IT412 System Administration & Maintenance PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document is about system administration and maintenance, including troubleshooting and problem-solving techniques. It covers topics such as identifying problems, establishing theories, testing theories, planning solutions, implementing solutions, verifying functionality, and documentation. The document also discusses diagnosing hardware and software issues, and common network troubleshooting techniques. Critical thinking and problem-solving skills are highlighted as essential aspects of system administration.
Full Transcript
IT412 – System Administration & Maintenance 5. Scan for Malware 6. Reconfigure or Reinstall Software PPT 8 7. Check for Compatibility TROUBLESHOOTING AND PROBLEM SOLVING...
IT412 – System Administration & Maintenance 5. Scan for Malware 6. Reconfigure or Reinstall Software PPT 8 7. Check for Compatibility TROUBLESHOOTING AND PROBLEM SOLVING 1. Systematic Approach to troubleshooting 03 COMMON NETWORK TROUBLE SHOOTING 2. Diagnosing hardware and software issues TECHNIQUE 3. Common Network Troubleshooting Technique 1. Identify the Problem 4. Critical thinking and problem solving skills Gather Information 2. Check Physical Connections 01 SYSTEMATIC APPROACH TRBOUBLESHOOTING 3. Ping and Connectivity Tests Key Steps in a System Troubleshooting Approach Verify connectivity by pinging the target 1. Identify the Problem IP (example: ping 8.8.8.8) Gather information about the issue Trace the path to a destination to from the user or system logs. identify where the connection fails. (example: tracert 8.8.8.8) 2. Establish a Theory of Probable Cause Use the information gathered to 4. Check IP Configuration brainstorm potential causes of the Ensure the device has a valid IP address problem. 5. Verify DNS Settings 3. Test the Theory Check if the DNS server resolves domain Verify the suspected cause by running names correctly. (example: nslookup specific tests or checking configurations. google.com) 4. Establish a Plan of Action 6. Restart Devices Once the cause is confirmed, plan a solution to resolve the issue. 7. Tests with Other Devices Determine if the problem is isolated to 5. Implement the Solution one device or affects multiple devices. Apply the fix based on the action plan. 8. Replace or Test Cables and Ports 6. Verify Functionality Test the system to ensure the problem 9. Verify Firewall and Security Settings is resolved. Check if the firewall is blocking traffic or causing issues. 7. Documentation Record the problem, steps taken, and the solution for future reference. 04 CRITICAL THINKING AND PROBLEM SOLVING SKILLS Essential for analyzing situations, making informed 02 DIAGNOSING HARDWARE AND SOFTWARE decisions, and resolving challenges effectively. ISSUES These skills involve a combination of logical Diagnosing Hardware Issues reasoning, creativity, and adaptability to arrive at practical solutions. 1. Observation 2. Check Connections and Components How critical thinking and problem 3. Run Hardware Diagnostics solving work together? 4. Swap or Replace Components 5. Monitor Performance Diagnosing Software Issues 1. Identify the Symptoms 2. Check System Logs and Events 3. Test in Safe Mode 4. Update or Roll Back Changes SOFTWARE NOT RESPONDING 4. Ethical Use of Monitoring Tools Avoid overstepping by unnecessarily monitoring personal activities. Critical Thinking Identify potential causes (e.g., COMPLIANCE WITH THE DATA PRIVACY ACT OF insufficient memory, software bugs) 2012 (RA 10173) Evaluate logs and user reports for patterns. Problem Solving DATA PRIVACY ACT (DPA) - governs the collection, storage, and use of personal data. Restart the application or system. Update or reinstall the software. Systems administrators must ensure compliance Increase memory allocation or with its core principles: hardware capacity 1. Transparency NOTE: Inform data subjects about how their data is used. If you can't solve the problem, try searching online. 2. Legitimate Purpose Many users share solutions to similar issues on Only process data for clear, lawful forums, blogs, or support sites. Include specific purposes. details like error messages to find relevant fixes 3. Proportionality quickly. Limit data collection to what is strictly necessary. 02 ETHICAL HACKING AND PENETRATION TESTING Ethical hacking and penetration testing involve PPT 9 proactive measures to identify and address security vulnerabilities in systems and networks. ETHICAL AND LEGAL CONSIDERATIONS WHAT IS ETHICAL HACKING? 1. Privacy and Data Protection Consideration 2. Ethical Hacking and Penetration Testing Involves authorized attempts to gain access to a 3. Security Compliance and Best Practices system, application, or network to identify security flaws. Unlike malicious hackers, ethical hackers aim to improve security by reporting vulnerabilities 01 PRIVACY AND DATA PROTECTION responsibly. CONSIDERATION Systems administrators hold a critical role in FEATURES OF ETHICAL HACKING: managing, securing, and maintaining IT systems and 1. Authorization the sensitive data they contain. This role comes with Ethical hackers must have permission significant ethical and legal responsibilities to from the system owner to perform tests. protect user privacy and ensure data is handled 2. Objective securely. The goal is to enhance security, not 1. User Consent and Transparency exploit vulnerabilities. Systems administrators must ensure 3. Integrity users are fully informed about how their Ethical hackers are bound by data is being collected, processed, and confidentiality agreements and stored. professional standards. 2. Data Minimization and Purpose Limitations Use the information gathered to brainstorm potential causes of the problem. 3. Limitation of Access Data access should be strictly limited to authorized personnel, and access must be justified by a legitimate purpose. WHAT IS PENETRATION TESTING? 6. Monitor and Update Continuously Identify vulnerabilities and threats to is a systematic process to simulate real-world critical assets. cyberattacks and evaluate a system's defenses. It typically includes: 1. Reconnaissance Gathering information about the target system. 2. Exploitation Attempting to breach the system using identified vulnerabilities. 3. Reporting Documenting findings and recommending solutions. 03 SECURITY COMPLIANCE AND BEST PRACTICES Security compliance and best practices are essential for safeguarding systems, data, and networks against threats while adhering to relevant regulations and standards. KEY SECURITY STANDARDS AND REGULATIONS 1. Data Privacy Act of 2012 (RA 10173) Mandates the protection of personal data and outlines principles such as transparency, legitimate purpose, and proportionality. 2. Cybercrime Prevention Act (RA 10175) Focuses on preventing unauthorized access, data interference, and system interference. BEST PRACTICES FOR SECURITY COMPLIANCE 1. Establish a Security Framework NIST Cybersecurity Framework 2. Conduct Risk Assessments Identify vulnerabilities and threats to critical assets. 3. Develop and Enforce Security Policies Create clear policies for data usage and acceptable use. 4. Implement Technical Safeguards Firewalls and Intrusion Detection Systems, MFA, Encryption 5. Train Employees Conduct regular security awareness training to educate employees