A+ Guide to Managing and Maintaining your PC, 6e 19-1
Securing Your PC and LAN
At a Glance
Instructor’s Manual Table of Contents
Class Discussion Topics
A+ Guide to Managing and Maintaining your PC, 6e 19-2
Chapter 19 covers PC and network security. The introductory sections demonstrate how
to control access to your computer using password protection. Next, a series of security
techniques and tools are presented. Firewalls, antivirus software, and Windows
2000/XP NTFS EFS are among the featured items. Students are also shown how to
combat social engineering and maintain event logs that focus on security. Following the
presentation of methods for protecting PCs, the discussion shifts to securing wired and
wireless networks. The latter portion of the chapter is dedicated to malicious software.
Various types of malware, such as viruses and worms, are described. The final sections
provide a systematic method for recovering from a malware intrusion
Learn how to secure a desktop or notebook computer
Learn how to secure a local wired or wireless network
Learn how malicious software works and how to clean an infected system
Securing Your Desktop or Notebook Computer
1. Indicate that firewalls are only part of a security system. Due to the potential for internal
attacks, security loopholes, and exposure during travel, you need to take extra steps to
protect your PC.
2. List the extensive methods for securing a network, such as keeping Windows updates
currents. All of these techniques will be covered in this chapter.
1. Distinguish authentication from authorization. Describe four types of passwords:
power-on passwords, Windows passwords, online account passwords, and application
2. Using Figure 19-3 to Figure 19-4, explain how to configure a power-on password in
CMOS setup. Indicate that you can set a supervisor password and a user password. In
addition, you can configure how the user password works. Note that in CMOS setup
you can enable or disable boot sector virus protection so that a virus is less likely to be
able to change the boot sectors of the hard drive.
3. Define a strong password. Review the various criteria for creating strong passwords,
such as combining uppercase and lowercase letters, numbers, and symbols. Define the
tem, passphrase. Compare passphrases to passwords. Provide additional guidelines for
using passwords, such as not sending your passwords over e-mail or chat.
A+ Guide to Managing and Maintaining your PC, 6e 19-3
4. Review the functions of user accounts and user passwords in Windows. Describe the
role of the administrator in configuring the password. Using Figure 19-7 to Figure 19-9,
demonstrate how to configure permissions for certain files and folders. Using Figure
19-12, demonstrate how to use the Cacls command to configure file and folder access.
Note that, unlike the GUI tool, the command can be used without disabling simple file
5. Indicate that a protected account will display an authentication dialog box when access
is attempted (see Figure 19-10 and Figure 19-11).
Teaching Because Cacls is an external command, you must navigate to \System32 or set
Tip the path variable to use it. To set the path variable, enter the command path =
Limit Use of the Administrator Account
1. Remind students of the three common account types used in Windows: Administrator,
Limited User, and Guest.
2. Explain why it is important to limit the use of the Administrator account to maintenance
and installation chores. Advise students to create a Limited User account to perform
ordinary functions. Show techniques for distinguishing the account types (see Figure
Use a Personal Firewall
1. Review the purpose of using a software or hardware firewall. Advise student to use a
firewall to protect a system. Review how to configure the Windows Firewall (see Figure
19-14). Remind students that Windows Firewall is included in Windows XP Service
Use AV Software
1. Advise students to use antivirus (AV) software to protect a system from malicious
software (see Figure 19-15). Provide guidelines for using AV software to maximum
effect, such as configuring the tool to automatically download updates.
2. Define the term, virus signature. Using the notion of a virus signature, explain why the
AV software cannot protect a system from an unknown threat.
3. Review the list of AV software resources in Table 19-1. Also, review the selection
criteria for purchasing AV software, such as whether it can automatically execute at
A+ Guide to Managing and Maintaining your PC, 6e 19-4
4. Define the terms, adware and spyware. Notify students that AV software does not
always stop adware or spyware. Advise students to purchase removal software products,
such as Ad-Aware, to combat adware and spyware.
Keep Windows Updates Current
1. Explain why Windows is particularly susceptible to attacks from authors of malicious
2. Reinforce the need to keep updates current. Advise students they can manually update
the system with Windows Update or set up a background process to automatically
download and install updates (see Figure 19-16 and Figure 19-17).
Set Internet Explorer for Optimum Security
1. Review some of the security settings available in Internet Explorer:
The ability to manage add-ons
The ability to block scripts and disable scripts embedded in Web pages
Ability to set general security level (Medium is recommended-see Figure 19-18)
Use Alternate Client Software
1. Explain why popular Microsoft products, such as Internet Explorer and Outlook
Express, are often targeted by authors of malware. For example, the ActiveX controls
downloaded into your PC may execute malicious code.
2. Indicate that alternative software is often less vulnerable to attack than more popular
counterparts. Advise students to consider utilizing alternative software, such as the
Mozilla browser by Firefox (see Figure 19-19) and the Eudora e-mail client by
Consider Using Microsoft Shared Computer Toolkit for Windows XP
1. Describe the Microsoft Shared Computer Toolkit for Windows XP. The toolkit may be
downloaded for free to users with a valid Windows XP license (see Figure 19-20).
2. Indicate that if you decide to use this tool, you should first ensure that the drive is
configured for optimal use. Then you can configure and enable the toolkit. In addition,
you can configure the toolkit so that Windows updates can be installed when users are
not working on the computer.
A+ Guide to Managing and Maintaining your PC, 6e 19-5
Quick Quiz 1
1. ____________________ proves that an individual is who he says he is and is
accomplished by a variety of techniques, including a username, password, personal
identification number (PIN), smart card, or biometric data.
2. ____________________ determines what an individual can do in the system after he or
she is authenticated.
3. True or False. A passphrase is made of several words with spaces allowed.
4. Antivirus (AV) software detects a known virus by looking for distinguishing
characteristics called virus ____________________.