Function of surge protector• Protect electric component from ‘’surgers’’• Protect the computer and other equipment from large overvoltages and undervoltages.
What actions we can do to Protect our surge protectors???
1.Replacing a surge protector every two to three years. 2.More expensive, the more protection of the protectors offers.metal oxide varistor (MOV)
How we know the surge protector we purchase is the best one??? Safety specification-Underwritters Laboratories(UL)1449 standard. The Joule rating of the surge protectors.(higher joule rating ,the better protection) -review the manufacture’s guarantee
UPS(Uninterrupted Power Supply)• UPS = Surge protection circuits + 1 or more batteries• UPS provides power during loss of power• You connect a UPS between your computer and power source COMPUTER – UPS – POWER SOURCE
Types of UPS Don’t worry there are only two of them Standby/Offline Online • Always runs off battery• Switches to battery power when power offline . • Provides continuous protection• Amount of time to continue using your • More expensive computer depends on electric requirement of the computer and size of the batteries.• Less expensive
Duplicate Components/ Fault-tolerant ComputerFault-tolerant computer has duplicate computersso that it can continue to operate when one of itsmain components failSome Companies have fault-tolerant computersworking simultaneously so that their computersare always running. For example,airline tickets reservation,automatedteller machine.
Home user set up wireless home network. Mobile user access wireless networks in hot sport at airport, hotels, shopping mall and so on. Although wireless access provides many conveniences, it also posses additional security risk.
WHAT IS WIRELESS SECURITY? It is the prevention of unauthorized access to computer using wireless networks.
TYPES OF WIRELESS SECURITYa) WEP (Wireless Equivalent Privacy) • Is one of the least secure form of securityb) WPA (Wi-Fi Protected Access) • Is a quick alternative to improve security over WEP
6. ASSIGN STATIC IPADDRESS TO DEVICES DHCP (Dynamic Host Configuration Protocol)technology Network attackers can easily obtain valid IP addresses from your networks DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range (like 10.0.0.x)
7. ENABLE FIREWALLS ONEACH COMPUTER AND THEROUTER
8. POSITION THEROUTER OR ACCESSPOINT SAFELY Wi-Fi signals leakage - easier for others to detect and exploit. Try to position the access point or router near the centre of the home rather than near windows - minimize leakage.
9. TURN OFF THENETWORK DURINGEXTENDED PERIOD OFNON-USE If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi- Fi on a broadband router without powering down the entire network.