6.2 Explain methods to secure devices and best practices.
📘CompTIA ITF+ (FC0-U61)
1. Software Sources
Software is any program or application you install on your computer or mobile device. Installing software safely is critical because malicious or poorly designed programs can cause damage or steal data.
There are three important points to remember:
a. Validating legitimate sources
- Always check that the software you are downloading is from a trusted source.
- Trusted sources include official company websites or verified app stores like Microsoft Store, Apple App Store, or Google Play Store.
- Look for digital signatures or certificates that confirm the software is genuine.
- Example in IT: If you need to install Adobe Acrobat, go to Adobe’s official website rather than downloading from a random download site. This ensures it’s the real program and not a virus disguised as Adobe Acrobat.
b. Researching legitimate sources
- Before installing, do a quick search to confirm the software and the website are legitimate.
- Check reviews, official documentation, or IT forums to verify that it’s safe.
- Example in IT: Before using a third-party PDF converter, IT professionals may check forums like Stack Overflow or the vendor’s website for reviews to ensure it is safe and widely used.
c. OEM websites vs. third-party websites
- OEM (Original Equipment Manufacturer) websites: These are the official sites of the company that made the software or hardware. These are the safest sources.
- Example: Downloading HP printer drivers from hp.com.
- Third-party websites: These are other websites not operated by the company. They may be risky because they can modify software to include malware or ads.
- Tip: Only use reputable third-party sites, and verify the files with checksums if possible.
2. Removal of Unwanted Software
Unwanted software is any program you didn’t intend to install or no longer need. It can slow down your device or open security holes.
- Always check your installed programs and remove anything unnecessary.
- Use built-in tools like Windows “Add or Remove Programs”, macOS “Applications folder”, or Linux package managers.
- Example in IT: If a device has multiple old browser toolbars installed, removing them helps speed up the device and reduces potential vulnerabilities.
3. Removal of Unnecessary Software
Unnecessary software is similar to unwanted software but may include programs that are not harmful but are no longer used.
- Removing unused programs reduces clutter and frees up system resources.
- Example in IT: If a workstation has old database management software installed but the user only works with the cloud database, uninstalling the old software avoids confusion and keeps the system clean.
4. Removal of Malicious Software
Malicious software, or malware, is software designed to damage, steal, or spy on your data. Examples include viruses, spyware, ransomware, and trojans.
Steps to remove malware:
- Use a trusted antivirus or anti-malware tool.
- Run a full system scan.
- Follow instructions to quarantine or delete infected files.
- Keep the software up to date to detect new threats.
- Example in IT: If a user downloads a suspicious email attachment and the antivirus detects a trojan, it will quarantine the file. The IT team can then remove it safely without affecting other files.
✅ Key Takeaways for the Exam
- Always get software from trusted sources – OEM websites are safest, third-party sites require verification.
- Research before installing software – check legitimacy and reviews.
- Remove unwanted, unnecessary, or malicious software – it keeps devices faster, safer, and more secure.
- Use antivirus and system tools to detect and remove threats.
This section basically tests your understanding of safe software practices. If you remember: “Trust sources, verify software, remove the bad stuff”, you’ll be ready for any question on this topic.
