33
System failure & wireless security

System failure

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: System  failure

System failure & wireless security

Page 2: System  failure

System Failure

- Is computer security risk-Prolonged malfunction of a computer

Page 3: System  failure

Effects

Loss of hardware, software, data and information

Page 4: System  failure

Reason• User error• Water / fluid• Dirt / dust• Heat• Cold

Page 5: System  failure

• Aging hardware• Natural disaster• Random events• Errors in computer programs• Electrical power variation

And other reasons……

Page 6: System  failure

Electrical Disturbance

• Noise• Undervoltage• Overvoltage / Power

surge• Momentary Interruption

Page 7: System  failure

Noise

Page 8: System  failure

Undervoltage

• Brownout / Sag

• Blackout

Page 9: System  failure

Overvoltage / Power Surge

• Surge

• Spike

Page 10: System  failure

Momentary Interruption

Page 11: System  failure

Safeguards against System Failure

Page 12: System  failure

Surge protector

Page 13: System  failure

Function of surge protector• Protect electric component from

‘’surgers’’• Protect the computer and other

equipment from large overvoltages and undervoltages.

Page 14: System  failure

What actions we can do to Protect our

surge protectors???

Page 15: System  failure

metal oxide varistor (MOV)

1.Replacing a surge protector every two

to three years.2.More expensive,

the more protection of the protectors

offers.

Page 16: System  failure

How we know the surge protector we purchase is the

best one???Safety specification-Underwritters

Laboratories(UL)1449 standard.The Joule rating of the surge protectors.

(higher joule rating ,the better protection)-review the manufacture’s guarantee

Page 17: System  failure

UPS(Uninterrupted Power Supply)

• UPS = Surge protection circuits + 1 or more batteries

• UPS provides power during loss of power

• You connect a UPS between your computer and power source

COMPUTER – UPS – POWER SOURCE

Page 18: System  failure

Types of UPS Don’t worry there are only two of them

Standby/Offline

• Switches to battery power when power offline .

• Amount of time to continue using your computer depends on electric requirement of the computer and size of the batteries.

• Less expensive

Online• Always runs off battery• Provides continuous

protection• More expensive

Page 19: System  failure

Duplicate Components/ Fault-tolerant Computer

Fault-tolerant computer has duplicate computers so

that it can continue to operate when one of its main components fail

Some Companies have fault-tolerant computers working simultaneously so that their computers are always running.

For example,airline tickets reservation,automated teller machine.

Page 20: System  failure

WIRELESS SECURITY

Page 21: System  failure

Home user set up wireless home network.

Mobile user access wireless networks in hot sport at airport, hotels, shopping mall and so on.

Although wireless access provides many conveniences, it also posses additional security risk.

Page 22: System  failure

WHAT IS WIRELESS SECURITY?

It is the prevention of unauthorized access to computer using wireless networks.

Page 23: System  failure

TYPES OF WIRELESS SECURITY

a) WEP (Wireless Equivalent Privacy)• Is one of the least secure form of security

b) WPA (Wi-Fi Protected Access)• Is a quick alternative to improve security

over WEP

Page 24: System  failure

TIPS FOR WIRELESS HOME NETWORK SECURITY

Page 25: System  failure

1.CHANGE DEFAULT ADMINISTRATOR PASSWORD

•The password provided are simple and very well-known to hackers on Internet

Page 26: System  failure

2.TURN ON WPA ENCRYPTION

Encryption technology scrambles messages sent over wireless network , so they cannot easily read by humans.

Page 27: System  failure

3.CHANGE THE DEFAULT SSID

Change your network’s SSID to something unique .

Page 28: System  failure

4.ENABLE MAC ADDRESS FILTERING With MAC address filtering, you

specify which computers can access your network.

Page 29: System  failure

5. DO NOT AUTO-CONNECT TO OPEN WI-FI NETWORKS

Page 30: System  failure

6. ASSIGN STATIC IP ADDRESS TO DEVICES

DHCP (Dynamic Host Configuration Protocol)technology

Network attackers can easily obtain valid IP addresses from your network's DHCP pool.

Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match.

Use a private IP address range (like 10.0.0.x)

Page 31: System  failure

7. ENABLE FIREWALLS ON EACH COMPUTER AND THE ROUTER

Page 32: System  failure

8. POSITION THE ROUTER OR ACCESS POINT SAFELY Wi-Fi signals leakage - easier for others to

detect and exploit. Try to position the access point or router

near the centre of the home rather than near windows -minimize leakage.

Page 33: System  failure

9. TURN OFF THE NETWORK DURING EXTENDED PERIOD OF NON-USE

If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi-Fi on a broadband router without powering down the entire network.