Premium Essay

Nt1330 Unit 2.1

Submitted By
Words 839
Pages 4
2.1 Ways to safeguard the computer from Power outages, surges and other electrical variations:
Power surge refers to the time when the electricity flow is interrupted, then started again or when the electricity flowing is sent back into the system by something. It can also be caused by natural hazards such as the strike of a lightning, or heavy snow or ice. This damages a computer in such a way that the computer’s Power Supply Unit will no longer function, and therefore need to be replaced. This can be avoided using one of the following precautions:
The easiest way to avoid Power surges is to unplug the computer immediately after working on it.
For as Surge protectors are designed to absorb any electric current that goes above a certain voltage, …show more content…
Like power surge, this can also be caused by natural hazards such as lightning storms, or heavy snow fall. It can damage your computer placing the pressure on the wires in your computer, causing them to hit up and burn, furthermore, they may even melt. This can be avoided by unplugging the computer physically every time you are done working on it.
2.2 Ways to safeguard computers from unauthorized use and vandalism:
Preventing unauthorized use and vandalism can prevent people from installing spywares, deleting confidential files, and/or creating viruses. These can be avoided by: setting up the password protection. In this case you will firstly have to enable password that composed of the mixture of characters such as numbers, letters and symbols. Protect your password from being discovered and change it frequently over a short while.
Install protective hardware or software firewalls. A hardware firewall can often be set up through the network router and can protect all computers connected to the network. A software firewall involves installing the program that will protect only a specific

Similar Documents

Premium Essay

Nt1330 Unit 3 Assignment 2.1

...2.1.1 Threats A smartphone user is exposed to various threats when they use their phone. In just the last two quarters of 2012, the number of unique mobile threats grew by 261%. These threats can disrupt the operation of the smartphone, and transmit or modify user data. So applications must guarantee privacy and integrity of the information they handle. In addition, since some apps could themselves be malware, their functionality and activities should be limited (for example, restricting the apps from accessing location information via GPS, blocking access to the user's address book, preventing the transmission of data on the network, sending SMS messages that are billed to the user, etc.). There are three prime targets for attackers: o Data: smartphones are devices for data management, and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs); o Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person. For example, every mobile device can transmit information related to the owner of the mobile phone contract, and an attacker may want to steal the identity of the owner of a smartphone to commit other offenses; o Availability: attacking a smartphone can limit access to it and deprive the owner of its use. The source of these attacks are the same actors found in the non-mobile computing space: o Professionals, whether commercial...

Words: 739 - Pages: 3

Premium Essay

Nt1330 Unit 2.1 Research Paper

...2.1 ways to safeguard your computer 1. make sure and demonstrate that electricity levels used in your computer are Mostly created to use 220 volts of alternative current supplied at 60 hertz computer equipment is designed to use 220 volts of AC power supplied at 60 Hertz even though they may differ from standard but sometimes are significant 2. Make sure electrical equipment are in the right position because if not so some device like Surge protectors and UPS devices will not work according to the way it should function and sensitive hardware that needs to be protected will not be protected as the it would not be in a right position 3. avoid overloading circuits Splitting outlets because it lead to high demand which can lead to power failure of can lead to power failure and even fire hazard 4. Replace...

Words: 897 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment 2.1

...2.1.1 Threats A smartphone user is exposed to various threats when they use their phone. In just the last two quarters of 2012, the number of unique mobile threats grew by 261%. These threats can disrupt the operation of the smartphone, and transmit or modify user data. So applications must guarantee privacy and integrity of the information they handle. In addition, since some apps could themselves be malware, their functionality and activities should be limited (for example, restricting the apps from accessing location information via GPS, blocking access to the user's address book, preventing the transmission of data on the network, sending SMS messages that are billed to the user, etc.). There are three prime targets for attackers: o Data: smartphones are devices for data management, and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs); o Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person. For example, every mobile device can transmit information related to the owner of the mobile phone contract, and an attacker may want to steal the identity of the owner of a smartphone to commit other offenses; o Availability: attacking a smartphone can limit access to it and deprive the owner of its use. The source of these attacks are the same actors found in the non-mobile computing space: o Professionals, whether commercial...

Words: 1004 - Pages: 5

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Nt 1210

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18