Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

CHAPTER4

SECURITY TROUBLESHOOTING AND SOLUTIONS

4.1.1 Apply the Troubleshooting Process to Security


Troubleshooting Process
 The troubleshooting process is used to help resolve security issues.
 Use the troubleshooting steps as a guideline to help you diagnose
and repair problems :

 Computer technicians must be able to analyze a security threat


and determine the appropriate method to protect assets and
repair damage.
Troubleshooting Process cont..
 Step 1: Identify the Problem
Troubleshooting Process cont..
 Step 2: Establish a Theory of Probable Cause
 After you have talked to the customer, you can establish a
theory of probable causes
 Create a list of the most common causes of security
problems:
Troubleshooting Process cont..
 Step 3: Test the Theory to Determine Cause
 Test theories of probable cause one at a time, starting with
the quickest and easiest.

 If the exact cause of the problem has not been determined


after all theories have been tested, establish a new theory
of probable cause and test it.
Troubleshooting Process cont..
 Step 4: Establish a Plan of Action to Resolve the Problem and
Implement the Solution
 After determining the exact cause of the problem, establish
a plan of action to resolve the problem and implement a
solution.
 Sometimes quick procedures can determine the exact
cause of the problem or even correct the problem.
 If a quick procedure does not correct the problem, you
might need to research the problem further to establish the
exact cause.
Troubleshooting Process cont..
 Step 5: Verify Full System Functionality And Implement Any
Preventive Measures
 Verify full system functionality and implement any preventive
measures if needed.

 Have the customer verify the solution and system


functionality.
Troubleshooting Process cont..
 Step 6: Document your findings, actions and outcomes
 List of the tasks required to document the problem and the
solution.
CHAPTER4
SECURITY TROUBLESHOOTING AND SOLUTIONS

4.1.2 Identify Common Problem and Solutions for Security


4.1.2 Common Problems and Solutions
 Security problems can be attributed to
hardware, software, or connectivity issues, or
some combination of the three.
 The figure is a chart of common security
problems and solutions
4.1.2 Common Problems and Solutions cont..
4.1.2 Common Problems and Solutions cont..
4.1.2 Common Problems and Solutions cont..

You might also like