not the codecs) are still in use as the basis for the
CBHD (China Blue High-Definition Disc) formerly called CH-DVD. The HD
DVD Promotion Group was dissolved on March 28, 2008.
Floppy disk

an outdated storage device consisting of a thin disk of a flexible magnetic


storage medium. Floppies are used today mainly for loading device drivers
not included with an operating system release (for example, RAID drivers).

Iomega Zip drive

an outdated medium-capacity removable disk storage system, first introduced


by Iomega in 1994.

Secondary storage

Hardware that keeps data inside the computer for later use and remains persistent even when the computer has
no power.

A hard disk drive (HDD

also hard drive or hard disk)[2] is a non-volatile,


random access digital magnetic data storage device. It
features rotating rigid platters on a motor-driven
spindle within a protective enclosure. Data is
magnetically read from and written to the platter by
read/write heads that float on a film of air above the
platters. Introduced by IBM in 1956, hard disk drives
have decreased in cost and physical size over the years
while dramatically increasing in capacity.

Hard disk drives have been the dominant device for


secondary storage of data in general purpose
computers since the early 1960s.[3] They have
maintained this position because advances in their
recording density have kept pace with the
requirements for secondary storage.[3] Today's HDDs
operate on high-speed serial interfaces; i.e., serial
ATA (SATA) or serial attached SCSI (SAS).
A solid-state drive (SSD)

sometimes called a solid-state disk or electronic disk,


is a data storage device that uses solid-state memory to
store persistent data with the intention of providing
access in the same manner of a traditional block i/o
hard disk drive. SSDs are distinguished from
traditional magnetic disks such as hard disk drives
(HDDs) or floppy disk, which are electromechanical
devices containing spinning disks and movable
read/write heads. In contrast, SSDs use microchips
which retain data in non-volatile memory chips and
contain no moving parts.[1] Compared to
electromechanical HDDs, SSDs are typically less
susceptible to physical shock, are silent, have lower
access time and latency, but are more expensive per
gigabyte (GB). SSDs use the same interface as hard
disk drives, thus easily replacing them in most
applications.

RAID array controller


a device to manage several internal or external hard
disks and optionally some peripherals in order to
achieve performance or reliability improvement in
what is called a RAID array.

Sound card

Enables the computer to output sound to audio


devices, as well as accept input from a microphone.
Most modern computers have sound cards built-in to
the motherboard, though it is common for a user to
install a separate sound card as an upgrade. Most
sound cards, either built-in or added, have surround
sound capabilities.

2. External hardware peripherals


Examples of External hardware peripheral devices include:

Monitor
A monitor, also known as a visual display unit (VDU) or screen, is like a
television screen. It is measured diagonally in inches — the distance from one
corner of the screen area to the opposite corner. The quality of a monitor is
determined by its resolution. Resolution is calculated based on the number of
pixels, which are individual dots that create the images you see on your
monitor. Flat panel monitors are now becoming a popular choice due to their
portability and compactness.

Keyboard
A combination of a typewriter keyboard and numeric keypad, a
keyboard enables you to enter data into a computer. Computer
keyboards are similar to electric typewriter keyboards but include
additional keys.

Mouse
A mouse is a device that controls the movement of the cursor on a screen. A
mouse is a small object you can roll along a flat surface, to help you navigate
your computer. Mice also have a variety of buttons, which can have different
purposes depending on what program is running. There is usually a left mouse
button (which is used to select an object and perform an action), right mouse
button (which typically displays a shortcut menu of options) and a scroll wheel
(to help a user scroll through documents).

Printers

A printer is a device that allows you to obtain hard copies of the data you have created on your computer
system. Printers are classified by:
1 their quality
2 the speed of printing — pages per minute
3 the print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better. There are different types
of printers due to the different methods of transferring ink to paper. Two common types for the home and office
are inkjet and laser.

Inkjet printer — sprays ink onto a sheet of paper, and can produce high-
quality text and photo images.

Laser printer — produces very high quality text and graphics, using a
process similar to a photocopier to produce print. It creates dot-like
images on a drum, using a laser beam light source.

Scanner
A scanner is a device that captures text or illustrations on paper and converts the
information into a form the computer can use. One of the most common kinds of
scanners is called a flatbed scanner. It has a glass surface on which you lay paper,
magazines, or other documents that you want to scan. Sometimes scanners can be
manufactured so that they are combined with a printer thus can also be used as a
photocopier and fax machine.

USB flash drive


A small, portable device that plugs into a computer’s USB port and operates as a
portable hard drive. USB flash drives are considered to be an ideal method to
transport data, as they are small enough to be carried in a pocket and can plug into
any computer with a USB drive. Other names for flash drives are thumb drives,
pen drives or USB drives.

Web cam
Web cams are small cameras that plug into your computer which allow the user to
share a moving image of themselves with others on other computers through the
Internet.

Digital camera

Digital cameras store images digitally onto a storage device, either a memory card or a floppy disk, rather than
recording them on film. Once a picture has been taken, it can be downloaded to a computer system, and then
manipulated or printed.

Warranties and support

Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties, service and support,
prospective suppliers will provide.

Warranties

A warranty is an agreed upon term which covers a computer or computer component. Generally, most
computers have a 1 or 3 year warranty. This warranty may or may not cover the service, repair and replacement
of computer parts.
An extended warranty is an available option provided by manufacturers or third-party companies that provides
additional support and/or repair of a computer or other hardware devices beyond its standard warranty.

Service and support

It is important to know what kind of support services are offered by the prospective supplier. There are many
questions to consider such as:
 If a device requires repairs does it have to be sent back to the supplier (called ‘Return to base’) or will
they provide on-site visits?
 What is the average response time if service is required?
 What kinds of maintenance and repair costs could be incurred during the duration of use of the device?
 Will the device require regular servicing? If so, how many services will be necessary over a one-year
period?

System specifications

It is important to find out the specifications of the computer system you are planning to connect the peripheral
device to. Many newer types of peripheral devices require a specific amount of memory, CPU speed, hard disk
space, and may only be compatible with certain operating systems.
You also need to be aware of the peripheral’s system requirements. The manual for the peripheral device as
well as the manufacturer’s website will help you determine the minimum system specifications.
Compatibility

Compatibility is the ability of a system or a product to work with other systems or products without special
effort on the part of the customer. One way products achieve interoperability is to comply with industry
interface standards. For example, a memory module is compatible with a motherboard because the manufacturer
of the memory module and the motherboard both work to the same industry standard.

Technical specifications

Once the business requirements have been considered, the technical specifications of the hardware device need
to be evaluated. Areas for evaluation include the following:

 processing speed of the CPU


 storage capacity of the hard drive
 size of memory (RAM)
 software capabilities
 compatibility with existing systems
 upgradeability

The technical specifications to be considered will depend on the computer hardware device to be purchased. For
example, technical specifications to be considered for a printer include:

 interface – USB or network


 resolution – measured in dots per inch
 printing speed – measured in pages per minute
 memory
 paper capacity

Warranty

When computer hardware devices are purchased, the supplier provides a guarantee that if a fault develops in the
equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business needs will be
met. Common warranty conditions include:

 The length of the warranty – typically one or more years.


 The actions needed to have the repairs undertaken. Either the repairs will be done on-site or the
equipment will need to be returned to the supplier, known as return-to-base.
 How long the supplier has to make good any required repairs
 Any exclusions to the warranty, such as damage caused to hardware by accidental damage.

Many computer hardware suppliers offer extended warranties at additional cost. For example, the extended
warranty may extend the period of cover from one year to three years. The level of service purchased by an
organisation will depend on how critical the device is to the IT system.

A Service Level Agreement (SLA) is an agreement which sets out the level of service and maintenance to be
provided.
Organizational policies

Some organizations have a policy of using preferred suppliers for computer hardware purchases. This ensures
the quality and consistency of computer hardware devices is maintained throughout an organization.

A standard operating environment is a specification for computer hardware and software which organizations
develop to maintain consistency and reduce support costs. Many organizations such as universities, publish
their standard operating environment policies on the internet. For an example, visit the Edith Cowan University
Standard Operating Environment website
Self Check 1 Written Test

Name:____________________ Date:_________________

Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.

Match the most appropriate peripheral device to A column from B column.

Column A Column B
1. Mouse A. Internal hardware peripherals
2. Speakers B. External hardware peripherals
3. Keyboard
4. Web cam
5. Monitor
6. Power supply
7. Digital Camera
8. Data projectors
9. External modems
10. Printers
11. Microphones
12. Mother board
13. CPU
14. Power supply
15. Storage Device Drives
16. Removable Medias

Information Sheet – 2 Hardware requirements with specified manufacturers


Determine any requirements as specified by the hardware manufacturer

If the manufacturer produces substances that may be deemed hazardous, then additional obligations apply.
There are documents known as Material Safety Data Sheets or MSDS. A MSDS should be prepared by the
manufacturer and include information on the recommended use of a substance, its physical and chemical
properties, relevant health hazard information and information concerning the precautions to be followed in
relation to the safe use and handling of the substance.
In a more general context, with virtually all equipment produced, the manufacturer is required to provide
relevant safety information. This information is often provided as part of the user instruction/manual for safe
operation. The following is a typical set of Safety Instructions for a combined Printer/Scanner/Copier.

Example: Safety instructions

Read all of the instructions on this section when setting up and using the product.

When choosing a place for the product

Avoid places subject to rapid changes in temperature and humidity. Also, keep the product away from direct
sunlight strong light and heat sources.
Avoid places subject to dust, shocks and vibrations
Leave enough room around the product to allow for sufficient ventilation.
Place the product near a wall outlet where the plug can be easily unplugged.
Place the product on a flat, stable surface that extends beyond this product base in all directions. If you place the
product near the wall, leave more than 10cm between the back of the product and the wall. The product will not
operate properly if it is tilted at an angle.
When storing or transporting the product, do not tilt it, stand it on its side, or turn it upside down; otherwise, ink
my leak from the cartridge.
Leave more than 22cm between the base of the product and the edge of the surface on which it is placed;
otherwise, the product may fall if tipped forward possibly causing injury.

When choosing a power source

Use only the type of power source indicated on the label on the back of the product.
Be sure your AC power cord meets the relevant local safety standards.
Do not use a damaged or frayed power cord.
If you use an extension cord with the product, make sure that the total ampere rating of the devices plugged into
the extension cord does not exceed the cord’s ampere rating. Also, make sure that the total ampere rating of all
devices plugged into the wall outlet does not exceed the wall outlet’s ampere rating.
When handling ink cartridges

Do not open the ink cartridge packages until just before you install them.
Do not shake used ink cartridges; this can cause leakage.
Keep ink cartridges out of the reach of children. Do not allow children to drink from or otherwise handle the
cartridges.
Be careful when you handle used ink cartridges as there may be some ink remaining around the ink supply port.
If ink gets on your skin, wash the area thoroughly with soap and water. If ink gets into your eyes, flush them
immediately with water. If discomfort or vision problems remain after a thorough flushing, see a doctor
immediately.
Do not touch the circuitry that is located on the back of the cartridge.
Do not remove or tear the label on the cartridge; this can cause leakage.
Store each ink cartridge so that the bottom of its packaging faces down.

When using the product

Do not put your hand inside the product or touch the ink cartridges during printing.
Do not block or cover the openings on the product.
Do not attempt to service the product yourself.
Unplug the product and refer servicing to qualified service personnel under the following conditions:
 The power cord or plug is damaged.
 Liquid has entered the product.
 The product has been dropped or the cover damaged.
 The product does not operate normally or exhibits a distinct change in performance.
Do not insert objects into the slots on the product.
Take care not to spill liquid on the product.
Leave the ink cartridges installed. Removing the cartridges can dehydrated the print head and may prevent the
product from printing.

If the product has a LCD panel

Use only a dry, soft cloth to clean the display. Do not use liquid or chemical cleansers.
If the display on the product is damaged, contact your dealer.
If the liquid crystal solution contained in the LCD panel leaks out and gets on your hands, wash them
thoroughly with soap and water, if the liquid crystal solution gets into you eyes, flush them immediately with
water, if discomfort or vision problems remain after a though flushing, see a doctor immediately.
Before installing software we often need to know if a computer meets that software's minimum hardware
requirements, like the type of processor, the amount of physical memory, the screen resolution or (not really a
hardware issue pur sang) available harddisk space.

I. Processor

The processor number is one of several factors, along with processor brand, specific system configurations and
system-level benchmarks, to be considered when choosing the right processor for your computing needs.
A higher number within a processor class or family generally indicates more features, but it may be more of one
and less of another. Once you decide on a specific processor brand and type, compare processor numbers to
verify the processor includes the features you are looking for.
Intel’s processor number system is used with the following brands:
For Example
Requirement Requirement
Type
CPU For one index server per TREX instance:
 At least 2 CPUs
 Recommended: 4 CPUs
With two index servers per TREX instance: At least 4 CPUs.
The supported processors are listed in the TREX installation
guide.

II. Physical Memory

Memory is the main component of a computer system. It stores instructions and data in binary form that is used
by the central processing unit.

For Example
Requirement Type Requirement
RAM At least 2 GB per CPU

III. Disk Space

Hard-disk requirements vary, depending on the size of software installation, temporary files created and
maintained while installing or running the software, and possible use of swap space (if RAM is insufficient).
A minimum base installation requires at least 15MB of disk space but you should assume that your actual disk
space needs will be much larger.

For example, if you install many contributed modules and contributed themes, the actual disk space for your
installation could easily be (and likely will be) larger than 60 MB (exclusive of database content, media,
backups and other files which should be considered too when planning for your site).

IV. Network Connections

Network Connections provides connectivity between your computer and the Internet, a network, or another
computer. With Network Connections, you can configure settings to reach local or remote network resources or
functions.
Instruction LO2- Establish location requirements for hardware and peripherals

This learning guide is developed to provide you the necessary information regarding the
Following content coverage and topics –

 Purposes and general requirements of peripheral devices


 System development life cycle
 Planning for client needs
 Analyzing client requirements
 Designing and verifying client requirements
 Warranty and support agreements.

This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –

 Identify and confirm client peripherals in accordance with organizational standards.


 Document the client requirements and peripherals in line with organizational standards
and findings are reported to the appropriate person.
 Verify the client requirements with appropriate person in line with organizational
standards and reporting procedures
 Ensure client support expectations are covered by vendor and support services.
Computer platforms and Establishing safe
Information Sheet – 2 work practices

Computer platforms
A platform consists of an operating system, the computer system's coordinating program, which in
turn is built on the instruction set for a processor or microprocessor, the hardware that performs logic
operations and manages data movement in the computer. The operating system must be designed to
work with the particular processor's set of instructions. As an example, Microsoft's Windows 2000 is
built to work with a series of microprocessors from the Intel Corporation that share the same or similar
sets of instructions. There are usually other implied parts in any computer platform such as a
motherboard and a data bus, but these parts have increasingly become modularized and
standardized.

Establish safe work practices


Computer hardware devices
There is a range of computer hardware devices which may be found in a workplace.
Where two or more computers are connected together, this is known as a network. The computers
may be connected by cable or be connected wirelessly. Networks enable the sharing of resources
such as data, programs, files, printers and an internet connection.
Networks can be classified by the scale of the geographic area that they serve:

 Local Area Network (LAN) is a computer network limited to a small geographic area such as a
school or office building. Usually the network equipment and cabling is owned by the
organization.
 Wide Area Network (WAN) is a computer network that covers a wide geographic area. Some
WANs are privately owned but many will use leased communication lines and equipment.

Computer hardware devices include:

 Server – a computer which is usually dedicated to managing user access to shared network
resources. A server provides services such as file and print sharing, e-mail and web serving.
The term “server” can describe the software application that provides the service, the computer
that runs the software application or the combination of the two.
 Switch – a hardware device used to connect segments of a computer network.
 Workstation – a computer designed to be used by one person to perform work-related tasks.
Workstations are commonly connected to a computer network. The term “workstation” is also
used to describe the workspace of a person, including the desk, chair and other equipment
used to perform tasks.
 Modem – a hardware device that enables a computer to transmit data over telephone or cable
lines. For high speed internet connections, DSL (Digital Subscriber Line) or cable modem
services are used.
 Router – a hardware device that connects two or more computer networks and selectively
forwards data from one network to another.

Peripheral devices are hardware devices which are added to a host computer in order to expand its
abilities. They may be internal or external to the computer. Commonly they are classified by their
purpose:

 Input devices such as keyboards and scanners.


 Output devices such as printers.
 Storage devices such as external hard drives.

To determine the appropriate methods of working with these devices, knowledge of the following is
required:

 Manufacturer’s requirements
 Occupational Health and Safety (OH & S) requirements and safe work practices

Manufacturer’s requirements

Computer hardware will usually come with a user manual or guide, either in a hard copy or soft copy
format. Another source for this information is the manufacturer’s website. Information in the user
guide may include:
 Installation instructions including required environmental conditions
 Handling precautions
 Software installation guide
 Instructions on how to use the hardware
 Maintenance instructions
 Fault finding guide

Establish location requirements


Environmental considerations
Computer hardware is designed for operation within a set range of environmental conditions, and
operation of computer hardware outside these conditions will damage the hardware or reduce the
working life of the hardware.

The manufacturer’s recommendations for operating a specific computer hardware device will be
found in the user manual or specifications.

Temperature

The ambient temperature of the environment is the temperature at which computer hardware should
be maintained and should fall within the recommended range. If the temperature exceeds the upper
limit of this range, the life of the electronic components will be shortened, and the reliability of the
device decreased. The optimum temperature range for computer hardware is usually from 15 to 24
deg C.

To maintain the ambient temperature within an acceptable range, the room containing the computer
hardware is often air conditioned. Air conditioning will also maintain the relative humidity levels in the
room, and also improve the air quality by filtering out dust particles.

Humidity and moisture

If the relative humidity where computer hardware devices are operated is too high, problems can
occur through water condensation. If the relative humidity is too low, the devices are much more
susceptible to electrostatic discharge.

Computer hardware devices should be located away from sources of moisture such as open
windows. Eating and drinking should not be allowed anywhere near a computer hardware device.

Dust

As discussed above, it is important hardware devices operate within a set temperature range. Over
time fans and ventilation vents become clogged with dust reducing their cooling efficiency. If the
hardware device is to be operated in a dusty area such as an industrial environment, the device will
need to be cleaned more frequently than a device in an office environment. Shields and housings are
available to reduce the intake of dust in a dusty environment.
Physical security

Physical security refers to making sure only authorized people have physical access to computer
hardware. Examples of physical security include:

 Servers located in a server room secured with locks, key cards or keypad access.
 Workstations protected by a key lock on the system case and/or a cable lock between the
system case and the desk.

Electrical system protection devices


The correct operation of computer hardware devices is dependent on a continuous supply of
electrical power within set conditions. If the electrical supply is outside those conditions, the operation
of computer hardware can be adversely affected.

Electrical problems

Common electrical problems are listed below:

Blackout – total loss of electrical power. Hardware devices will not operate.

Brownout – the electrical power is delivered below the set conditions for the computer hardware.
Computer hardware may turn off without notice or may not operate.

Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a
short period of time. Surges and spikes commonly occur when there is lightning. Computer hardware
(and other electronic equipment) may be damaged.

Electrical noise – the electrical power is delivered with additional electrical signals which may affect
the correct operation of computer hardware. One source of electrical noise is electrical machinery
such as welders.

Protection devices

To provide protection for computer hardware devices from electrical problems, the following devices
can be installed.

Surge protectors – a device designed to protect against electrical surges and spikes. It provides no
protection against blackouts or brownouts.

Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts. A UPS
provides power automatically during a blackout and is designed to provide battery power for a
relatively short period of time – around ten to twenty minutes. This provides time to save all data and
shut down the computer correctly.

Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.
Generators – where an organization requires the computer hardware to be powered for an extended
length of time, a generator may be installed in addition to a UPS. This is a relatively costly option and
would be considered where the operation of the computer hardware is considered critical to the
organization.

Maintenance and testing

These devices should be regularly tested and maintained to ensure they will function correctly in the
event of an electrical problem. Refer to the user manual for the device.

System protection
Once the hardware device is installed, the device (and data stored on it) can be further protected by
the following system protection measures.

User accounts

Users should be given individual user accounts with enough rights and permissions to be able to
perform their work duties and no more.
For example, users in a Microsoft Windows environment may be a standard user or an administrator.
Administrators can change security settings, install software and hardware, and access all files on the
computer. Administrators can also make changes to other user accounts. Standard users have
limited access.

Access control lists

An Access Control List (ACL) is a list of permissions for objects such as files or folders. This list tells
the computer operating system which access rights each user has to the file or folder. Depending on
the operating system, these access rights include:

 Read – users can open a folder, list the files in the folder, open a file and view the contents
 Write – as for Read and in addition users can create new files and modify existing files
 Full – users have all rights
 Execute – users can execute (run) files if they are scripts or program files

Users should only be given enough rights to files and folders that are necessary for them to be able to
perform their work duties and no more.

Antivirus software
Antivirus software should be installed and the software and virus definitions should be regularly
updated. Computers with an internet connection can be set up to download these updates
automatically.

Firewalls
A firewall is a hardware or software device designed to block unauthorised access to or from a private
computer network.

Data backup

To protect against data loss, it is important that a data backup and recovery plan is developed and
implemented. The backup plan can protect against accidental loss of user data, database corruption,
hardware failures and natural disasters. Typically two copies of the backup are made. One copy is
stored on-site and the other copy is stored off-site to protect against a disaster such as a fire
happening at the site.

Software updates

Updates for operating systems and application software are regularly released by the manufacturers
to update features or fix problems with the software. The most recent versions of operating systems
have built-in facilities which automate the process of checking for updates.

Redundancy

Redundancy helps protect an information system against the failure of a hardware device. A
secondary hardware device is installed and this secondary hardware device will take over the function
of the primary device if it fails.

An example of redundancy is the use of Redundant Array of Independent (or Inexpensive) Disks,
commonly known as RAID.

Maintain computer hardware


It is important that computer hardware devices are regularly maintained. Computer maintenance can
be loosely classified as one of two types.

Preventive maintenance is maintenance which is carried out, usually at regular intervals, to prevent
equipment failures or the slowing of a service.

Corrective maintenance is maintenance which is carried out to correct a failure which has occurred.

Preventive maintenance
Cleaning materials

One of the main preventive maintenance tasks for computer hardware devices is cleaning to remove
dust and debris build up.
Computer cleaning supplies in a cleaning kit should include:

 a lint-free cloth
 Ammonia-free glass cleaner. (Products with ammonia are suitable for CRT monitors which
have a glass screen but are not suitable for LCD monitors).
 a small brush for cleaning dust
 a can of compressed air for blowing away dust
 antistatic wrist strap for use when working inside a computer case
 mild detergent

There are also specialised computer cleaning kits available. For information about the different types
of kits available use the internet to search for “computer cleaning kit”.

Cleaning

Devices which need regular cleaning include:

 keyboard
 mouse
 monitor
 optical drives
 printers

Computer hard drives are sealed devices and the hard drive assembly is designed to exclude dust
particles. They do not require any cleaning.

For all devices refer to the user manual for any specific manufacturer’s cleaning instructions.

Read the instructions on any specialized computer cleaning kits before use.

Hard drive maintenance

Hard drive maintenance tasks include:

Uninstall unwanted programs - For a Windows computer use Add/Remove Programs.

Remove unused files - For a Windows computer use Disk Cleanup. This utility searches for
unnecessary files such as Temporary Internet files and the Recycle bin and then deletes them.

Check for disk errors - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Check Now
button in the Error-checking frame.

Defrag the hard drive - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Defrayment Now
button in the Defragmentation frame.

Installing additional memory

One of the most cost effective upgrades which can be made to a computer is to install additional
memory (RAM). Consult your computer user manual to determine the correct RAM type for your
computer.
1. The computer should be on a flat location, clear of clutter.
2. Turn off the computer.
3. At the power point, turn off the switch and unplug the power cord.
4. Disconnect and remove peripheral devices.
5. Remove the computer cover.
6. Put the antistatic wrist strap on your wrist and connect the alligator clip to a metallic surface on
the computer case.
7. Hold the RAM module by the edges at each end, being careful not to touch the gold electrical
contacts on the bottom edge.
8. Align the notches in the memory module with the memory slot, and press down firmly at both
ends of the modules until the module is locked in.
9. Replace the computer cover.
10. Connect peripheral devices.
11. Turn power on at the power point.
12. Boot the computer.
13. Use an operating system utility to check that the new memory has been recognised. For a
windows computer use System Information.

Figure 1 – Adding additional memory

Corrective maintenance
Corrective maintenance is performed when a component or system is not working as expected.
Possible causes include:

 hardware faults
 software faults and issues
 user error
Before proceeding with any maintenance, it is important you are aware of the conditions of any
warranty or service level agreements. With hardware devices you may void the warranty if you
attempt to replace internal hardware components.

Troubleshooting

Identify the possible cause of the problem


Ask questions to help you identify the possible cause. Questions to ask include:

 What are the symptoms?


 Are there any error messages or error tones? Some devices may report the fault and the
action to take.
 Has any new software or hardware been added recently?

Basic checks
some basic checks to perform first include:

 Is the device powered on – check power point is on and power leads are securely seated. If
the device has a power indicator, check it is on.
 Check that signal cables are securely seated.
 If the device is networked, check that the network cable is securely seated.

Hardware faults
If you suspect the problem is with a faulty hardware component, the most common method of testing
is to replace the component with a known good component.

Diagnostic tools

There is a range of diagnostic tools which can aid in troubleshooting. One of the best “tools” is a good
understanding of the processes which occur within a computer system, particularly the boot process
from turning the power switch on, to loading the operating system and software applications.

Power On Self Test (POST)


During POST, the BIOS performs testing of hardware components. If a device is faulty an error
message may be displayed. At this stage you can also check the computer’s BIOS settings to see if
the settings are the cause of the problem.

Operating system diagnostics


Once the operating system is loaded, it will also perform its own hardware test and load device
drivers for peripheral devices. If you are using a Windows operating system, Device Manager reports
on devices connected and their status.

Select computer hardware


When considering the purchase of computer hardware, it is important to firstly identify the needs of
the business. Once the business requirements have been identified, the technical specifications for
the computer hardware device can be used to compare different products.

Business requirements

When selecting computer hardware it is important to firstly identify the tasks the computer hardware is
required to perform. For example, a workstation required for video editing will have different
requirements to a workstation required for standard office applications, such as word processing.
Another example is a server - the processing power and storage capacity of the server will be
determined by the number of users it is required to service.

Warranty

When computer hardware devices are purchased, the supplier provides a guarantee that if a fault
develops in the equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business
needs will be met. Common warranty conditions include:

 The length of the warranty – typically one or more years.


 The actions needed to have the repairs undertaken. Either the repairs will be done on-site or
the equipment will need to be returned to the supplier, known as return-to-base.
 How long the supplier has to make good any required repairs
 Any exclusions to the warranty, such as damage caused to hardware by accidental damage.

Many computer hardware suppliers offer extended warranties at additional cost. For example, the
extended warranty may extend the period of cover from one year to three years. The level of service
purchased by an organisation will depend on how critical the device is to the IT system.

A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.

Organizational policies

Some organizations have a policy of using preferred suppliers for computer hardware purchases.
This ensures the quality and consistency of computer hardware devices is maintained throughout an
organization.

A standard operating environment is a specification for computer hardware and software which
organizations develop to maintain consistency and reduce support costs. Many organizations such
as universities, publish their standard operating environment policies on the internet. For an example,
visit the Edith Cowan University Standard Operating Environment website

Total cost of ownership


The initial purchase price of a computer hardware device is only part of the total cost of the device,
over the lifetime of the device. Additional costs will include:

 costs of hardware and software upgrades


 costs of consumables. For devices such as printers, the cost of replacement print cartridges
over the lifetime of the device can often be greater than the initial purchase price.
 maintenance costs
 cost of technical support
 cost of training

Support

Technical support is provided by manufacturers for users after the purchase of a computer hardware
device. Access to this support is commonly limited to users who have registered the purchase of the
product. Forms of technical support include:

 telephone support
 email support (usually with a guaranteed response time)
 access to support on internet such as:
o frequently asked questions (FAQs)
o troubleshooting guide
o downloads of latest drivers and software updates

Compatibility

Compatibility is the ability of a system or a product to work with other systems or products without
special effort on the part of the customer. One way products achieve interoperability is to comply with
industry interface standards. For example, a memory module is compatible with a motherboard
because the manufacturer of the memory module and the motherboard both work to the same
industry standard.

Technical specifications

Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:

 processing speed of the CPU


 storage capacity of the hard drive
 size of memory (RAM)
 software capabilities
 compatibility with existing systems
 upgradeability

The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:

 interface – USB or network


 resolution – measured in dots per inch
 printing speed – measured in pages per minute
 memory
 paper capacity

Occupational Health and Safety (OH&S) Requirements and safe work


practices
In NSW, the OH&S legislation includes the Occupational Health and Safety Act 2000 and the
Occupational Health and Safety Regulation 2001. Work cover NSW has the responsibility for
administering this legislation.

Employers have a responsibility to provide a safe and healthy workplace for all employees. It also
requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries
to themselves or other workers.

Organizations will develop procedures for safe working practices as a tool for implementing their
OH&S policies and training staff.

For further information click on the following link: Apply occupational health and safety procedures

Manual handling

Computer hardware devices and consumables such as printer paper boxes can be very heavy and
care should be taken when manually handling these objects.

Manual handling is one of the most common causes of accidents in the workplace. Workcover NSW
<<link to http://www.smartmove.nsw.gov.au >>

defines manual handling as:

“any activity that involves lifting, lowering, carrying, pushing, pulling, holding or restraining. It may also
include stretching, bending, sustained and awkward postures, and repetitive movements.”

Recommendations on practices to reduce the risk of manual handling injury at work include:

 hold the load close to your body


 store loads close to where they will be used
 store heavy loads near waist height
 use mechanical aids such a trolley when lifting heavy loads
 don’t lift heavy loads when sitting down

To find the weight of a device refer to the device specifications in the user manual. Always check the
manufacturer’s recommendations before handling.

Safe electrical work practices


Computer hardware should be located close to a suitable electrical outlet. The use of long extension
cords is a trip hazard. If no power outlet is available, a new fixed power outlet may need to be
installed. Any fixed electrical installation is required by law to be installed by a licensed electrician.

Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.

Use switched power boards and not double adapters or piggy backed plugs.

Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.

Testing and tagging refers to the practice of testing electrical equipment (which is designed for
connection by a flexible cord), by an appropriate person. If the equipment is compliant a tag is
attached which is marked with the name of the person or company who performed the test, and the
test date or retest date.

Any component such as a computer power supply which has a mains (240 volt) power connection
can only be opened and repaired by a qualified technician. CRT monitors can have very high
electrical potential levels even after they have been switched off and must only be opened by a
qualified technician.

Electrical circuits for fixed wiring are protected from overload by a circuit breaker. The circuit breaker
will trip if the circuit is overloaded. If this happens, it is an indication that the number of electrical
appliances on that circuit should be reduced.
Instruction LO3- Identifying security threats

There are different ways to monitor threats to the network. Some of them are: -
1. By using software Utilities

2. By using security mechanism

3. By Using encryption facilities

Identifying security threats

Explain why security is important

Computer and network security help to keep data and equipment functioning and
provide access only to appropriate people. Everyone in an organization should give high
priority to security because everyone can be affected by a lapse in security.

Theft, loss, network intrusion, and physical damage are some of the ways a network or
computer can be harmed. Damage or loss of equipment can mean a loss of productivity.
Repairing and replacing equipment can cost the company time and money. Unauthorized
use of a network can expose confidential information and reduce network resources.

Describe security threats

To successfully protect computers and the network, a technician must


understand both types of threats to computer security:

 Physical – Events or attacks that steal, damage, or destroy equipment,


such as servers, switches, and wiring
 Data – Events or attacks that remove, corrupt, deny access, allow
access, or steal information

Threats to security can come from the inside or outside of an organization,


and the level of potential damage can vary greatly:

 Internal – Employees have access to data, equipment, and the network


o Malicious threats are when an employee intends to cause
damage.
o Accidental threats are when the user damages data or equipment
unintentionally.
 External – Users outside of an organization that do not have authorized
access to the network or resources
o Unstructured – Attackers use available resources, such as
passwords or scripts, to gain access and run programs designed
to vandalize
o Structured – Attackers use code to access operating systems and
software

Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are
constantly changing as attackers find new ways to gain entry and commit
their crimes.

After completing this section, you will meet these objectives:

 Define viruses, worms, and Trojans.


 Explain web security.
 Define adware, spyware, and gray ware.
 Explain Denial of Service.
 Explain social engineering.

 Explain TCP/IP attacks.

Define viruses, worms, and Trojans

Viruses

A software virus is a parasitic program written intentionally to alter the way your
computer operates without your permission or knowledge.

A virus attaches copies of itself to other files such as program files or documents and is
inactive until you run an infected program or open an infected document. When
activated, a virus may damage or delete files, cause erratic system behaviour, display
messages or even erase your hard disk.

A virus may spread through email and instant messenger attachments, through infected
files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows.
Worm

A worm is a self-replicating program that is harmful to networks. A worm uses the


network to duplicate its code to the hosts on a network, often without any user
intervention. It is different from a virus because a worm does not need to attach to a
program to infect a host. Even if the worm does not damage data or applications on the
hosts it infects, it is harmful to networks because it consumes bandwidth.

Trojan horse
The Trojan does not need to be attached to other software. Instead, a Trojan threat is
hidden in software that appears to do one thing, and yet behind the scenes it does
another. Trojans are often disguised as useful software. The Trojan program can
reproduce like a virus and spread to other computers.
A Trojan horse is not a virus because it does not replicate and spread like a virus.

Explain web security


Web security is important because so many people visit the World Wide Web every day.
Some of the features that make the web useful and entertaining can also make it
harmful to a computer.

Tools that are used to make web pages more powerful and versatile are: -
 ActiveX – Technology created by Microsoft to control interactivity on web pages. If
ActiveX is on a page, an applet or small program has to be downloaded to gain
access to the full functionality.
 Java – Programming language that allows applets to run within a web browser.
Examples of applets include a calculator or a counter.
 JavaScript – Programming language developed to interact with HTML source code
to allow interactive websites. Examples include a rotating banner or a popup
window.

Attackers may use any of these tools to install a program on a computer. To prevent
against these attacks, most browsers have settings that force the computer user to
authorize the downloading or use of ActiveX, Java, or JavaScript.

Define adware, spyware, and grayware

Adware is a software program that displays advertising on your computer. Adware is


usually distributed with downloaded software. Most often, adware is displayed in a popup
window. Adware popup windows are sometimes difficult to control and will open new
windows faster than users can close them.

Grayware or malware is a file or program other then a virus that is potentially harmful.
Many grayware attacks are phishing attacks that try to persuade the reader to
unknowingly provide attackers with access to personal information. As you fill out an
online form, the data is sent to the attacker. Grayware can be removed using spyware
and adware removal tools.

Spyware, a type of grayware, is similar to adware. It is distributed without any user


intervention or knowledge. Once installed, the spyware monitors activity on the
computer. The spyware then sends this information to the organization responsible for
launching the spyware.

Explain Denial of Service

Denial of service (DoS) is a form of attack that prevents users from accessing normal
services, such as e-mail and a web server, because the system is busy responding to
abnormally large amounts of requests. DoS works by sending enough requests for a
system resource that the requested service is overloaded and ceases to operate.

Common DoS attacks include the following:

 Ping of death – A series of repeated, larger than normal pings that crash the
receiving computer
 E-mail bomb – A large quantity of bulk e-mail that overwhelms the e-mail server
preventing users from accessing it

Distributed DoS (DDoS) is another form of attack that uses many infected computers,
called zombies, to launch an attack. With DDoS, the intent is to obstruct or overwhelm
access to the targeted server. Zombie computers located at different geographical
locations make it difficult to trace the origin of the attack.

Explain social engineering

A social engineer is a person who is able to gain access to equipment or a network by


tricking people into providing the necessary access information. Often, the social
engineer gains the confidence of an employee and convinces the employee to divulge
username and password information.

Here are some basic precautions to help protect against social engineering:

 Never give out your password


 Always ask for the ID of unknown persons
 Restrict access of unexpected visitors
 Escort all visitors
 Never post your password in your work area
 Lock your computer when you leave your desk

Do not let anyone follow you through a door that requires an access card

Explain TCP/IP attacks

TCP/IP is the protocol suite that is used to control all of the communications on the
Internet. Unfortunately, TCP/IP can also make a network vulnerable to attackers.

Identify security procedures

A security plan should be used to determine what will be done in a critical situation.
Security plan policies should be constantly updated to reflect the latest threats to a
network. A security plan with clear security procedures is the basis for a technician to
follow. Security plans should be reviewed on a yearly basis.

There are different security strategies

 Privacy
 Authentication

 Authorization and integrity

Privacy is the ability of an individual or group to seclude themselves or information


about themselves and thereby reveal themselves selectively. The boundaries and
content of what is considered private differ among cultures and individuals, but share
basic common themes.

Authentication is the act of confirming the truth of an attribute of a datum or entity.


Authorization is the process of giving someone permission to do or have something. In
multi-user computer systems, a system administrator defines for the system which users
are allowed access to the system and what privileges of use (such as access to which file
directories, hours of access, amount of allocated storage space, and so forth).

Integrity is a concept of consistency of actions, values, methods, measures, principles,


expectations, and outcomes. In ethics, integrity is regarded as the honesty and
truthfulness or accuracy of one's actions.

There are multiple layers of security in a network, including physical, wireless, and data.
Each layer is subject to security attacks. The technician needs to understand how to
implement security procedures to protect equipment and data.

Explain what is required in a basic local security policy

Though local security policies may vary between organizations, there are questions all
organizations should ask:

 What assets require protection?


 What are the possible threats?
 What to do in the event of a security breach?

A security policy should describe how a company addresses security issues:

 Define a process for handling network security incidents


 Define a process to audit existing network security
 Define a general security framework for implementing network security
 Define behaviors that are allowed
 Define behaviors that are prohibited
 Describe what to log and how to store the logs: Event Viewer, system log files, or
security log files
 Define network access to resources through account permissions
 Define authentication technologies to access data: usernames, passwords,
biometrics, smart cards

Explain the tasks required to protect physical equipment


Physical security is as important as data security. When a computer is taken,
the data is also stolen.

There are several methods of physically protecting computer equipment,

 Control access to facilities


 Use cable locks with equipment

 Keep telecommunication rooms locked

 Fit equipment with security screws


 Use security cages around equipment
 Label and install sensors, such as Radio Frequency Identification (RFID)
tags, on equipment

For access to facilities, there are several means of protection:

 Card keys that store user data, including level of access


 Berg connecters for connecting to a floppy drive
 Biometric sensors that identify physical characteristics of the user, such
as fingerprints or retinas
 Posted security guard

 Sensors, such as RFID tags, to monitor equipment

Describe ways to protect data

The value of physical equipment is often far less than the value of the data it contains.
The loss of sensitive data to a company's competitors or to criminals may be costly. Such
losses may result in a lack of confidence in the company and the dismissal of computer
technicians in charge of computer security. To protect data, there are several methods
of security protection that can be implemented.

Password Protection
Password protection can prevent unauthorized access to content, as shown in Figure 1.
Attackers are able to gain access to unprotected computer data. All computers should be
password protected. Two levels of password protection are recommended:

 BIOS – Prevents BIOS settings from being changed without the appropriate
password
 Login – Prevents unauthorized access to the network
Network logins provide a means of logging activity on the network and either preventing
or allowing access to resources. This makes it possible to determine what resources are
being accessed. Usually, the system administrator defines a naming convention for the
usernames when creating network logins. A common example of a username is the first
initial of the person's first name and then the entire last name. You should keep the
username naming convention simple so that people do not have a hard time
remembering it.

When assigning passwords, the level of password control should match the level of
protection required. A good security policy should be strictly enforced and include, but
not be limited to, the following rules:

 Passwords should expire after a specific period of time.


 Passwords should contain a mixture of letters and numbers so that they cannot
easily be broken.
 Password standards should prevent users from writing down passwords and
leaving them unprotected from public view.
 Rules about password expiration and lockout should be defined. Lockout rules
apply when an unsuccessful attempt has been made to access the system or when
a specific change has been detected in the system configuration.

To simplify the process of administrating security, it is common to assign users to


groups, and then to assign groups to resources. This allows the access capability of users
on a network to be changed easily by assigning or removing the user from various
groups. This is useful when setting up temporary accounts for visiting workers or
consultants, giving you the ability to limit access to resources.

Data Encryption
Encrypting data uses codes and ciphers. Traffic between resources and computers on
the network can be protected from attackers monitoring or recording transactions by
implementing encryption. It may not be possible to decipher captured data in time to
make any use of it.

Virtual Private Network (VPN) uses encryption to protect data. A VPN connection allows a
remote user to safely access resources as if their computer is physically attached to the
local network.

Port Protection
Every communication using TCP/IP is associated with a port number. HTTPS, for instance,
uses port 443 by default. A firewall is a way of protecting a computer from intrusion
through the ports. The user can control the type of data sent to a computer by selecting
which ports will be open and which will be secured. Data being transported on a network
is called traffic.

Data Backups
Data backup procedures should be included in a security plan. Data can be lost or
damaged in circumstances such as theft, equipment failure, or a disaster such as a fire
or flood. Backing up data is one of the most effective ways of protecting against data
loss. Here are some considerations for data backups:

 Frequency of backups – Backups can take a long time. Sometimes it is easier to


make a full backup monthly or weekly, and then do frequent partial backups of any
data that has changed since the last full backup. However, spreading the backups
over many recordings increases the amount of time needed to restore the data.
 Storage of backups – Backups should be transported to an approved offsite
storage location for extra security. The current backup media is transported to the
offsite location on a daily, weekly, or monthly rotation as required by the local
organization.

Security of backups – Backups can be protected with passwords. These passwords


would have to be entered before the data on the backup media could be restored.
Implementing encryption Facilities
One of the most effective ways to eliminate data loss or theft is to encrypt the data as it
travels across the network. However, not all data protection solutions are created equal.
While most solutions offer standard AES 256-bit encryption, there are other attributes
that must be considered:
Some of encryption facilities are: -

Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and
procedures needed to create, manage, distribute, use, store, and revoke digital
certificates.[1] In cryptography, a PKI is an arrangement that binds public keys with
respective user identities by means of a certificate authority (CA). The user identity must
be unique within each CA domain. The binding is established through the registration
and issuance process, which, depending on the level of assurance the binding has, may
be carried out by software at a CA, or under human supervision. The PKI role that
assures this binding is called the Registration Authority (RA). The RA ensures that the
public key is bound to the individual to which it is assigned in a way that ensures non-
repudiation.

Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail
over the Internet. It can also be used to send an encrypted digital signature that lets the
receiver verify the sender's identity and know that the message was not changed en
route. Available both as freeware and in a low-cost commercial version, PGP is the most
widely used privacy-ensuring program by individuals and is also used by many
corporations.
Symmetric and Asymmetric ciphers

In a symmetric cipher, both parties must use the same key for encryption and
decryption. This means that the encryption key must be shared between the two parties
before any messages can be decrypted. Symmetric systems are also known as shared
secret systems or private key systems.
Symmetric ciphers are significantly faster than asymmetric ciphers, but the
requirements for key exchange make them difficult to use.

In an asymmetric cipher, the encryption key and the decryption keys are separate. In an
asymmetric system, each person has two keys. One key, the public key, is shared
publicly. The second key, the private key, should never be shared with anyone.

When you send a message using asymmetric cryptography, you encrypt the message
using the recipients’ public key. The recipient then decrypts the message using his
private key. That is why the system is called asymmetric.

Because asymmetric ciphers tend to be significantly more computationally intensive,


they are usually used in combination with symmetric ciphers to implement effect public
key cryptography. The asymmetric cipher is used to encrypt a session key and the
encrypted session key is then used to encrypt the actual message.

Symmetric ciphers are the oldest and most used cryptographic ciphers. In a symmetric
cipher, the key that deciphers the cipher text is the same as (or can be easily derived
from) the key enciphers the clear text. This key is often referred to as the secret key.
The most widely used symmetric ciphers are DES and AES.

Unlike a symmetric cipher, an asymmetric cipher uses two keys: one key that is kept
secret and known to only one person (the private key) and another key that is public and
available to everyone (the public key). The two keys are mathematically interrelated, but
it's impossible to derive one key from the other. Well-known asymmetric ciphers are the
Diffie-Hellman algorithm, RSA, and DSA.

What are the advantages and disadvantages of using an asymmetric cipher instead of a
symmetric cipher?

 An important advantage of asymmetric ciphers over symmetric ciphers is that no


secret channel is necessary for the exchange of the public key. The receiver needs
only to be assured of the authenticity of the public key. Symmetric ciphers require
a secret channel to send the secret key—generated at one side of the
communication channel—to the other side.
 Asymmetric ciphers also create lesser key-management problems than symmetric
ciphers. Only 2n keys are needed for n entities to communicate securely with one
another. In a system based on symmetric ciphers, you would need n(n ? 1)/2 secret
keys. In a 5000-employee organization, for example, the companywide
deployment of a symmetric crypto-based security solution would require more
than 12 million keys. The deployment of an asymmetric solution would require only
10,000 keys.
 A disadvantage of asymmetric ciphers over symmetric ciphers is that they tend to
be about "1000 times slower." By that, I mean that it can take about 1000 times
more CPU time to process an asymmetric encryption or decryption than a
symmetric encryption or decryption.
 Another disadvantage is that symmetric ciphers can be cracked through a "brute-
force" attack, in which all possible keys are attempted until the right key is found.

Because of these characteristics, asymmetric ciphers are typically used for data
authentication (through digital signatures), for the distribution of a symmetric bulk
encryption key (aka a digital envelope), for non-repudiation services, and for key
agreement. Symmetric ciphers are used for bulk encryption.

Sniffers monitor network data. A sniffer can be a self-contained software program or a


hardware device with the appropriate software or firmware programming. Sniffers
usually act as network probes or "snoops." They examine network traffic, making a copy
of the data without redirecting or altering it. Some sniffers work only with TCP/IP packets,
but the more sophisticated tools can work with many other protocols and at lower levels
including Ethernet frames.
Secure Shell (SSH) is a network protocol for secure data communication, remote shell
services or command execution and other secure network services between two
networked computers that it connects via a secure channel over an insecure network: a
server and a client (running SSH server and SSH client programs, respectively).[1] The
protocol specification distinguishes two major versions that are referred to as SSH-1 and
SSH-2.
Deslogin is a remote login program which may be used safely across insecure networks.
With deslogin, you may log into a secure remote host from a secure local host without
worry about your login password or session information being made visible across the
network. Deslogin is a simple stand-alone client and server, which may be used on
machines which don't have more sophisticated security packages such as SPX or
Kerberos. No centralized key distribution package is required. Unlike unix Login
programs, authentication relies upon arbitrarily long pass phrases rather than eight-
character user passwords.

PKZIP is an archiving tool originally written by Phil Katz and marketed by his company
PKWARE, Inc. The common "PK" prefix used in both PKZIP and PKWARE stands for "Phil
Katz".
Secure Sockets Layer (SSL) a protocol for encrypting information over the Internet
A digital signature or digital signature scheme is a mathematical scheme for
demonstrating the authenticity of a digital message or document. A valid digital
signature gives a recipient reason to believe that the message was created by a known
sender, and that it was not altered in transit. Digital signatures are commonly used for
software distribution, financial transactions, and in other cases where it is important to
detect forgery or tampering.
LO 4: - Establish maintenance practices
4.1 Determining maintenance requirements of equipment specification
Maintenance requirement is the materials or tools that are important to maintain specific
equipment. Maintenance requirement may include but not limited to: -
 Caution
 Attention

Attention is more than just noticing incoming stimuli. It involves a number of processes
including filtering out perceptions, balancing multiple perceptions and attaching
emotional significance to these perceptions.

There are two major forms of attention: passive and active. Passive attention refers to
the involuntary process directed by external events that stand out from their
environment, such as a bright flash, a strong odor, or a sudden loud noise. We might say
that because passive attention is involuntary, it is easy. Active attention is voluntary and
is guided by alertness, concentration, interest and needs such as curiosity and hunger.

4.2. Scheduling Maintenance Procedures


Maintenance Schedule is a plan or procedures that are used to maintain equipment and
it must be programmed with time of intervals. Maintenance schedules including removal
of dust, grease build-up and etc.
Maintenance scheduling can be planed or prepared as:-
 Onsite response
 Remote diagnostic

Onsite response is one of maintenance schedule that display the plan or procedures
from the internet.
Remote diagnostics refers to the ability to evaluate the current status of electronic
equipment from a remote location. The process involves the establishment of some type
of wired or wireless communication between the two points in order for the remote
analysis to take place.
Remote diagnostics is the act of diagnosing a given symptom, issue or problem from a
distance.

4.3 Diagnostic functions


It includes but not limited
 Replacing suspected components
 Upgrade components
 Reloading software’s

Replacing suspected components


Computer hardware or components that can be replaced are: -
 Motherboards
 CMOS battery
 Central processing Unit (CPU)
 Drives (floppy, hard disk, CD-ROM)
 Interface cards
 Fax, modem cards
 RAM

Upgrade components
Computer hardware or components that can be upgrade are: -
 Central processing Unit (CPU)
 RAM

How to Replace a Motherboard

Replacing a motherboard takes a moderate understanding of how the components in


your computer are assembled. Before replacing the motherboard, back up all your
information to ensure it won't get lost, and go to your motherboard's manufacturer to
download any updated drivers that may need to be installed after you install the new
motherboard. This will help ensure that changing your motherboard is a success.
Instructions
1. Unplug all power sources to your computer, and remove the casing from your
computer. Set aside all screws and small pieces in a bowl so nothing will get lost.
2. Remove all the connectors to the motherboard. This may be your video card, data
cables from the hard drives and adapters. Label each one before removing so you
can remember exactly where they will attach on your new motherboard.
3. Take out the old motherboard carefully by removing the screws and sliding it out.
There is generally little clearance on the sides of the motherboard, so use caution
when removing it so nothing gets broken.
4. Compare the new and old motherboards to ensure they're the same. If the new
motherboard has cut-outs for integrated sound or game ports, punch out the holes
so the wires can fit through them. Do this carefully with a Phillips-head screwdriver
or pliers.
5. Place the new motherboard in the case. Double-check to make sure it lines up
properly in the computer case before connecting it. Use the seven screws that are
included to install the motherboard.
6. Attach the adapters, drives and power connectors to the new motherboard. Locate
where you labeled everything before, and install them in the exact same places.
7. Put the computer case back on and turn the power supply back on. If the computer
doesn't start up properly, remove the case and double-check to ensure that all the
adapters, drives and power supply cords are in the correct position and are
tightened securely.
Tips & Warnings

 Avoid creating static electricity charges while you're installing the new
motherboard by wearing a static-free wristband or grounding yourself often
by touching the metal case.

How to Replace a CPU


A computer's central processing unit, or CPU, can be thought of as the computer's brain,
which carries out the majority of the calculations and processes needed to make the
computer run. As computers age, processors may run more slowly due to power surges,
overheating and other stress-induced damage. Replacing a used CPU with a new one can
often increase performance, but it is usually more common to install a CPU upgrade
rather than a straight replacement.
Instructions

Things you’ll need


 Screwdriver(s)
 Replacement CPU
 Thermal grease or other thermal interface material
1. Turn off the computer and unplug all plugs.
2. Open the computer's case and set it on its side.
3. Take off the CPU fan and heat sink. The CPU fan and heat sink will be easy to
locate: look for a large fan on top of a fin-like network of metal attached to the
motherboard. Depending on your heat sink, you may either have to unscrew it, or
undo some plastic clipping mechanisms holding it in place. Sometimes removing
the fan first can make removing the heat sink easier. You will likely have to unplug
the fan from the motherboard.
4. Undo the securing lever on the processor mount to release the old CPU. The CPU
will be held in by a mounting system that is closed when a small lever is pressed
down. Left the lever up and release the CPU.
5. Remove the old CPU.
6. Put the new CPU in place, hold it down with a finger, and close the lever to lock it
in. Do not exert much force on the CPU; you don't have to press hard, but you may
have to wiggle it around a little bit to get it to line up properly before closing the
lever.
7. Apply thermal grease liberally to the CPU. The CPU needs a thermal interface
material between it and the heat sink to transfer heat effectively.
8. Reinstall the heat sink and fan, making sure the thermal grease is touching both
the CPU and the heat sink. Plug the fan back into the motherboard.
9. Close the computer case.
Tips & Warnings

 If you are planning on installing replacement CPU that is different than the
original CPU, make sure your motherboard can use it first.
 The interior of a computer is susceptible to electric shock. Guard against
carrying a dangerous charge. Touch the metal case of the computer at least
every couple of minutes to make sure you don't shock the computer's
components

How to Upgrade a Processor


Upgrading the processor in a computer can be one of the easiest ways to give new life
to an older, slower machine. While the upgrade itself will take little time or effort, there is
significant work that must be done beforehand to ensure that the upgrade is completed
successfully.

Instructions

1. Research the computer that is to receive the new processor. There are many
different processors on the market, and they are not all compatible with a
particular machine. Visit the website of the computer manufacturer. If the
computer was assembled from after-market components, check the website of the
company that manufactured the motherboard, or main circuit board, of the
computer. Find out the processor brand, the processor family, the processor and
bus speeds that the machine supports, the type of processor socket on the board
and the processor cores or revisions that are compatible with the machine.
2. Shop for a compatible processor from either a local retailer or an online store. The
processor must meet all the requirements that your research uncovered, otherwise
it will likely be incompatible with the machine. As soon as the processor is
received, check it against your original order.
3. Install the processor. Disconnect the computer cables and unplug the machine.
Move it to a good work area. Open the side of the machine to obtain access to the
interior. Before going any further, discharge any static electricity from your body
by using a grounding wrist strap or by touching the bare metal of the computer
case.
4. Find the processor. It will be one of the largest objects on the motherboard, near
the center, and it will be covered by a large heat sink and fan. On each side of the
heat sink, there should be a clip or some other fastener securing it to the processor
socket. Gently unhook the clips, taking extreme care not to damage the processor
socket, and then disconnect the power lead that runs from the fan to the
motherboard. The heat sink then can be pulled away from the processor. It may
take some force to separate the heat sink from the processor, depending on the
type of thermal transfer compound used.
5. Examine the processor. On one side of the processor socket, there will be a metal
or plastic arm that is used to secure the processor in the socket. Slide the end of
this arm out from the retaining clip, and lift the arm until it is perpendicular to the
motherboard. The old processor can then be gently pulled out.
6. Look at the processor socket. There should be one corner that has a small, 45-
degree notch, or another distinguishing mark, cut into it. The processor should
have a similar mark. Rotate the processor until the mark is in the same corner as
the mark on the socket. Once the processor is orientated correctly, line up the pins
and slide the processor into the socket. This should require no force at all. If force
is used, the processor pins may be bent and the processor permanently damaged.
With the processor seated in the socket, the retaining arm may be lowered and
clipped into position.
7. Install the heat sink and fan assembly with a thin layer of thermal compound or a
thermal pad between it and the processor. This step transfers heat away from the
processor to the heat sink, preventing the processor from overheating. With the
heat sink in place, plug the power lead from the fan back into the motherboard.
8. Close the computer. Reconnect the components and test the new upgrade. When
everything is done, the computer should be noticeably faster, and it will be able to
handle more robust applications and games than it could previously.

4.4 Configuring security setting


There are mechanisms that are used to configure security. Some of them are: -
 Install firewall
 Install antivirus
 Install anti-malware
 Install anti-spyware

How to Install Windows XP Firewall

Instruction

1. To get started first click start and open the control panels network connection icon.
Click network and Internet Connections. Click the windows firewall icon which
should be clearly visible.
2. This brings up the windows firewall dialog box. Click the "On" button. This button
will stop all intruders from gaining access to your computer. Now click the
exceptions tab on top. Put a check mark
next to anything there that you wish to use. For example checking file and print
share will allow other computers to gain access to your computer and share files
and the printer.
3. Once you've checked off what you wish to allow click OK and the firewall is set!
4. Windows firewall inadequate? Some computer users like a second line of defense
while on the Internet. Click on over to Cnets downloads.com to check out their top
free personal computer firewalls. Popular firewalls include Zone Alarm and PC Tools
Firewalls. Both are free to download.

You might also like