Before someone has access to a resource on an IT infrastructure, they should go through some form of authentication to prove that they truly have the right to use that resource. IT Support specialists set up different types of authentication methods, and not just passwords. Even when passwords are used, different levels of access can be configured for files, folders, and devices.
Whether intended or not, IT support specialists can also come across a variety of information that should be kept secure, such as Personally Identifiable Information (PII) or Protected Health Information (PHI). IT technicians are responsible for establishing a system of permissions that allow only the appropriate people to access secure information and how that information may be kept secure through encryption. They are also responsible for being proactive about establishing procedures and technology solutions for Data Loss Prevention (DLP) and policies for recovering data, when necessary.
How do you know your information is safe? You probably use a password for a lot of the sites you visit as well as those you use for school or work. Do you use the same password over and over? Do you use strong passwords? How do you know?
Passwords are just one way to authenticate someone using technology, but they're not flawless, especially if you don't follow guidelines for creating strong passwords. You'd be surprised how many people never change their password, or use passwords you can guess easily, like using their pet or child's name or a birthday. As an IT support specialist, you can set up policies that can enforce people to keep the information and devices you support more secure.
You can create policies that require people to use strong passwords or other ways to authenticate themselves. You can also set the permissions to files, folders, and other resources on your network. You may also encrypt different kinds of data so people can't access it. As an IT support specialist you need to understand technology and behavioral best practices for keeping data secure and enforce those best practices from those who use your network's resources.
How can you ensure data is kept secure, so it can only be accessed by those who have permission to, and what do you do if there is an incident in which data may be at risk?
Students configure data protection in Windows and should be able to explain how files, folders, and disks can be made more secure. They can also review or propose policies to enforce security best practices, helping to keep data secure and what to do if an incident occurs that risks the exposure or loss of data.
Implement Security Best Practices
Authentication factor
Radio Frequency Identification (RFID)
Key fob
Biometric information
Two-factor authentication
Three-factor authentication
Software token
Replay attack
RADIUS
TECACS+ (Terminal Access Controller Access Control System Plus)
Access Control List (ACL)
Implement Data Protection Policies
Information Content Management (ICM)
Personally Identifiable Information (PII)
Protected Health Information (PHI)
Payment Card industry Data Security Standards (PCI DSS)
Permission
Access Control List (ACL)
Encrypting File System
Full Disk Encryption
Data Loss Prevention
End User License Agreement (EULA)
Shareware
Freeware
Open Source
Digital Rights Management (DRM)
Protect Data During Incident Response
Incident response policy
Incident
Computer Security Incident Response Team (CSIRT)
Computer forensics
Chain of Custody
Monday
Introduction to problem: Security Best Practices
Online Pre-assessment (available for student practice, as well)
Review content resources with whole group: Topic 13A: Discussing Security Best Practices Implementation
Tuesday
Review content resources with whole group: 13B: Data Protection Policies
Small group and independent exploration of resources
Activity 13-1: Discussing Security Best Practices Implementation
Activity 13-2: Discussing Data Protection Policies
Wednesday
Hands-on exploration with IT professionals: Activity 13-3: Configuring Data Protection
Progress check with supervisor
Thursday
Hands-on exploration with IT professionals: Activity 13-3: Configuring Data Protection
Small group and independent exploration of resources: Topic 13C: Protect Data During Incident Response
Activity 13-4: Discussing Data Protection During Incident Response, if time allows
Friday
Hands-on exploration with IT professionals: Activity 13-3: Configuring Data Protection & Activity 13-4, if necessary
Team progress check with supervisor or sharing of progress with whole group
Online post-assessment
There are a lot of security practices and terms students must become comfortable with in these topics. Depending on the level of access your students have to devices and a network, they may have limitations applying some of the skills referenced in these topics.
Preferably, students will be able to engage in Activity 13-3: Configuring Data Protection as the primary focus of their hands-on applications during these topics. Students should become aware of how file permissions, folder encryption, and disk encryption can and may not protect data on fixed disks and removable media. This is another activity that relies on virtual machines. If not available, consider how students can at least observe the use of security measures, such as the Advanced Security Settings and BitLocker.
The Official CompTIA A+ Core 1 & Core 2 Instructor Guide for Exams 220-1001 and 220-1002
Professor Messer at ProfessorMesser.com and YouTube offers numerous free videos of various lengths for many of the topics for the CompTIA 220-1001 A+ Exam. They are easy to understand, narrated videos with visuals. If you are teaching a CompTIA course, the site notes "You're welcome to use them as much as you'd like, provided you embed the videos with the associated YouTube link or link directly to my site. Please click the "Contact Us" link at the top of our web page and let me know how you're using them."
Entry Level I.T. Training from Technology Gee
Microsoft Support
Other Articles and Resources:
Disk vs File Encryption – Which is Best for Your Organization? From The Purple Guys, an IT support group in Kansas City, KS.
Guidance on the Protection of Personal Identifiable Information from the U.S. Department of Labor
What is Shareware? – How it works and how to protect yourself from kaspersky, a digital security company (contains advertisements)
Your Guide to Using BitLocker Encryption on Windows 10 by Andre Da Costa for groovypost. Thorough step-by-step tutorial. (contains advertisements)