The document discusses the troubleshooting process for security issues. It describes the six steps of the process: (1) identify the problem, (2) establish a probable cause, (3) test the theory, (4) establish a plan of action, (5) verify functionality and implement preventative measures, and (6) document findings. It also provides a chart of common security problems such as viruses, malware, and hacking along with potential solutions.
The document discusses the troubleshooting process for security issues. It describes the six steps of the process: (1) identify the problem, (2) establish a probable cause, (3) test the theory, (4) establish a plan of action, (5) verify functionality and implement preventative measures, and (6) document findings. It also provides a chart of common security problems such as viruses, malware, and hacking along with potential solutions.
The document discusses the troubleshooting process for security issues. It describes the six steps of the process: (1) identify the problem, (2) establish a probable cause, (3) test the theory, (4) establish a plan of action, (5) verify functionality and implement preventative measures, and (6) document findings. It also provides a chart of common security problems such as viruses, malware, and hacking along with potential solutions.
4.1.1 Apply the Troubleshooting Process to Security
Troubleshooting Process The troubleshooting process is used to help resolve security issues. Use the troubleshooting steps as a guideline to help you diagnose and repair problems :
Computer technicians must be able to analyze a security threat
and determine the appropriate method to protect assets and repair damage. Troubleshooting Process cont.. Step 1: Identify the Problem Troubleshooting Process cont.. Step 2: Establish a Theory of Probable Cause After you have talked to the customer, you can establish a theory of probable causes Create a list of the most common causes of security problems: Troubleshooting Process cont.. Step 3: Test the Theory to Determine Cause Test theories of probable cause one at a time, starting with the quickest and easiest.
If the exact cause of the problem has not been determined
after all theories have been tested, establish a new theory of probable cause and test it. Troubleshooting Process cont.. Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution After determining the exact cause of the problem, establish a plan of action to resolve the problem and implement a solution. Sometimes quick procedures can determine the exact cause of the problem or even correct the problem. If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause. Troubleshooting Process cont.. Step 5: Verify Full System Functionality And Implement Any Preventive Measures Verify full system functionality and implement any preventive measures if needed.
Have the customer verify the solution and system
functionality. Troubleshooting Process cont.. Step 6: Document your findings, actions and outcomes List of the tasks required to document the problem and the solution. CHAPTER4 SECURITY TROUBLESHOOTING AND SOLUTIONS
4.1.2 Identify Common Problem and Solutions for Security
4.1.2 Common Problems and Solutions Security problems can be attributed to hardware, software, or connectivity issues, or some combination of the three. The figure is a chart of common security problems and solutions 4.1.2 Common Problems and Solutions cont.. 4.1.2 Common Problems and Solutions cont.. 4.1.2 Common Problems and Solutions cont..