Skip to content

Safety & Reliability

1. Physical Safety & Ergonomics (Fyzická bezpečnost)

  • Electrical Safety: Always turn off the computer and disconnect it from the mains (power source) before opening the case or disassembling hardware.

  • Static Electricity: Use an anti-static wrist strap to prevent damaging sensitive components like the motherboard.

  • Ergonomics (Protecting the body): * IT professionals sit all day, so proper posture is crucial.

    • The monitor should be at eye level (eye distance) to prevent neck pain.

    • You should use an ergonomic chair and take regular breaks to stretch.

2. System Reliability & Network Security (Spolehlivost)

  • HW & SW Compatibility: The hardware must be strong enough to run the software smoothly. If a server is overloaded, the system crashes.

  • Redundancy & Backups: Always back up your data. In professional IT, we use redundancy (having multiple backup servers) so if one fails, the system stays online.

  • Network Rules: Configure the firewall properly. You must close all unused application ports to prevent unauthorized access from the outside.

  • Ensure Software is up to date: Update your OS frequently, use antiviruses..

3. Personnel & The Human Factor

  • Human error is the biggest vulnerability in any IT system.

  • Employees must be properly educated and trained. They need to know how to create strong passwords and how to recognize dangerous emails.

4. Cybersecurity Threats (Your main time-killer)

  • Malware: The general term for "malicious software".

  • Viruses: Programs that attach themselves to clean files and infect other computers when the files are shared.

  • Worms: Similar to viruses, but they don't need human action. They replicate and spread automatically across networks.

  • Trojan Horses: Malware disguised as legitimate, harmless software (like a game or a tool). Once you install it, it attacks your system from the inside.

  • Spyware: Secretly monitors user activity, collects personal data, and logs keystrokes (keyloggers) to steal passwords.

  • Ransomware: The most dangerous threat today. It encrypts all your files and demands a financial ransom (usually in Bitcoin) for the decryption key.

  • Phishing: A social engineering attack. Hackers send fake emails that look like they are from your bank or a real company, tricking you into giving them your login credentials.

Speaking Strategy for the Exam:

Start with the physical stuff (ergonomics and electricity) because it's quick and easy. Then transition to the software side: "However, protecting the hardware is not enough. We also have to protect the data." Then just list the types of malware. Since you build software and configure Linux servers, just talk about how you secure them (e.g., using firewalls, closing ports, keeping dependencies updated). That alone sounds like a professional presentation, not just a high school exam.