SlideShare a Scribd company logo
1 of 60
Maintain Computer
Equipment and
Systems
In this lesson, you should be able to:
● Define security, back-up and virus check;
● ensure the security of data, including regular
back-ups and virus checks in accordance with
standard operating procedures;
● explain the importance of backing up files and
virus check; and
● perform basic file maintenance procedure in line
with the standard operating procedure.
Contact Centers hold data like client
information. These are vital information that
need to be protected and secured. A security
breach could cause big damage if these data
were accessed without authorization.
Therefore, it is a must that these data be
protected and that systems and equipment
where these data are stored be maintained to
the highest level of security.
•Technical term
Back up- duplicate copies of files
Data security- protecting data for from
damage, alteration, or loss
Virus- program that damage computer
system
Learn about It!
Data is one of the most important assets
of a contact center. It relies heavily on data
bases containing client and transaction
information. Using data has a very big
impact in the operations and success of a
contact center. This makes it very
important for contact centers to take data
security seriously.
Data security as part of the maintenance
of computer systems and equipment in
contact centers should be done. This
will prevent data from unauthorized,
intentional or accidental destruction,
modification and disclosure.
Overall, data security is an essential
aspect of modern business and personal
life, and it requires a comprehensive
approach that includes both technical
and non-technical measures
Importance of Data Security
● It protects data that the company
collects, stores, creates, send and receive.
● To comply with existing regulations and
laws on data security.
● To keep the data updated and compatible
with changing technologies.
Different Types of Data Security
Technologies
● Data Encryption protects data with
codes that is attached to every piece of
data and will require an authorization
key to be accessed.
● Data Masking is covering up or replacing
specific areas of the data (e.g. using special
symbols like asterisks) to protect it from
external or internal malicious personnel
who may potentially use the data. For
example, the first digit of a credit card
number will be replaced with a asterisks.
● Data Erasure is done when an
information or data is not anymore
active and needs to be removed from
the system. For example, if a client
requests that his/her information be
removed from a mailing list, the details
will be removed permanently
● Data Resilience is creating backup
copies of data. These back-ups will only
be accessed when there is a need for
data recovery during times when data
are accidentally erased or corrupted.
Some common methods used to ensure
data security include:
Encryption: This involves converting
sensitive data into a code that is unreadable
without a key or password. Encryption can
be used to protect data both in transit (i.e.,
when being transmitted over a network)
and at rest (i.e., when stored on a device or
server).
Access controls: These are
mechanisms that limit who can access
certain data and under what
circumstances. Access controls can
include passwords, multi-factor
authentication, biometric authentication,
and role-based access controls.
Firewalls: Firewalls are software or
hardware-based systems that control
network traffic by filtering out unwanted
traffic and allowing only authorized
traffic to pass through.
Backup and recovery: Regularly backing
up data and storing it in secure locations
can help prevent data loss due to natural
disasters, cyberattacks, or other unforeseen
events. Additionally, having a plan in place
for recovering data in the event of a
disaster is critical to ensuring business
continuity.
Security awareness training:
Educating employees on best practices
for data security, such as avoiding
phishing scams, using strong passwords,
and keeping software up-to-date, can
help prevent security breaches caused by
human error.
What do you think?
Why do you think that even in the
advancement in computer and
internet technology, the issue of data
security is more important than ever?
Ways to Keep Data Secured
● Identify what data you have and
where you keep them.
● Train the staff in data security
including an orientation of data privacy
and security.
● Maintain a list of people with
access to sensitive and confidential
data. It is best to create a system of
data access and if better minimize
the list.
● Implement a data risk assessment
to identify potential danger to your
organization’s data like virus attacks,
malwares or unauthorized access
and breach.
● Install trustworthy malware and
antivirus software and be sure to
conduct regular scans.
● Implement a system of regular
backing up of files.
What do you think are the
advantages of organizing your
data in helping promote data
security?
Backing up Files
Backing up of files is important
especially when there is a security breach
wherein data has been intentionally
damaged, deleted, or lost.
Therefore, as a responsible computer
user, you need to apply a system to
backup files when something goes
wrong. Software's can be reinstalled but
data can be lost forever due to machine
breakdown, virus, power outage,
software upgrades.
It can also be due to natural and
manmade calamities such as fire,
earthquakes, and human error.
A back-up is a duplicate copy of a file,
program, folder, or storage if the
original is damaged, corrupted or lost.
The backup is used to restore data into
its original location in the system. There
are two types of back up, namely:
full backup, which is backing up
everything on the computer system. It
includes data, programs and even the
operating system.
while an incremental backup is a
backup of only those that have changed
since the last backup.
The idea of backup is keeping all your
data organized. This will help simplify
the backup process.
The best way is to store data in a single
location so when backing up, you do not
have to search for everything.
• It is also better to organized data and
classify them in a single location
according to type, use or data of access
or creation. This will help you choose
which to backup first in order of
importance.
• If your operating system provides a
backup feature. It is best to set a
regular incremental backup maybe on a
daily basis or a full backup at least
monthly.
• If you are someone who cannot get in
the habit of backing up, this will be
useful. You can also make use of
software packages for backing up.
•Why is backing up files very
important especially in contact
centers?
• Computer Virus Computer Virus is a
malicious program that replicates
itself by copying and embedding itself
to another program.
• It is spread through other executable
programs or documents like emails.
The purpose of virus varies from
gaining administrative access and
control to steal sensitive data or just
merely cause damage to the system.
•Hackers spread viruses using any of the
following means:
•● concealing using it like useful or friendly
programs
•● as an attachment to emails that trick
users
•● visiting infected websites
•
• ● clicking on an executable file
•● visiting an infected online
advertisements
•● through removable storage devices
such as flash drives
• Effects of virus are the following:
•● infecting resources or system software
•● modifying or deleting key functions or
applications
•● copying/deleting or encrypting data
causing damage
•What do you think?
Why is there a wide spread
proliferation of computer viruses in
the internet ?
• Types of Computer Viruses Computer
viruses comes in different forms that
infect systems.
•They can be any of the following:
• ● Boot Sector Virus destroys the master
boot record, preventing the computer
from starting or opening. It spreads
mostly through removable media like USB
drives. It is a very difficult task of
removing this type of virus for most of
the time it will require the system to be
formatted.
• ● Direct Action Virus is also known as a
non-resident virus which means it stays
hidden in the memory of the computer
and selects files to infect whenever a code
is executed.
•● Resident Virus unlike the direct action
type, this gets installed in the computer
which makes it difficult to identify and
even remove.
• ● Multipartite Virus spreads through
multiple ways like infecting the boot
sector and executable files at the same
time.
•● Polymorphic Virus are difficult to
identify since it changes into a different
form whenever it replicates.
•● Overwrite Virus deletes files it infects
which requires the file to be deleted to be
removed also losing the original file.
•● Space filler Virus also known as
“Cavity Virus” because they occupy the
empty spaces between codes but does not
create damage to the file.
•● File Infectors are attached with
program files of which when the file is
executed the virus is also loaded
causing damage to the computer. These
virus types are usually attached to
emails.
•Being Safe from Email Viruses
Here are some ways to do to be safe from
any virus infection:
● Use a professional email service.
● Screen emails first before opening them.
● Make sure that your system has an
updated anti-virus software.
● Disable message preview in emails
since some virus executes automatically
as you preview your email message.
● Ignore or delete messages with
attachments especially coming from
subscriptions not made.
● Be cautious in opening media such as
images and videos since some viruses
disguise as such files.
● Do not open email attachments unless
you know who it came from.
• ● Avoid downloading executable or
documents from the Internet, especially
those coming from malicious sites.
•● Never open file with double extensions.
This is a typical sign of a virus program.
•● Do not send or forward files you have
not virus-checked first.
Signs of Virus Infections To be guided,
here are some signs that your system needs
to be checked for virus infection:
● new files or programs in the computer
● files or folders missing or getting deleted
● programs running on their own even if
they are not executed
● files having multiple copies on their
own
● slow system performance
● pop-ups keeps on opening on the
screen
Handling Virus Infection If you suspect
that your system has a virus infection,
you may do the following:
● Run an antivirus software, but just
make sure that it is updated.
● Immediately stop all commands and
downloads.
● Go to safe mode then run the
antivirus. In safe mode, most programs
are not running.
● Remove the Internet connection to
avoid the virus from spreading.
● Delete temporary files for this helps
speed up the virus scan.
Thank you!!! 
Good luck and see you next
school year…

More Related Content

Similar to LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx

security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxgitagrimston
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
Week 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxWeek 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxMateuszSarat1
 

Similar to LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx (20)

Computer security
Computer securityComputer security
Computer security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
презентация1
презентация1презентация1
презентация1
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
Week 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxWeek 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

More from mahaliacaraan

Pies-and-Pastries presentation- LESSON 4.pptx
Pies-and-Pastries  presentation- LESSON 4.pptxPies-and-Pastries  presentation- LESSON 4.pptx
Pies-and-Pastries presentation- LESSON 4.pptxmahaliacaraan
 
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdf
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdfYellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdf
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdfmahaliacaraan
 
Food-Presentation_20230904_003719_0000.pptx
Food-Presentation_20230904_003719_0000.pptxFood-Presentation_20230904_003719_0000.pptx
Food-Presentation_20230904_003719_0000.pptxmahaliacaraan
 
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...mahaliacaraan
 
Pies-and-Pastries - LESSON 1 Mes in Place.pptx
Pies-and-Pastries - LESSON 1 Mes in Place.pptxPies-and-Pastries - LESSON 1 Mes in Place.pptx
Pies-and-Pastries - LESSON 1 Mes in Place.pptxmahaliacaraan
 
CURRICULUM DEVELOPMENT for thursday class (1).pptx
CURRICULUM DEVELOPMENT for thursday class (1).pptxCURRICULUM DEVELOPMENT for thursday class (1).pptx
CURRICULUM DEVELOPMENT for thursday class (1).pptxmahaliacaraan
 
FOOD AND BEVERAGE INTRODUCTION.pptx
FOOD AND BEVERAGE INTRODUCTION.pptxFOOD AND BEVERAGE INTRODUCTION.pptx
FOOD AND BEVERAGE INTRODUCTION.pptxmahaliacaraan
 
MAED CUR.DEV.-REPORT-1 - Copy.pptx
MAED CUR.DEV.-REPORT-1 - Copy.pptxMAED CUR.DEV.-REPORT-1 - Copy.pptx
MAED CUR.DEV.-REPORT-1 - Copy.pptxmahaliacaraan
 
Major_Hardware_Components_of_a_Computer_System.pptx
Major_Hardware_Components_of_a_Computer_System.pptxMajor_Hardware_Components_of_a_Computer_System.pptx
Major_Hardware_Components_of_a_Computer_System.pptxmahaliacaraan
 
MENSU._AND_CALCUL.__PRT_1.pptx
MENSU._AND_CALCUL.__PRT_1.pptxMENSU._AND_CALCUL.__PRT_1.pptx
MENSU._AND_CALCUL.__PRT_1.pptxmahaliacaraan
 
PREPARING_DESSERT_and_SWEET_SAUCE.pptx
PREPARING_DESSERT_and_SWEET_SAUCE.pptxPREPARING_DESSERT_and_SWEET_SAUCE.pptx
PREPARING_DESSERT_and_SWEET_SAUCE.pptxmahaliacaraan
 
TABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxTABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxmahaliacaraan
 
TABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxTABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxmahaliacaraan
 
Lesson-2-PPT (1).pptx
Lesson-2-PPT (1).pptxLesson-2-PPT (1).pptx
Lesson-2-PPT (1).pptxmahaliacaraan
 
NUTRITINAL VALUE & OF HOT AND COLD APPETIZER.pptx
NUTRITINAL VALUE &  OF HOT AND COLD APPETIZER.pptxNUTRITINAL VALUE &  OF HOT AND COLD APPETIZER.pptx
NUTRITINAL VALUE & OF HOT AND COLD APPETIZER.pptxmahaliacaraan
 
Kitchen Equipment MS.ppt
Kitchen Equipment MS.pptKitchen Equipment MS.ppt
Kitchen Equipment MS.pptmahaliacaraan
 
classification of vegetable
classification of vegetableclassification of vegetable
classification of vegetablemahaliacaraan
 
Fish Processing.pptx
Fish Processing.pptxFish Processing.pptx
Fish Processing.pptxmahaliacaraan
 

More from mahaliacaraan (20)

Pies-and-Pastries presentation- LESSON 4.pptx
Pies-and-Pastries  presentation- LESSON 4.pptxPies-and-Pastries  presentation- LESSON 4.pptx
Pies-and-Pastries presentation- LESSON 4.pptx
 
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdf
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdfYellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdf
Yellow-Modern-Food-Cooking-Tutorial-Youtube-Thumbnail_20230830_161751_0000.pdf
 
Food-Presentation_20230904_003719_0000.pptx
Food-Presentation_20230904_003719_0000.pptxFood-Presentation_20230904_003719_0000.pptx
Food-Presentation_20230904_003719_0000.pptx
 
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...
Brown Creative Simple Illustration Minimalist Baked Bread Halal Food Presenta...
 
Pies-and-Pastries - LESSON 1 Mes in Place.pptx
Pies-and-Pastries - LESSON 1 Mes in Place.pptxPies-and-Pastries - LESSON 1 Mes in Place.pptx
Pies-and-Pastries - LESSON 1 Mes in Place.pptx
 
CURRICULUM DEVELOPMENT for thursday class (1).pptx
CURRICULUM DEVELOPMENT for thursday class (1).pptxCURRICULUM DEVELOPMENT for thursday class (1).pptx
CURRICULUM DEVELOPMENT for thursday class (1).pptx
 
FOOD AND BEVERAGE INTRODUCTION.pptx
FOOD AND BEVERAGE INTRODUCTION.pptxFOOD AND BEVERAGE INTRODUCTION.pptx
FOOD AND BEVERAGE INTRODUCTION.pptx
 
MAED CUR.DEV.-REPORT-1 - Copy.pptx
MAED CUR.DEV.-REPORT-1 - Copy.pptxMAED CUR.DEV.-REPORT-1 - Copy.pptx
MAED CUR.DEV.-REPORT-1 - Copy.pptx
 
Major_Hardware_Components_of_a_Computer_System.pptx
Major_Hardware_Components_of_a_Computer_System.pptxMajor_Hardware_Components_of_a_Computer_System.pptx
Major_Hardware_Components_of_a_Computer_System.pptx
 
MENSU._AND_CALCUL.__PRT_1.pptx
MENSU._AND_CALCUL.__PRT_1.pptxMENSU._AND_CALCUL.__PRT_1.pptx
MENSU._AND_CALCUL.__PRT_1.pptx
 
PREPARING_DESSERT_and_SWEET_SAUCE.pptx
PREPARING_DESSERT_and_SWEET_SAUCE.pptxPREPARING_DESSERT_and_SWEET_SAUCE.pptx
PREPARING_DESSERT_and_SWEET_SAUCE.pptx
 
TABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxTABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptx
 
TABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptxTABLE_SERVICE_PROCEDURE.pptx
TABLE_SERVICE_PROCEDURE.pptx
 
Lesson-2-PPT (1).pptx
Lesson-2-PPT (1).pptxLesson-2-PPT (1).pptx
Lesson-2-PPT (1).pptx
 
NUTRITINAL VALUE & OF HOT AND COLD APPETIZER.pptx
NUTRITINAL VALUE &  OF HOT AND COLD APPETIZER.pptxNUTRITINAL VALUE &  OF HOT AND COLD APPETIZER.pptx
NUTRITINAL VALUE & OF HOT AND COLD APPETIZER.pptx
 
lesson 1.pptx
lesson 1.pptxlesson 1.pptx
lesson 1.pptx
 
Kitchen Equipment MS.ppt
Kitchen Equipment MS.pptKitchen Equipment MS.ppt
Kitchen Equipment MS.ppt
 
classification of vegetable
classification of vegetableclassification of vegetable
classification of vegetable
 
SEAFOODS PPT 1.pptx
SEAFOODS PPT 1.pptxSEAFOODS PPT 1.pptx
SEAFOODS PPT 1.pptx
 
Fish Processing.pptx
Fish Processing.pptxFish Processing.pptx
Fish Processing.pptx
 

Recently uploaded

How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx

  • 2. In this lesson, you should be able to: ● Define security, back-up and virus check; ● ensure the security of data, including regular back-ups and virus checks in accordance with standard operating procedures; ● explain the importance of backing up files and virus check; and ● perform basic file maintenance procedure in line with the standard operating procedure.
  • 3.
  • 4. Contact Centers hold data like client information. These are vital information that need to be protected and secured. A security breach could cause big damage if these data were accessed without authorization. Therefore, it is a must that these data be protected and that systems and equipment where these data are stored be maintained to the highest level of security.
  • 5.
  • 6. •Technical term Back up- duplicate copies of files Data security- protecting data for from damage, alteration, or loss Virus- program that damage computer system
  • 7. Learn about It! Data is one of the most important assets of a contact center. It relies heavily on data bases containing client and transaction information. Using data has a very big impact in the operations and success of a contact center. This makes it very important for contact centers to take data security seriously.
  • 8. Data security as part of the maintenance of computer systems and equipment in contact centers should be done. This will prevent data from unauthorized, intentional or accidental destruction, modification and disclosure.
  • 9. Overall, data security is an essential aspect of modern business and personal life, and it requires a comprehensive approach that includes both technical and non-technical measures
  • 10. Importance of Data Security ● It protects data that the company collects, stores, creates, send and receive. ● To comply with existing regulations and laws on data security. ● To keep the data updated and compatible with changing technologies.
  • 11. Different Types of Data Security Technologies ● Data Encryption protects data with codes that is attached to every piece of data and will require an authorization key to be accessed.
  • 12.
  • 13. ● Data Masking is covering up or replacing specific areas of the data (e.g. using special symbols like asterisks) to protect it from external or internal malicious personnel who may potentially use the data. For example, the first digit of a credit card number will be replaced with a asterisks.
  • 14.
  • 15. ● Data Erasure is done when an information or data is not anymore active and needs to be removed from the system. For example, if a client requests that his/her information be removed from a mailing list, the details will be removed permanently
  • 16.
  • 17. ● Data Resilience is creating backup copies of data. These back-ups will only be accessed when there is a need for data recovery during times when data are accidentally erased or corrupted.
  • 18. Some common methods used to ensure data security include: Encryption: This involves converting sensitive data into a code that is unreadable without a key or password. Encryption can be used to protect data both in transit (i.e., when being transmitted over a network) and at rest (i.e., when stored on a device or server).
  • 19. Access controls: These are mechanisms that limit who can access certain data and under what circumstances. Access controls can include passwords, multi-factor authentication, biometric authentication, and role-based access controls.
  • 20. Firewalls: Firewalls are software or hardware-based systems that control network traffic by filtering out unwanted traffic and allowing only authorized traffic to pass through.
  • 21. Backup and recovery: Regularly backing up data and storing it in secure locations can help prevent data loss due to natural disasters, cyberattacks, or other unforeseen events. Additionally, having a plan in place for recovering data in the event of a disaster is critical to ensuring business continuity.
  • 22. Security awareness training: Educating employees on best practices for data security, such as avoiding phishing scams, using strong passwords, and keeping software up-to-date, can help prevent security breaches caused by human error.
  • 23. What do you think? Why do you think that even in the advancement in computer and internet technology, the issue of data security is more important than ever?
  • 24. Ways to Keep Data Secured ● Identify what data you have and where you keep them. ● Train the staff in data security including an orientation of data privacy and security.
  • 25. ● Maintain a list of people with access to sensitive and confidential data. It is best to create a system of data access and if better minimize the list.
  • 26. ● Implement a data risk assessment to identify potential danger to your organization’s data like virus attacks, malwares or unauthorized access and breach.
  • 27. ● Install trustworthy malware and antivirus software and be sure to conduct regular scans. ● Implement a system of regular backing up of files.
  • 28. What do you think are the advantages of organizing your data in helping promote data security?
  • 29. Backing up Files Backing up of files is important especially when there is a security breach wherein data has been intentionally damaged, deleted, or lost.
  • 30. Therefore, as a responsible computer user, you need to apply a system to backup files when something goes wrong. Software's can be reinstalled but data can be lost forever due to machine breakdown, virus, power outage, software upgrades.
  • 31. It can also be due to natural and manmade calamities such as fire, earthquakes, and human error.
  • 32. A back-up is a duplicate copy of a file, program, folder, or storage if the original is damaged, corrupted or lost.
  • 33. The backup is used to restore data into its original location in the system. There are two types of back up, namely:
  • 34. full backup, which is backing up everything on the computer system. It includes data, programs and even the operating system. while an incremental backup is a backup of only those that have changed since the last backup.
  • 35. The idea of backup is keeping all your data organized. This will help simplify the backup process. The best way is to store data in a single location so when backing up, you do not have to search for everything.
  • 36. • It is also better to organized data and classify them in a single location according to type, use or data of access or creation. This will help you choose which to backup first in order of importance.
  • 37. • If your operating system provides a backup feature. It is best to set a regular incremental backup maybe on a daily basis or a full backup at least monthly.
  • 38. • If you are someone who cannot get in the habit of backing up, this will be useful. You can also make use of software packages for backing up.
  • 39. •Why is backing up files very important especially in contact centers?
  • 40. • Computer Virus Computer Virus is a malicious program that replicates itself by copying and embedding itself to another program.
  • 41. • It is spread through other executable programs or documents like emails. The purpose of virus varies from gaining administrative access and control to steal sensitive data or just merely cause damage to the system.
  • 42. •Hackers spread viruses using any of the following means: •● concealing using it like useful or friendly programs •● as an attachment to emails that trick users •● visiting infected websites •
  • 43. • ● clicking on an executable file •● visiting an infected online advertisements •● through removable storage devices such as flash drives
  • 44. • Effects of virus are the following: •● infecting resources or system software •● modifying or deleting key functions or applications •● copying/deleting or encrypting data causing damage
  • 45. •What do you think? Why is there a wide spread proliferation of computer viruses in the internet ?
  • 46. • Types of Computer Viruses Computer viruses comes in different forms that infect systems. •They can be any of the following:
  • 47. • ● Boot Sector Virus destroys the master boot record, preventing the computer from starting or opening. It spreads mostly through removable media like USB drives. It is a very difficult task of removing this type of virus for most of the time it will require the system to be formatted.
  • 48. • ● Direct Action Virus is also known as a non-resident virus which means it stays hidden in the memory of the computer and selects files to infect whenever a code is executed. •● Resident Virus unlike the direct action type, this gets installed in the computer which makes it difficult to identify and even remove.
  • 49. • ● Multipartite Virus spreads through multiple ways like infecting the boot sector and executable files at the same time. •● Polymorphic Virus are difficult to identify since it changes into a different form whenever it replicates.
  • 50. •● Overwrite Virus deletes files it infects which requires the file to be deleted to be removed also losing the original file. •● Space filler Virus also known as “Cavity Virus” because they occupy the empty spaces between codes but does not create damage to the file.
  • 51. •● File Infectors are attached with program files of which when the file is executed the virus is also loaded causing damage to the computer. These virus types are usually attached to emails.
  • 52. •Being Safe from Email Viruses Here are some ways to do to be safe from any virus infection: ● Use a professional email service. ● Screen emails first before opening them. ● Make sure that your system has an updated anti-virus software.
  • 53. ● Disable message preview in emails since some virus executes automatically as you preview your email message. ● Ignore or delete messages with attachments especially coming from subscriptions not made.
  • 54. ● Be cautious in opening media such as images and videos since some viruses disguise as such files. ● Do not open email attachments unless you know who it came from.
  • 55. • ● Avoid downloading executable or documents from the Internet, especially those coming from malicious sites. •● Never open file with double extensions. This is a typical sign of a virus program. •● Do not send or forward files you have not virus-checked first.
  • 56. Signs of Virus Infections To be guided, here are some signs that your system needs to be checked for virus infection: ● new files or programs in the computer ● files or folders missing or getting deleted ● programs running on their own even if they are not executed
  • 57. ● files having multiple copies on their own ● slow system performance ● pop-ups keeps on opening on the screen
  • 58. Handling Virus Infection If you suspect that your system has a virus infection, you may do the following: ● Run an antivirus software, but just make sure that it is updated. ● Immediately stop all commands and downloads.
  • 59. ● Go to safe mode then run the antivirus. In safe mode, most programs are not running. ● Remove the Internet connection to avoid the virus from spreading. ● Delete temporary files for this helps speed up the virus scan.
  • 60. Thank you!!!  Good luck and see you next school year…