4) Safety, Environment, & Policy Flashcards

1
Q

Safety: Equipment Grounding

A

Most computer products connect to ground.
Also applies to equipment racks.
Don’t remove the ground connection.

Never connect yourself to an electrical ground.
(Not a way to prevent ESD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Safety: Proper Component Handling/Storage

A

ESD Straps
ESD Mats
Antistatic Bags
Self-grounding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Safety: Toxic Waste Handling

A

Batteries - Dispose @ hazardous waste facility
Toner - Recycle! Manufacturer return box
CRT - Dispose @ hazardous waste facility (lead in glass)
Cell Phones/Tablets - Wipe data; manufacturer recycling program. Do not throw in trash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personal Safety: Disconnect Power, Remove Jewelry

A

Disconnect power before operating on any electronic.

Remove jewelry & name badge neck straps
Use breakaway lanyards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personal Safety: Lifting Techniques, Weight Limitations

A

Lift with your legs, keep your back straight.
Don’t carry overweight items.
You can get equipment to lift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Personal Safety: Electrical Fire Safety, Cable Management

A

Use a class C fire extinguisher.
Don’t use water/foam.
Use carbon dioxide, FM-200, or other dry chemicals.
Remove the power source.

Avoid trip hazards. Use cable ties/velcro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Personal Safety: Safety Goggles, Air Filter Mask

A

Goggles:
Useful when working with batteries/chemicals
Good for printer repair & toner

Air Filter Mask:
Dusty computers
Printer toner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Safety: Compliance with Government Regulations

A

Health & safety laws vary widely depending on location.
Keep workplace hazard-free.

Ex: Building Codes (fire prevention, electrical codes)
Environmental Regulation (high-tech waste disposal)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Environment: MSDS Documentation

A

Material Safety Data Sheets (sometimes SDS)
US Dept of Labor, Occupational Safety & Health Admin
www.osha.gov or manufacturer website

Provides info for all hazardous chemicals:
Product/company info
Hazard info
Composition/ingredients
Fire-fighting measures
Accidental release/leaking
Handling/storage
Etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Environment: Temperature, Humidity, Awareness, Proper Ventilation

A

Temperature - Devices need constant cooling (so do humans)

Humidity - 50% is a good number
High humidity (condensation)
Low humidity (static discharges)

Proper ventilation - computers generate heat\
Don’t put everything in a closet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Environment: Power Surges, Brownouts, Blackouts

A

UPS (Uninterruptible Power Supply)
Backup power
Protects from brownouts/blackouts/surges

Surge Suppressor - Surge absorption in joules
200 (good), 400 (better), 600 (ideal)
Not all power is clean
Self-inflicted power spikes & noise, storms, power grid changes
Spikes are diverted to ground.
Noise filters remove line noise (higher dB, better)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Environment: Airborne Particles

A

Enclosures
Protect computers on a manufacturing floor
Protect from dust/oil/smoke

Air filters/mask
Protest yourself against the same airborne particles
Dust in cases/laser printer toner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Environment: Dust & Debris

A

Use a neutral detergent
No ammonia-based cleaning liquids (avoid isopopyl)

Compressed air

Vacuums
Use a “computer” vacuum (anti-static)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Environment: Compliance with Government Regulations

A

Environment regulations may have specific controls.

Hazardous waste, batteries, computer components, paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Response: First Response

A

Identify the issue (logs, in person, monitoring data)

Report through proper channels - don’t delay

Collect/protect info relating to an event
Data/device preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Incident Response: Documentation

A

Documentation must be available

Gather as much info as possible (notes, pictures, etc)

Documentation always changes (constant updating)
Use a wiki model

17
Q

Incident Response: Chain of Custody (CoC)

A

Control evidence (maintain integrity)

Everyone who contacts the evidence (avoid tampering)
Use hashes to verify any changes

Label/catalog everything (seal/store/protect)
Digital signatures

18
Q

Licensing/DRM/EULA: Open-Source vs. Commercial License

A

Closed source/Commercial - source code is private
End user gets compiled executable

FOSS (Free & Open Source)
Source code is freely available
End user can compile their own executable

EULA (End User Licensing Agreement)
Determines how software can be used

DRM (Digital Rights Management)
Used to manage the use of software

19
Q

Licensing/DRM/EULA: Personal vs. Enterprise LIcense

A

Personal License
Designed for the home user
Usually associated with a single device (single user)
Perpetual (one time) purchase

Enterprise License
Per-seat purchase / Site license
The software may be installed everywhere
Annual renewals

20
Q

Regulated Data (PII, PCI, GDPR, PHI)

A

PII - Personally Identifiable Information
Handling PII usually documented in Privacy Policy

PCI DSS - Payment Card Industry Data Security Standard
Standard for protecting credit cards

GDPR - General Data Protection Regulation
Created by European Union
Data protection/privacy for individuals in the EU
Name/address/photo/email/bank/social media/medical
Controls export of personal data

PHI - Protected Health Information
Health info associated with an invididual
Health status, records, payments, & more
HIPAA Regulations

21
Q

Follow All Policies & Security Best Practices

A

Policies
General IT guidelines
Determines how tech should be used
Processes for handling important tech decisions

Security Best Practices
Some security techniques are accepted standards
Covers processes & technologies
What happens if there’s a breach?