Introduction
In real world of information, people are much more concerned about information integrity, confidentiality and availability. Separating availability from integrity and confidentiality reinforces dependability of information from unauthorized disclosure and modification.
Computer security is a term used to refer to the protection accorded to an information system so as to obtain the possible intentions of maintaining integrity, availability and confidentiality of IS facilities (computer hardware, computer software, firmware, stored information/data and telecommunications).
In computer security, data integrity refers to a situation whereby information and programs are only changed in an authorized way. System integrity on the other hand refers to a requirement whereby a system performs its intended function in an uninterrupted way and free from intentional or inadvertent unauthorized modification of the system. Availability is assurance of prompt services free from denial by unauthorized users. Confidentiality ensures that private information is not at all means accessed by unauthorized persons.
Malicious software
Malicious software, also called malware is a program that partially or fully takes control of your computer system so as to fulfill the wishes of the malware developer . Examples of malwares are viruses, worms, Trojan horses, adware, spyware, root kit etc.
Malware can modify the author’s name on a document file and take full control of it without the owner’s knowledge. Most of the malware wait for the user to initiate an operation. They can be propagated through e-mails, internet browsing and some take advantage of the OS or programs vulnerabilities. Trojans, worms and backdoors are aimed at infecting and spreading to cause havoc in the system. Spyware adware embed themselves so as to monitor the user’s actions. Root kits are purposed to provide attackers complete access to your system.
Viruses and recovery
Computer viruses are programs that propagate from one computer system to another causing interruption in normal operations. The virus may delete data if not corrupt. They use email programs to propagate the malicious intentions to other computers. A virus infected computer runs slowly, stops responding, crashes and restarts frequently, restarts without instructed, applications fails to work as expected, and sometimes even you find the antivirus program deactivated or disabled completely.
Troubleshooting theory
Troubleshooting theory refers to a set of steps kept in mind and used together with the computing procedure to find out and solve a computer problem. It involves eliciting some information from users so as to act as basis of diagnosis. Elicitation involves asking questions about when the problem took place, determining the root cause, testing, verification and system documentation.
Tech toolkit
Every computer technician must be having something to keep his/her tools collectively. In the toolkit are tools like Swiss army knife, rechargeable screw driver, needle nosed pliers, small flashlight that has adjustable lamp together with a snip to mount on one’s baseball hat so as to enhance hands-free operation, variety tips of hex screwdriver, wire cutters, small reversible screwdriver, Torx driver for Compaq computer systems and LaserJet, cleaning solution for desk jets and faxing machines page grabbers and hand mirror to facilitate seeing around tight and places.
Conclusion
References
Bosworth, S., & Kabay, M. E. (2002). Computer security handbook. Chicago: John Wiley and Sons.
Meyers, M., & Meyers, M. (2010). Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition (Exams 220-701 & 220-702). New York: McGraw-Hill Prof Med/Tech.
Pyles, J. (2010). PC Technician Street Smarts: A Real World Guide to Comptia A+ Skills. Australia: John Wiley and Sons.