Search Header Logo
Lesson 11 Utility Software

Lesson 11 Utility Software

Assessment

Presentation

Computers

11th - 12th Grade

Easy

Created by

Ryan Mordey

Used 3+ times

FREE Resource

10 Slides • 7 Questions

1

Lesson 11 Utility Software

By Ryan Mordey

2

Big Picture

Discussed how storage devices can cause security implications.

Past

Describe how a range of OS can be used and any security implications with each.

Evaluate the effectiveness of using an OS within a specific area.

Present

Future

Careers: Software engineer, OS developer, Software Solutions.

3

Categorize

Options (12)

Provides a graphical user interface

Provides advanced folder management

Windows is an example of this OS

OS used in embedded systems and IoT devices

Less focus on user experience but more on priority scheduling

Used within automated(driverless) car systems

Single user operating system

Designed for portable devices using touch screen as method of control

Unlisted applications are a security concern

Huge target for hackers due to its popularity

Frequent updates are important to repair vulnerabilities

Security breach is likely to be more severe or disastrous

Connect the characteristic to the operating system.

Multi-Functional OS
Real Time OS
Mobile OS

4

Match

Connect the server OS responsibility to its description.

Allows you to create and manage accounts accessing the network.

Allows to control which users have access to files stored on the server

Allows to configure settings for a range of user accounts, restricting their access to the network or what they are able to do.

Can review the performance, status and use of the network.

User management

File and folder permission

Group Policies

Monitoring tools.

5

Utility Software

Utility software also falls under system software. This software is designed to specifically analyse, configure, optimise and maintain a computer system. This software is important within networks and can have security implications if not used or considered.

​Analyse: Checks your computer system

Configures: Changes system settings

Maintains: Keeps your PC up to date

Optimises: Improves use from changing settings

media
media
media
media

6

Only backs up files that are new or have had changes made to them. This method takes less time to perform however it cannot be the only method used and some files could be missed.

Incremental

This software automatically backs up your files. It can help prevent from data loss, and free storage from your hard drive. Backup software allows you to schedule and manage the type of back up that takes placed within the computer system. Backups themselves can become security risks if backed up on a device that could be stolen or accessed by a hacker.

There are two methods of backup you need to be aware of:

Backup Software

Full

Backs up every file even if no changes have been made. This method takes a longer amount of time to perform as well as requiring a larger storage capacity.

7

A single disk can be partitioned into several smaller sections or partition which are seen as separate disks devices by the operating system. This can be done to help organise data on the drives.

Disk Partitioners

This can be used to help identify where space on a disk is being used, which is not always easy to see using file explorer. Some analysers have built in defragmenters to use on a HDD which groups files together to make them faster to access, an SSD does not require the use of this feature.

Disk Analysis

Disk Management.

8

Reorder

Reorder the following

Analyse

Configure

Optimise

Maintain

1
2
3
4

9

Open Ended

What is the difference between a full backup and an incremental? (2 Marks)

10

These are used to automatically discover network components and how they are connected. It can identify devices connected through WiFi or ethernet. This information can then create a diagram overview of the network which a technician can use to have oversight.

Mapping

Traffic Monitoring

This software can help network technicians identify bottlenecks in the network that might be causing poor performance. These tools can performing simple speed tests or provide a dashboard to show various metrics of performance across the network. It can help monitor applications use of the network or overuse of bandwidth from a specific device.

IP address management

Keeps track of the IP addresses of all the different devices within a LAN, therefore it can help resolves networking issues and identify unusual activity within each device. This can help identify suspicious activity within the network and track any inappropriate use of the network from each employee.

Network Utilities

11

Network tools can audit networked devices, such as software version in use, most recent update and when they were last updated. We can also log the rejected packets from a firewall, to look for patterns from hacking attempts or attacks. This allows us to adjust our firewall settings to better protect the network.

Auditing & Logging

Connectivity Checking

We can check specific devices on a LAN to see if it is responsive. Pinging a device is often used for this purpose. Pinging gives us a response time or if the computer is not responding it can return an error.

Ping reveals the latency on a network, which is how fast a device can communicate measured in Milliseconds.

Packet Sniffing

These are used for a deeper analysis of network traffic. They allow for individual packets to be inspected showing details such as source IP address. It can help diagnose network problems but can also be used maliciously by revealing email contents and other sensitive information.

Network Utilities

12

media

These are used to help automate the process of installing, updating and maintaining software applications on a network. Organisations will define groups of users who will have specific access to applications. For security, compatibility and support all software should be the save version, this makes it easier to manage for network technicians.

Package Managers

13

Match

Connect the network utility to its purpose.

Creates a visual diagram of the network including how devices are connected.

Used to identify bottlenecks within network performance, also monitoring applications use of data in a network.

Can help identify any issues caused by a single device on the network, can also help identify suspicious activity from a device.

Will keep track of software versions and updates within the network, can review data that has been rejected by the firewall.

Can examine data entering the network by tracking the source IP address as well as the protocol that is being used to transmit the data.

Mapping

Traffic Monitoring

IP Address Management

Auditing & Logging

Packet Sniffing

14

Open Ended

How does a connectivity checker use the "Ping" feature? (2 Marks)

15

media

This software creates an interface between the hardware and the OS. Sometimes the OS does not come pre-installed with the driver that allows it to communicate and use it for control. This software will find the correct driver, update the settings and install it automatically. It may need updated to support newer software or to protect against vulnerabilities.

Device Drivers

16

Open Ended

How does packet managers save network technicians time? ( 2 marks)

17

Main Task

Computer Task:

Design a leaflet to inform an accountancy firm of utility software that they must use and their importance.

Throughout your leaflet you should discuss the impact that regular use of this software could have on their business and any security implications of not using the software.

Complete all the questions on the work sheet.

Lesson 11 Utility Software

By Ryan Mordey

Show answer

Auto Play

Slide 1 / 17

SLIDE