SlideShare ist ein Scribd-Unternehmen logo
1 von 33
System failure &
wireless security
System Failure
- Is computer security risk
-Prolonged malfunction of
a computer
Effects
 Loss of
hardware, software, data and
information
Reason
•   User error
•   Water / fluid
•   Dirt / dust
•   Heat
•   Cold
•   Aging hardware
•   Natural disaster
•   Random events
•   Errors in computer programs
•   Electrical power variation

And other reAsons……
Electrical Disturbance
• Noise
• Undervoltage
• Overvoltage / Power
  surge
• Momentary Interruption
Noise
Undervoltage
• Brownout / Sag




• Blackout
Overvoltage / Power Surge
• Surge




• Spike
Momentary Interruption
Safeguards against
  System Failure
Surge protector
Function of surge protector
• Protect electric component from
  ‘’surgers’’
• Protect the computer and other
  equipment from large overvoltages and
  undervoltages.
What actions we can do to
      Protect our
  surge protectors???
1.Replacing a surge
             protector every two
                to three years.
              2.More expensive,
             the more protection
               of the protectors
                    offers.

metal oxide varistor (MOV)
How we know the surge
 protector we purchase is the
         best one???
    Safety specification-Underwritters
     Laboratories(UL)1449 standard.
 The Joule rating of the surge protectors.
(higher joule rating ,the better protection)
  -review the manufacture’s guarantee
UPS(Uninterrupted Power
         Supply)
• UPS = Surge protection circuits + 1 or more
  batteries

• UPS provides power during loss of power

• You connect a UPS between your computer
  and power source
      COMPUTER – UPS – POWER SOURCE
Types of UPS
                      Don’t worry there are only two of them




 Standby/Offline                                               Online
                                                • Always runs off battery
• Switches to battery power
  when power offline .                          • Provides continuous
                                                  protection
• Amount of time to
  continue using your                           • More expensive
  computer depends on
  electric requirement of
  the computer and size of
  the batteries.
• Less expensive
Duplicate Components/ Fault-tolerant
                Computer

Fault-tolerant computer has duplicate computers
so that it can continue to operate when one of its
main components fail

Some Companies have fault-tolerant computers
working simultaneously so that their computers
are always running.
 For example,airline tickets reservation,automated
teller machine.
 Home user set up wireless home network.
 Mobile user access wireless networks in
  hot sport at airport, hotels, shopping mall
  and so on.
 Although wireless access provides many
  conveniences, it also posses additional
  security risk.
WHAT IS WIRELESS SECURITY?

   It is the prevention of unauthorized access
    to computer using wireless networks.
TYPES OF WIRELESS SECURITY

a)       WEP (Wireless Equivalent Privacy)
     •     Is one of the least secure form of security


b)       WPA (Wi-Fi Protected Access)
     •     Is a quick alternative to improve security over
           WEP
TIPS FOR WIRELESS
HOME NETWORK
SECURITY
1.CHANGE DEFAULT
 ADMINISTRATOR
 PASSWORD

•Thepassword provided are simple and very well-
known to hackers on Internet
2.TURN ON WPA ENCRYPTION

   Encryption technology scrambles
    messages sent over wireless network , so
    they cannot easily read by humans.
3.CHANGE THE DEFAULT SSID
   Change your network’s SSID to something
    unique .
4.ENABLE MAC ADDRESS
FILTERING
   With MAC address filtering, you specify
    which computers can access your
    network.
5. DO NOT AUTO-
CONNECT TO OPEN WI-FI
NETWORKS
6. ASSIGN STATIC IP
ADDRESS TO DEVICES
   DHCP (Dynamic Host Configuration
    Protocol)technology
   Network attackers can easily obtain valid IP
    addresses from your network's DHCP pool.
    Turn off DHCP on the router or access point, set a
    fixed IP address range instead, then configure each
    connected device to match.
   Use a private IP address range (like 10.0.0.x)
7. ENABLE FIREWALLS ON
EACH COMPUTER AND THE
ROUTER
8. POSITION THE
ROUTER OR ACCESS
POINT SAFELY
   Wi-Fi signals leakage - easier for others to detect
    and exploit.
   Try to position the access point or router near the
    centre of the home rather than near windows -
    minimize leakage.
9. TURN OFF THE
NETWORK DURING
EXTENDED PERIOD OF
NON-USE
   If you own a wireless router but are only using it
    wired (Ethernet) connections, you can turn off Wi-
    Fi on a broadband router without powering down
    the entire network.

Weitere ähnliche Inhalte

Was ist angesagt?

Network security
Network securityNetwork security
Network securityEstiak Khan
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Computer networking
Computer networkingComputer networking
Computer networkingChinmoy Jena
 
Embedded System Tools ppt
Embedded System Tools  pptEmbedded System Tools  ppt
Embedded System Tools pptHalai Hansika
 
Basic components of a computer network
Basic components of a computer  network Basic components of a computer  network
Basic components of a computer network Edison Francis
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
Devices and gateways
Devices and gatewaysDevices and gateways
Devices and gatewaysNikil S Raaju
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Subhasis Dash
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Introduction to AVR Microcontroller
Introduction to AVR Microcontroller Introduction to AVR Microcontroller
Introduction to AVR Microcontroller Mahmoud Sadat
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cyber security
Cyber securityCyber security
Cyber security
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Subnetting
SubnettingSubnetting
Subnetting
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Embedded System Tools ppt
Embedded System Tools  pptEmbedded System Tools  ppt
Embedded System Tools ppt
 
Basic components of a computer network
Basic components of a computer  network Basic components of a computer  network
Basic components of a computer network
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Devices and gateways
Devices and gatewaysDevices and gateways
Devices and gateways
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1)
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to AVR Microcontroller
Introduction to AVR Microcontroller Introduction to AVR Microcontroller
Introduction to AVR Microcontroller
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 

Andere mochten auch

Computer hardware, and network
Computer hardware, and networkComputer hardware, and network
Computer hardware, and networkIkuru Kanuma
 
How GPS works
How GPS worksHow GPS works
How GPS worksAmit Garg
 
Presentation 18 - Plant Hormones (Notes)
Presentation 18 - Plant Hormones (Notes)Presentation 18 - Plant Hormones (Notes)
Presentation 18 - Plant Hormones (Notes)Ma'am Dawn
 
3 definition of operating systems
3 definition of operating systems3 definition of operating systems
3 definition of operating systemsmyrajendra
 
Step by step how to create database with phpmyadmin
Step by step how to create database with phpmyadminStep by step how to create database with phpmyadmin
Step by step how to create database with phpmyadminFathimah Azkiya
 
File access methods.54
File access methods.54File access methods.54
File access methods.54myrajendra
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware ReliabilitySandeep Patalay
 
system software and application software, compiler, interpreter & assembler
system software  and application software, compiler, interpreter & assemblersystem software  and application software, compiler, interpreter & assembler
system software and application software, compiler, interpreter & assemblerchetan birla
 
Random Access Memory
Random Access Memory Random Access Memory
Random Access Memory rohitladdu
 
Top Ten Reasons Why Projects Fail
Top Ten Reasons Why Projects FailTop Ten Reasons Why Projects Fail
Top Ten Reasons Why Projects Failjpstewar
 
Software reliability
Software reliabilitySoftware reliability
Software reliabilityAnand Kumar
 

Andere mochten auch (20)

System failure
System failureSystem failure
System failure
 
Computer hardware, and network
Computer hardware, and networkComputer hardware, and network
Computer hardware, and network
 
Presentation1
Presentation1Presentation1
Presentation1
 
How GPS works
How GPS worksHow GPS works
How GPS works
 
Presentation 18 - Plant Hormones (Notes)
Presentation 18 - Plant Hormones (Notes)Presentation 18 - Plant Hormones (Notes)
Presentation 18 - Plant Hormones (Notes)
 
GPS and GIS
GPS and GISGPS and GIS
GPS and GIS
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
How GPS works
How GPS worksHow GPS works
How GPS works
 
How GPS Works
How GPS WorksHow GPS Works
How GPS Works
 
3 definition of operating systems
3 definition of operating systems3 definition of operating systems
3 definition of operating systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Step by step how to create database with phpmyadmin
Step by step how to create database with phpmyadminStep by step how to create database with phpmyadmin
Step by step how to create database with phpmyadmin
 
File access methods.54
File access methods.54File access methods.54
File access methods.54
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
 
Computer hw sw
Computer hw swComputer hw sw
Computer hw sw
 
system software and application software, compiler, interpreter & assembler
system software  and application software, compiler, interpreter & assemblersystem software  and application software, compiler, interpreter & assembler
system software and application software, compiler, interpreter & assembler
 
Random Access Memory
Random Access Memory Random Access Memory
Random Access Memory
 
Top Ten Reasons Why Projects Fail
Top Ten Reasons Why Projects FailTop Ten Reasons Why Projects Fail
Top Ten Reasons Why Projects Fail
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 

Ähnlich wie System failure

Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgEric Vanderburg
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Gridgueste0b5fe
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery Brian Pichman
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply (UPS)Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply (UPS)Panduit
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.pptUndeadban2
 
Wireless Local area networking power point
Wireless Local area networking  power pointWireless Local area networking  power point
Wireless Local area networking power pointsirajmohammed35
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Networkgaurav kumar
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 

Ähnlich wie System failure (20)

Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
final ppt.ppt
final ppt.pptfinal ppt.ppt
final ppt.ppt
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply (UPS)Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply (UPS)
 
Firewall
FirewallFirewall
Firewall
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
 
Wireless Local area networking power point
Wireless Local area networking  power pointWireless Local area networking  power point
Wireless Local area networking power point
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Arc –spark = surge in systems=
Arc –spark = surge in systems=Arc –spark = surge in systems=
Arc –spark = surge in systems=
 
Wireless security
Wireless securityWireless security
Wireless security
 
MVA slides lesson 3
MVA slides lesson 3MVA slides lesson 3
MVA slides lesson 3
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 

Mehr von chrispaul8676 (15)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
data representation
data representationdata representation
data representation
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Hackers
HackersHackers
Hackers
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software theft
Software theftSoftware theft
Software theft
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Kürzlich hochgeladen

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Kürzlich hochgeladen (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

System failure

  • 2. System Failure - Is computer security risk -Prolonged malfunction of a computer
  • 3. Effects Loss of hardware, software, data and information
  • 4. Reason • User error • Water / fluid • Dirt / dust • Heat • Cold
  • 5. Aging hardware • Natural disaster • Random events • Errors in computer programs • Electrical power variation And other reAsons……
  • 6. Electrical Disturbance • Noise • Undervoltage • Overvoltage / Power surge • Momentary Interruption
  • 8. Undervoltage • Brownout / Sag • Blackout
  • 9. Overvoltage / Power Surge • Surge • Spike
  • 11. Safeguards against System Failure
  • 13. Function of surge protector • Protect electric component from ‘’surgers’’ • Protect the computer and other equipment from large overvoltages and undervoltages.
  • 14. What actions we can do to Protect our surge protectors???
  • 15. 1.Replacing a surge protector every two to three years. 2.More expensive, the more protection of the protectors offers. metal oxide varistor (MOV)
  • 16. How we know the surge protector we purchase is the best one??? Safety specification-Underwritters Laboratories(UL)1449 standard. The Joule rating of the surge protectors. (higher joule rating ,the better protection) -review the manufacture’s guarantee
  • 17. UPS(Uninterrupted Power Supply) • UPS = Surge protection circuits + 1 or more batteries • UPS provides power during loss of power • You connect a UPS between your computer and power source COMPUTER – UPS – POWER SOURCE
  • 18. Types of UPS Don’t worry there are only two of them Standby/Offline Online • Always runs off battery • Switches to battery power when power offline . • Provides continuous protection • Amount of time to continue using your • More expensive computer depends on electric requirement of the computer and size of the batteries. • Less expensive
  • 19. Duplicate Components/ Fault-tolerant Computer Fault-tolerant computer has duplicate computers so that it can continue to operate when one of its main components fail Some Companies have fault-tolerant computers working simultaneously so that their computers are always running. For example,airline tickets reservation,automated teller machine.
  • 20.
  • 21.  Home user set up wireless home network.  Mobile user access wireless networks in hot sport at airport, hotels, shopping mall and so on.  Although wireless access provides many conveniences, it also posses additional security risk.
  • 22. WHAT IS WIRELESS SECURITY?  It is the prevention of unauthorized access to computer using wireless networks.
  • 23. TYPES OF WIRELESS SECURITY a) WEP (Wireless Equivalent Privacy) • Is one of the least secure form of security b) WPA (Wi-Fi Protected Access) • Is a quick alternative to improve security over WEP
  • 24. TIPS FOR WIRELESS HOME NETWORK SECURITY
  • 25. 1.CHANGE DEFAULT ADMINISTRATOR PASSWORD •Thepassword provided are simple and very well- known to hackers on Internet
  • 26. 2.TURN ON WPA ENCRYPTION  Encryption technology scrambles messages sent over wireless network , so they cannot easily read by humans.
  • 27. 3.CHANGE THE DEFAULT SSID  Change your network’s SSID to something unique .
  • 28. 4.ENABLE MAC ADDRESS FILTERING  With MAC address filtering, you specify which computers can access your network.
  • 29. 5. DO NOT AUTO- CONNECT TO OPEN WI-FI NETWORKS
  • 30. 6. ASSIGN STATIC IP ADDRESS TO DEVICES  DHCP (Dynamic Host Configuration Protocol)technology  Network attackers can easily obtain valid IP addresses from your network's DHCP pool.  Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match.  Use a private IP address range (like 10.0.0.x)
  • 31. 7. ENABLE FIREWALLS ON EACH COMPUTER AND THE ROUTER
  • 32. 8. POSITION THE ROUTER OR ACCESS POINT SAFELY  Wi-Fi signals leakage - easier for others to detect and exploit.  Try to position the access point or router near the centre of the home rather than near windows - minimize leakage.
  • 33. 9. TURN OFF THE NETWORK DURING EXTENDED PERIOD OF NON-USE  If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi- Fi on a broadband router without powering down the entire network.