introduction to a productive and secure technology environment. · 2016-11-03 · introduction to a...

22
[email protected] Precision Electronics and Technology, LLC. 0 Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology, LLC

Upload: others

Post on 26-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

0

Introduction to a Productive and Secure Technology

Environment.

Precision Electronics

and Technology, LLC

Page 2: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

1

Computer Categories

1. Computers: Categories

1. Microcomputer Systems: Personal Computers or PCs. Include Workstations and Servers.

2. Midrange Systems High-end computers/servers that handle large-scale processing of business applications

3. Mainframe Systems Large, fast, powerful. Enterprise level transaction processing, complex calculation and data storage

Page 3: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

2

All computers follow the Input-Process-Output model.

2. Computer Fundamental: Input – Process - Output

1. The INPUT stage involves putting data into the system.

2. The PROCESS stage involves doing something with the data.

3. The OUTPUT stage involves presenting the processed information.

The STORAGE stage keeps data when the computer is switched off.

Page 4: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

3

Computer Hardware: The Physical Parts of a Computer.

3. Computer Hardware: The Inside

• There isn't any single part called The Computer.

• The computer is a system of many individual parts working together.

Page 5: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

4

Peripherals are the external components used to control and communicate with the computer

− Keyboard

− Mouse

− Display

− Printer

− Camera

− Scanner

− External Storage

3. Computer Hardware: The Outside

Page 6: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

5

3. Computer Hardware: Configurations

Desktop / Tower Computing Power Easily Upgraded Easily Customized Easily Repaired Cost Effective Durable

Laptop . Portability - Mobility Size / Weight / Power

All-in-One . Reduced Footprint Reduced Cable Clutter Touch Screen Capable

How Will You Use it?

Page 7: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

6

3. Computer Hardware: Configurations

PC / Windows - Price - Flexibility - S/W Availability - All Purpose

Apple / Mac - Security - Usability - Design / User

Interface - Genius Bar - Video / Audio /

Photo

Windows PCs have a vast library of software for essentially every purpose. Macs have less of a collection, however, Apple is best known for software written specifically for the creative professional market, including journalism and desktop publishing, video editing and audio editing. In addition, there have been inroads into the educative and scientific research sectors.

Page 8: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

7

Software: the instructions, or programs, that tell the hardware what to do and how to do it

Operating System Runs the Hardware

- Windows - OS/X (Mac) - Linux - Android - iOS - Device Drivers

4. Computer Software: Collection of Instructions

Application Tasks you Perform

- Word - Excel - PowerPoint - Access - QuickBooks - Games - Programming

Languages

Utility Management

- Anti Virus - Compression - Disk Clean-Up - Encryption - Screen Saver - Back-Up

User

Application

Operating System

Hardware

Page 9: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

8

4. Software: Tools

Finance & Accounting - QuickBooks - Quicken - TurboTax

Software Tools for Home or to Help Run a Small Business.

Productivity - MS Office - Google Docs - OpenOffice

Backup and Recovery - CrashPlan - Acronis - Carbonite

Email - Outlook - Thunderbird - GMail

Social Networking - LinkedIn - FaceBook - Google+

Other - Streaming TV / Music - Gaming

Page 10: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

9

Network: Two or More Computer Systems Linked Together

Local Area Network (LAN) - Share Resources - Exchange Data - Peer-to-Peer - Client-Server - Wired or Wireless

5. Networking and The Internet

Peer-to-Peer

Network

Page 11: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

10

The Internet is a vast network connecting millions of computers and electronic devices across the globe

• Began in 1969 as DoD project

• World Wide Web • Internet Service Provider

• Modem

• Firewall

• Router

• Switch

5. Networking and The Internet

Page 12: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

11

6. The Cloud

The Cloud: Storing and Accessing Data and Applications over the Internet

Backup / DR

Virtual

Desktop Web / App

Hosting e-mail

Cloud

Storage

Tradeoff: Capital Expenditure vs. Operational Expenditure

Page 13: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

12

6. The Cloud: Mobile Computing

Mobile Computing: Office on the Road

Backup / DR

Virtual

Desktop Web / App

Hosting e-mail

Cloud

Storage

Mobile Devices Wireless Connectivity

• Access to Information and Computing Utility Anywhere.

• Apps and Data on Host or Cloud.

• Security

• Power

• Bandwidth

Page 14: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

13

6. The Cloud: Web and Social Media

Web and Social Media: Connecting over the Internet

• Today’s Information Channel.

• First Stop for Information.

• Trusted • Content is King

• Tools

• Facebook • Twitter • LinkedIn • YouTube • Pinterest • Google+ • Instagram

• Blogs

Page 15: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

14

Threats

7. Computer Security: Concepts and Basics

• Vulnerabilities.

• Flaws in computer software that create weaknesses • Improper computer or security configurations

• Malware • Malicious code that includes viruses, worms and Trojan horses

• Spyware • Software that unbeknownst to you, gathers and sends to third parties, information and data about

you and your computer activities.

• Spam • Can be used to deliver email that could contain Trojan horses, viruses, worms, spyware and targeted

attacks aimed at obtaining sensitive, personal identification information.

• Phishing

• Essentially an online con game. • Uses spam, malicious Web sites, email messages and instant messages to trick people into divulging

sensitive information, such as bank and credit card information or access to personal accounts

• ADWare • Software which automatically plays, displays, or downloads advertisements

• KeyLogging • capture and record user keystrokes. The data captured is then transmitted to a remote computer.

Page 16: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

15

7. Security, Data Backup/Recovery and Disaster Planning

• Physical Access

• Standard vs. Administrative User

• User Access Control

• Passwords

• Anti-Virus

• Firewall

• Application Updates / Patches

Onion Approach: Protection in Layers

Page 17: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

16

Best Practice

7. Security, Data Backup/Recovery and Disaster Planning

• Standard vs. Administrative User • “Rule of least privilege" / “Separation of duties."

• No More Passwords! • Hackers use techniques such as brute force and dictionary look-up

• Passwords of 8 characters or less are crackable in seconds.

• Instead, think Passphrase

• Essentially a sentence, including spaces, that you employ instead of a single pass "word.“

• Should be at least 15 to 25 characters in length (spaces count as characters)

• Memorable phrase, that works for you, that is unlikely to be found in a dictionary

• Should never contain information that would identify you personally

• Change passwords regularly

• Never use the same password twice, Ever!

Page 18: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

17

Disaster Recovery and Planning What is Your Data Worth to You?

• Have a Plan! − Backup is Insurance − Part of Continuation of Business Plan − Part of your Business Plan − Someone in charge

• Back-Up Your Data

− Choose − Automated. − Daily/Regular back-ups. − Store in off-site, secure location. − Test Backup Plan regularly and adjust.

• Backup Methodology

− Flash Drive − USB Disk − Network Attached Storage − iCloud − CrashPlan − SkyDrive/OneDrive − Drop Box − Google Drive − Carbonite − iDrive

• Power, ISP, Etc.

7. Security, Data Backup/Recovery and Disaster Planning

Page 19: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

18

Your Requirements Determine Technology Requirements

• Match Configuration to Expected Tasks

• Upgrade vs. Buy

• Consider Future Usability

• Warranty and Support

• Consider multiple purchasing

• Reliable Vendor

8. Purchasing

Component Specification

Processor (CPU) Intel i-Series Multi-Core or Better, 2-3 GHz or Equiv

RAM Memory 6GB Minimum

Hard Drive 1TB Minimum

Operating System Win/7 (PC) Minimum / OS-X Yosemite (Mac)

Optical DVD-RW / CD-RW

Display 17” LCD Monitor Minimum

Network WiFi 802.11 a/b/g/n/ac, Gigabit Ethernet Wired NIC

Typical Business Computer Configuration

Page 20: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

19

Protect Your Investment

• Professional Technology Support Software Patching and Update

H/W & S/W Upgrades Malware Removal

Disk Cleanup / Defragment

Backup & Recovery Testing

Help Desk Function

System Monitoring

9. Maintenance

Not This ……….

Page 21: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

20

Total Cost of Ownership (TCO) Model Considerations

• Hardware

• Software License

• Financing

• Installation

• Tech and User Support

• Training

• Upgrades

• Consumables

• Power / HVAC

• ISP / Internet Access

10. Cost of Ownership

5 Year Life Cycle TCO

Page 22: Introduction to a Productive and Secure Technology Environment. · 2016-11-03 · Introduction to a Productive and Secure Technology Environment. Precision Electronics and Technology,

[email protected]

Precision Electronics and Technology, LLC.

21 [email protected]