System failure

1,365 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,365
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
21
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

System failure

  1. 1. System failure &wireless security
  2. 2. System Failure- Is computer security risk-Prolonged malfunction ofa computer
  3. 3. Effects Loss ofhardware, software, data andinformation
  4. 4. Reason• User error• Water / fluid• Dirt / dust• Heat• Cold
  5. 5. • Aging hardware• Natural disaster• Random events• Errors in computer programs• Electrical power variationAnd other reAsons……
  6. 6. Electrical Disturbance• Noise• Undervoltage• Overvoltage / Power surge• Momentary Interruption
  7. 7. Noise
  8. 8. Undervoltage• Brownout / Sag• Blackout
  9. 9. Overvoltage / Power Surge• Surge• Spike
  10. 10. Momentary Interruption
  11. 11. Safeguards against System Failure
  12. 12. Surge protector
  13. 13. Function of surge protector• Protect electric component from ‘’surgers’’• Protect the computer and other equipment from large overvoltages and undervoltages.
  14. 14. What actions we can do to Protect our surge protectors???
  15. 15. 1.Replacing a surge protector every two to three years. 2.More expensive, the more protection of the protectors offers.metal oxide varistor (MOV)
  16. 16. How we know the surge protector we purchase is the best one??? Safety specification-Underwritters Laboratories(UL)1449 standard. The Joule rating of the surge protectors.(higher joule rating ,the better protection) -review the manufacture’s guarantee
  17. 17. UPS(Uninterrupted Power Supply)• UPS = Surge protection circuits + 1 or more batteries• UPS provides power during loss of power• You connect a UPS between your computer and power source COMPUTER – UPS – POWER SOURCE
  18. 18. Types of UPS Don’t worry there are only two of them Standby/Offline Online • Always runs off battery• Switches to battery power when power offline . • Provides continuous protection• Amount of time to continue using your • More expensive computer depends on electric requirement of the computer and size of the batteries.• Less expensive
  19. 19. Duplicate Components/ Fault-tolerant ComputerFault-tolerant computer has duplicate computersso that it can continue to operate when one of itsmain components failSome Companies have fault-tolerant computersworking simultaneously so that their computersare always running. For example,airline tickets reservation,automatedteller machine.
  20. 20.  Home user set up wireless home network. Mobile user access wireless networks in hot sport at airport, hotels, shopping mall and so on. Although wireless access provides many conveniences, it also posses additional security risk.
  21. 21. WHAT IS WIRELESS SECURITY? It is the prevention of unauthorized access to computer using wireless networks.
  22. 22. TYPES OF WIRELESS SECURITYa) WEP (Wireless Equivalent Privacy) • Is one of the least secure form of securityb) WPA (Wi-Fi Protected Access) • Is a quick alternative to improve security over WEP
  23. 23. TIPS FOR WIRELESSHOME NETWORKSECURITY
  24. 24. 1.CHANGE DEFAULT ADMINISTRATOR PASSWORD•Thepassword provided are simple and very well-known to hackers on Internet
  25. 25. 2.TURN ON WPA ENCRYPTION Encryption technology scrambles messages sent over wireless network , so they cannot easily read by humans.
  26. 26. 3.CHANGE THE DEFAULT SSID Change your network’s SSID to something unique .
  27. 27. 4.ENABLE MAC ADDRESSFILTERING With MAC address filtering, you specify which computers can access your network.
  28. 28. 5. DO NOT AUTO-CONNECT TO OPEN WI-FINETWORKS
  29. 29. 6. ASSIGN STATIC IPADDRESS TO DEVICES DHCP (Dynamic Host Configuration Protocol)technology Network attackers can easily obtain valid IP addresses from your networks DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range (like 10.0.0.x)
  30. 30. 7. ENABLE FIREWALLS ONEACH COMPUTER AND THEROUTER
  31. 31. 8. POSITION THEROUTER OR ACCESSPOINT SAFELY Wi-Fi signals leakage - easier for others to detect and exploit. Try to position the access point or router near the centre of the home rather than near windows - minimize leakage.
  32. 32. 9. TURN OFF THENETWORK DURINGEXTENDED PERIOD OFNON-USE If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi- Fi on a broadband router without powering down the entire network.

×