Know and understand scanning the storage media used to transfer data

Published by Patrick Mutisya · 14 days ago

ICT 0417 – Networks and the Effects of Using Them: Scanning Storage Media

4. Networks and the Effects of Using Them

Objective

Know and understand scanning the storage media used to transfer data.

1. Why Scan Storage Media before Transfer?

  • Prevent the spread of viruses, malware and ransomware.
  • Detect corrupted files that could cause data loss.
  • Verify that the correct files are being transferred.
  • Maintain network performance by avoiding unnecessary retransmissions.

2. Common Types of Portable Storage Media

MediaTypical CapacityTypical UseScanning Considerations
USB Flash Drive4 GB – 2 TBQuick file exchange, backupsAuto‑run disabled, full‑disk scan for malware
External Hard Disk (HDD/SSD)500 GB – 8 TBLarge data sets, media archivesSector‑by‑sector scan, check for bad blocks
Compact Disc (CD) / D \cdot D700 MB – 9.4 GBSoftware distribution, archivalRead‑only scan for viruses, verify disc integrity
Memory Card (SD, microSD)2 GB – 1 TBCamera/photos, mobile devicesQuick scan for malware, check file system health
Network‑Attached Storage (NAS) USB‑connected1 TB – 100 TBShared team resources, backupScheduled scans, real‑time monitoring

3. Scanning Process – Step by Step

  1. Connect the media to a trusted computer that has up‑to‑date anti‑virus/anti‑malware software.
  2. Enable write protection if the media supports it (e.g., physical lock on SD cards).
  3. Run a quick scan to catch obvious threats.
  4. Run a full scan (including deep or heuristic analysis) for thorough checking.
  5. Check for file system errors using built‑in utilities (e.g., chkdsk on Windows, fsck on Linux).
  6. Verify file integrity where possible (checksums, hashes).
  7. Remove or quarantine any detected threats before proceeding with data transfer.
  8. Safely eject the media to avoid corruption.

4. Effects of Scanning on Network Use

  • Bandwidth preservation: Clean files reduce the need for retransmission caused by corrupted packets.
  • Security of shared resources: Scanned media protect shared network drives and servers from infection.
  • Performance impact: Scanning can temporarily increase CPU and disk usage; schedule full scans during off‑peak hours.
  • Compliance: Many organisations require documented scanning procedures to meet data‑protection regulations.

5. Best Practices for Students and Teachers

  • Always keep anti‑virus definitions up to date.
  • Use reputable scanning software; avoid “free” tools that lack regular updates.
  • Prefer network‑based file transfer (e.g., cloud storage) over physical media when possible, but still scan any downloaded files.
  • Maintain a backup of original data before performing any repair or cleaning operations.
  • Document the scanning results – date, media type, software used, and any actions taken.

Suggested diagram: Flowchart showing the scanning process from connection to safe ejection, with decision points for threat detection and file integrity checks.

6. Quick Revision Checklist

  • Identify the type of storage media you are using.
  • Know the appropriate scanning software and settings for that media.
  • Remember the steps: connect → quick scan → full scan → error check → verify → clean → eject.
  • Understand how scanning protects the network: security, bandwidth, performance, compliance.
  • Apply best practice guidelines in school projects and real‑world scenarios.