

Lesson 11 Utility Software
Presentation
•
Computers
•
11th - 12th Grade
•
Easy
Ryan Mordey
Used 4+ times
FREE Resource
10 Slides • 7 Questions
1
Lesson 11 Utility Software
By Ryan Mordey
2
Big Picture
Discussed how storage devices can cause security implications.
Past
Describe how a range of OS can be used and any security implications with each.
Evaluate the effectiveness of using an OS within a specific area.
Present
Future
Careers: Software engineer, OS developer, Software Solutions.
3
Categorize
Provides a graphical user interface
Provides advanced folder management
Windows is an example of this OS
OS used in embedded systems and IoT devices
Less focus on user experience but more on priority scheduling
Used within automated(driverless) car systems
Single user operating system
Designed for portable devices using touch screen as method of control
Unlisted applications are a security concern
Huge target for hackers due to its popularity
Frequent updates are important to repair vulnerabilities
Security breach is likely to be more severe or disastrous
Connect the characteristic to the operating system.
4
Match
Connect the server OS responsibility to its description.
Allows you to create and manage accounts accessing the network.
Allows to control which users have access to files stored on the server
Allows to configure settings for a range of user accounts, restricting their access to the network or what they are able to do.
Can review the performance, status and use of the network.
User management
File and folder permission
Group Policies
Monitoring tools.
User management
File and folder permission
Group Policies
Monitoring tools.
5
Utility Software
Utility software also falls under system software. This software is designed to specifically analyse, configure, optimise and maintain a computer system. This software is important within networks and can have security implications if not used or considered.
Analyse: Checks your computer system
Configures: Changes system settings
Maintains: Keeps your PC up to date
Optimises: Improves use from changing settings
6
Only backs up files that are new or have had changes made to them. This method takes less time to perform however it cannot be the only method used and some files could be missed.
Incremental
This software automatically backs up your files. It can help prevent from data loss, and free storage from your hard drive. Backup software allows you to schedule and manage the type of back up that takes placed within the computer system. Backups themselves can become security risks if backed up on a device that could be stolen or accessed by a hacker.
There are two methods of backup you need to be aware of:
Backup Software
Full
Backs up every file even if no changes have been made. This method takes a longer amount of time to perform as well as requiring a larger storage capacity.
7
A single disk can be partitioned into several smaller sections or partition which are seen as separate disks devices by the operating system. This can be done to help organise data on the drives.
Disk Partitioners
This can be used to help identify where space on a disk is being used, which is not always easy to see using file explorer. Some analysers have built in defragmenters to use on a HDD which groups files together to make them faster to access, an SSD does not require the use of this feature.
Disk Analysis
Disk Management.
8
Reorder
Reorder the following
Analyse
Configure
Optimise
Maintain
9
Open Ended
What is the difference between a full backup and an incremental? (2 Marks)
10
These are used to automatically discover network components and how they are connected. It can identify devices connected through WiFi or ethernet. This information can then create a diagram overview of the network which a technician can use to have oversight.
Mapping
Traffic Monitoring
This software can help network technicians identify bottlenecks in the network that might be causing poor performance. These tools can performing simple speed tests or provide a dashboard to show various metrics of performance across the network. It can help monitor applications use of the network or overuse of bandwidth from a specific device.
IP address management
Keeps track of the IP addresses of all the different devices within a LAN, therefore it can help resolves networking issues and identify unusual activity within each device. This can help identify suspicious activity within the network and track any inappropriate use of the network from each employee.
Network Utilities
11
Network tools can audit networked devices, such as software version in use, most recent update and when they were last updated. We can also log the rejected packets from a firewall, to look for patterns from hacking attempts or attacks. This allows us to adjust our firewall settings to better protect the network.
Auditing & Logging
Connectivity Checking
We can check specific devices on a LAN to see if it is responsive. Pinging a device is often used for this purpose. Pinging gives us a response time or if the computer is not responding it can return an error.
Ping reveals the latency on a network, which is how fast a device can communicate measured in Milliseconds.
Packet Sniffing
These are used for a deeper analysis of network traffic. They allow for individual packets to be inspected showing details such as source IP address. It can help diagnose network problems but can also be used maliciously by revealing email contents and other sensitive information.
Network Utilities
12
These are used to help automate the process of installing, updating and maintaining software applications on a network. Organisations will define groups of users who will have specific access to applications. For security, compatibility and support all software should be the save version, this makes it easier to manage for network technicians.
Package Managers
13
Match
Connect the network utility to its purpose.
Creates a visual diagram of the network including how devices are connected.
Used to identify bottlenecks within network performance, also monitoring applications use of data in a network.
Can help identify any issues caused by a single device on the network, can also help identify suspicious activity from a device.
Will keep track of software versions and updates within the network, can review data that has been rejected by the firewall.
Can examine data entering the network by tracking the source IP address as well as the protocol that is being used to transmit the data.
Mapping
Traffic Monitoring
IP Address Management
Auditing & Logging
Packet Sniffing
Mapping
Traffic Monitoring
IP Address Management
Auditing & Logging
Packet Sniffing
14
Open Ended
How does a connectivity checker use the "Ping" feature? (2 Marks)
15
This software creates an interface between the hardware and the OS. Sometimes the OS does not come pre-installed with the driver that allows it to communicate and use it for control. This software will find the correct driver, update the settings and install it automatically. It may need updated to support newer software or to protect against vulnerabilities.
Device Drivers
16
Open Ended
How does packet managers save network technicians time? ( 2 marks)
17
Main Task
Computer Task:
Design a leaflet to inform an accountancy firm of utility software that they must use and their importance.
Throughout your leaflet you should discuss the impact that regular use of this software could have on their business and any security implications of not using the software.
Complete all the questions on the work sheet.
Lesson 11 Utility Software
By Ryan Mordey
Show answer
Auto Play
Slide 1 / 17
SLIDE
Similar Resources on Wayground
12 questions
Anne Frank Character Change
Presentation
•
6th - 9th Grade
11 questions
list in python
Presentation
•
11th Grade
12 questions
38 JavaScript Wyświetlanie komunikatów
Presentation
•
KG
11 questions
Reading News Online
Presentation
•
5th Grade
12 questions
EM HIỂU VIỆT NAM ĐƯỢC BAO NHIÊU?
Presentation
•
12th Grade
12 questions
Unit 6 - Stoichiometry - Intro to Stoichiometry Notes
Presentation
•
10th - 12th Grade
13 questions
Present Simple & Present Continuous
Presentation
•
11th Grade
11 questions
Relative Clauses
Presentation
•
12th Grade
Popular Resources on Wayground
15 questions
Grade 3 Simulation Assessment 1
Quiz
•
3rd Grade
22 questions
HCS Grade 4 Simulation Assessment_1 2526sy
Quiz
•
4th Grade
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
20 questions
Math Review
Quiz
•
3rd Grade