Technician Standards and Practices Flashcards
(30 cards)
Which specific computer components require special care when handling to protect your safety?
?
What is the proper way to lift heavy objects?
?
How can ESD be a hazard to electronic computer components?
?
What is the difference between a static-shielding bag and a static-resistant bag?
?
What steps can you take to reduce ESD if you do not have the proper equipment handy?
?
What is the MSDS? When would the information it provides be important?
?
Primary responsibility?
Your safety and safety of others:
- Make sure grounding pin on 110 device is intact.
- Never work on device until it is powered down and unlplugged (or battery is out)
- wall power is 115V at 60 cycles, can stop heart
- capacitors in power supplies and CRT monitors and laptop LCDs can retain lethal power
when not to wear ESD bracelet?
around high voltage
minimum fire protection?
class C fire extinguisher, made for electrical fires
msds
material safety data sheet; proper disposal
peripherals
crt: discharge high voltage first; power supplies are ield replaceable; laser printers, optical drive, fiber optic cable will allblind you; don’t inhale toner; fuser rollers are hot;
ESD that can damage components in V, that can be felt
100V or less, feel it at 3000V
reduce risk of ESD
- touch computer case
- static mat/floor mat
- don’t touch component leads
- store components in static-shielded bag (grey) (pink and blue less protective)
- avoid plastic and styrofoam
- maintain humidity (humidity keeps air insulating, 70%+)
environmental concerns
- local disposal laws
- notebook batteries nicad nimh lih
- cathode ray tube monitors (chemicals+lethal charge)
- PC system
- printer cartridges
- cleaning solutions (denatured alcohol)
Basic forensics procedures
gathering legal evidence found on electronic devices
Identify, preserve, recover, and analyze.
Legally defensible audit trail.
Legal standards for computer evidence
- Authentic
- Reliably obtained
- Admissible
Gathering
- Live system (getting the info could destroy it)
- static image taken from live system
1) acquire info
2) analyze
3) create report
Forensics:
Acquire evidence
Take custody of system; document state (photos); interview witnesses; capture volatile data (cpu registers, cache, system ram, network connections, running processes—all of these only last nanoseconds to few seconds at most)
order of volatility
try to capture most volatile data first
obtaining HDD info
mirror drive; evidence-grade copy; may use hashes for authenticity
Analyzing evidence
volatile data
disk image (browser cache/cookies; page file/swap file)
any available video recordings
Sans Investigative Forensic Toolkit (free)
EnCase, FTK, Cofee
Reporting findings
- well-written, self-contained document (lawyer)
- describes incident, response, findings
also track hours/expenses
tools
screwdriver (jeweler’s); pliers; 3-prong extender; Integrated Circuit insertion/extraction tool; extension magnet; volt meter or multimeter (voltage, ohms, current, capacitance, continuity) (power supply tester is a specific one); Fox and Hound: tone generator + wand taht lets you trace from rj45 jack to wall closet!
cable tester- test continuity in network cable
loopback plug, attaches to physical components
know-good equipment (to replace potentially bad to check whether it is or not)
[don’t skimp]
maintenance
incl cleaning supply
70-74 degrees 40-70 % humidity separate/redundant cooling frequently clean protect from EMI (fiber optic immune) RFI disrupts wireless (2.4 GHz particularly susceptible; solve by going to 5GHz) magnetic fields
compressed air, lint free cloth, isopropyl/denatured alcohol, antistatic vacuum