Chapter 12 Security and Virus speak khmer
This chapter covers computer security fundamentals, including threats, procedures, preventative maintenance, and troubleshooting.
Video #1
I. Security Threats and Procedures
• Security threats are potential risks to computer systems and organizations.
• Physical threats can be internal (fire, unstable power supply), external (lightning, floods), or human (theft, vandalism).
• Non-physical threats, also known as logical threats, can result in data loss, disrupted business operations, and unauthorized access.
Video #2
Video #3
Video #4
II. Security Procedures
• Security procedures provide detailed instructions on implementing security controls based on an organization's policies.
• Windows Local Security Policy can be used to enforce security on non-domain computers.
• Secure web access involves using browser features like ActiveX Filtering, Pop-up Blocker, and SmartScreen Filter.
• Data protection techniques include firewalls, biometric authentication, data backups, encryption, and proper hard drive disposal.
• Anti-malware software should be updated to protect against viruses, adware, phishing, and spyware.
Video #5
Video #6
Video #7
Video #8
Video #9
III. Common Preventive Maintenance
• This section is not covered in the provided document.
Video #10
Video #11
IV. Basic Troubleshooting Process for Security
• Common security problems can be attributed to hardware, software, or connectivity issues.
Video #12
Video #13
⚡ Free Ebook Download - free PDF download
⚡ Learn Excel Formulas with Video and Example Download
Video #1
Watch The Complete Chapter of Computer Fundamental in Khmer Here
I. Security Threats and Procedures
• Security threats are potential risks to computer systems and organizations.
• Physical threats can be internal (fire, unstable power supply), external (lightning, floods), or human (theft, vandalism).
• Non-physical threats, also known as logical threats, can result in data loss, disrupted business operations, and unauthorized access.
Video #2
Video #3
Video #4
II. Security Procedures
• Security procedures provide detailed instructions on implementing security controls based on an organization's policies.
• Windows Local Security Policy can be used to enforce security on non-domain computers.
• Secure web access involves using browser features like ActiveX Filtering, Pop-up Blocker, and SmartScreen Filter.
• Data protection techniques include firewalls, biometric authentication, data backups, encryption, and proper hard drive disposal.
• Anti-malware software should be updated to protect against viruses, adware, phishing, and spyware.
Video #5
Video #6
Video #7
Video #8
Video #9
III. Common Preventive Maintenance
• This section is not covered in the provided document.
Video #10
Video #11
Watch The Complete Chapter of Computer Fundamental in Khmer Here
IV. Basic Troubleshooting Process for Security
• Common security problems can be attributed to hardware, software, or connectivity issues.
Video #12
Video #13
Useful links:
⚡ How to Download and Install Khmer Unicode for Windows and Mac OSX (apple)⚡ Free Ebook Download - free PDF download
⚡ Learn Excel Formulas with Video and Example Download
No comments: