15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

printout at a printer and suddenly there’s a bunch of printed pages coming out

of the printer with employee payroll information, set it to the side and pretend

you never saw it.

But what about the scary stuff? Obvious espionage? Child pornography?

People passing out personal information? Hacking? In these cases, you’ve

just become the first line of defense and you need to act accordingly. Let’s

address the objectives as listed by CompTIA for the 220-1002 exam.

Identify the Action or Content as Prohibited Use common sense, but

keep in mind that most organizations have an Acceptable Use Policy that

employees must sign. The Acceptable Use Policy (AUP) defines what actions

employees may or may not perform on company equipment. Remember that

these polices aren’t just for obvious issues such as using a computer for

personal use. These policies cover computers, phones, printers, and even the

network itself. This policy will define the handling of passwords, e-mail, and

many other issues.

Report Through Proper Channels In most cases, you’ll report any

prohibited actions or content directly to your supervisor. There’s also a

chance your company will have a security officer or incident response leader

who you’ll contact instead. Do not speak to the person making the infraction

unless your supervisor approves that contact.

Data/Device Preservation You might end up in a situation serious enough

that a computer or other device becomes evidence. In these cases, the location

of the system and who has touched it may come into question, so you need to

establish a chain of custody: a documented history of who has been in

possession of the system. This is all about the tracking of

evidence/documenting process. You should have a legal expert to guide you,

but the following are fairly common rules:

1. Isolate the system. Shut down the system and store it in a place where

no one else can access it.

2. Document when you took control of the system and the actions you

took: shutting it down, unplugging it, moving it, and so on. Don’t

worry about too much detail, but you must track its location.

3. If another person takes control of the system, document the transfer of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!