Wednesday, February 18, 2009

Threat to information security

Natural disasters

A natural disaster is the consequence of a natural hazard (e.g. volcanic eruption, earthquake, hurricanes, tornados, lightning, landslide or fire) which affects human activities. Human vulnerability, exacerbated by the lack of planning or appropriate emergency management, leads to financial, environmental or human losses.
In this cases, act of god can cause catastrophic loss of systems and data. The threat of natural disaster ha exited since the introduction of computer system, but consequences continue to increase as organization become more dependent upon the reliable, real time functioning of their systems and ready access to large databases.

Example:

Flood:

When a single drop of water can short out your computer, what when the whole equipment is completely submerged in the river water. Calculate the extent of damage when it is sunken not only for an hour but for days. However, no matter what, your data can still be recovered if you follow the following measures.

• Make sure that you turn off the computer and do not turn it on. It is because the drive may seem dry but there is small amount of water, which may still be present on the components and can cause a short when powered on.

• You may think that drying the wet drive may be of help but it is not the case. However, dried water leaves contaminants on the drive and can cause a head crash to occur when the system is powered on. Hence, it is recommended to place the media in a plastic airtight bag instead.

• Do not store your mission critical data in a flood plain.

Fire Damage:

When the fire catches your computer, it may damage the plastic encasings and components of the computer but the data present in the metal hard drive may still be recovered. There are many data recovery software & Service companies, which provide data recovery from fire damages.

When the fire strikes, you can do a bit from your end to lessen the extent of damage.

• When your computer becomes wet from fire hoses, take the wet hard drive out of the system and do not dry; instead place it in a plastic and airtight bag. It is because during a fire, with the help of small air vents, extreme pressure changes pull the contaminants and water inside the drive.

• If you notice that you are not able to pull the hard drive out of the melted computer because it is sealed, then leave it like that.


Power outage/ surge:


Power outages are known to be the most common cause of data loss than all other natural disasters.

When you notice a spark, smoke or you observe that your hard drive does not spin and if it is, you are unable to access the information, then your system might be victim of a power surge. Power problems caused by small surges, spikes, sparks and line sags in the electricity make it essential to protect servers, workstations, and networks.

When you think of preventing data loss due to power supply problems, you automatically think of connecting your system to a UPS (Uninterrupted power supply), surge protectors, isolation transformers, or a surge suppressor. However, you can follow these protective measures to prevent your computer from a disastrous effect.

• Make sure that you unplug all the power cords connected to your system in order to prevent further damage to have occurred. The cords could be a power cable, modem, printer, or network cable.

• The most severe damage to your hard drive occurs when the power supply returns. Therefore, after the power returns, wait for at least half an hour for the power to get stabilized and then you may power on the computer.

• UPS main objective is to provide continuous, sufficient-grade power to electronics possessing valuable information. So, make sure that you connect your system with a UPS or a surge protector to prevent your computer from further power attacks. It is for the reason that extreme power fluctuations can damage sensitive electronic components.

You can protect your valuable information from getting destroyed by the evil effects of a disaster by following the above-mentioned preventive measures.

Since, it is statistically unlikely for natural disasters to occur in two locations simultaneously. Hence, the perfect solution to protect your system from a natural disaster is an offsite backup i.e. you can keep your data in two different locations away from each other.

example:
1. Hurricane at Miami Florida, 6 Dec 1994.
2. Flash flood at Nepal, 2000.
3. Fire at World Trade Center of America, 11 Sept 2000.

Natural disasters!


Volcano, mount of Fiji

Lightning, Kentucky USA

Tornado, Texas

Fire, Ohio

Tuesday, January 27, 2009

New task!

1. Find at least ONE website (give the URL) that you find as cybersquatting site. Cannot be the same site as your friend....
• http://www.panasonic.com
• http://www.panasonic.net
• http://www.pensonic.com.my

2. Go to OPAC IIUM, find three books from Law, Human Science and Technology. Get the call numbers and ISBN numbers....

1)LAW
Law and justice : an introduction / Richard A. Myren
ISBN : 0534081126
Call number : d61 KF384M998L

2)HUMAN SCIENCES

The new book of popular science
Call No: Q162N532G
ISBN: 00000092800

3)TECHNOLOGY

Title: Essentials of educational technology
Author: Schwartz, James E.
Call Number: 372.0285 SCH 1999
ISBN: 00000001982


3. Explore Bro. Asmady blog and tell me at least 3 things you like about his blog....
• The blog give many information to the student.
• There are many pictures and graphic.
• The templates is nice and attractive.

4. Name the URL for Kulliyah of ICT.
• http://kict.iiu.edu.my

5.Go to CFS IIUM Library, find 10 books that categorized under Red spot collections...
• Managing information systems & technologies
• The National economic policies of America
• perspectives on the social study of science
• Islam and the search for a social order in modern Egypt
• Human Biology by Micheal D Johnson
• Pre calculus by Sullivan.
• University physics by Jeff sanny and William moebs
• College Math ( The managerial life and social sciences ) 5th edition
• TAN applied calculus (6th edition)
• Biological science 3rd edition by Scott Freeman

lets join me my frens..



Israel laknatullah

Monday, January 26, 2009

...


Pyzam Family Sticker Toy

Get your own Family Sticker Maker & MySpace Layouts.




Save Gaza




PORTER’S COMPETITIVES FORCES



Microsoft and AMD are the most popular and well known companies that manufactured computer and pc gadgets. Although they are major in the field but they cannot escaped from the challenge of the competitive market situation. There are the examples that the companies have to face to be the best among them.
1. The threat of entry from the new competitors.
Now a days, many new companies growth in the globalization and technology world. Many new products are sold in the market even though it has same function, quality and design. So, it has to compete each other to survive with the products that have been a while in the market. For example, Microsoft has to improve their ability to comete with AMD, but both of them must compete with the other new brand.
2. The bargaining power from the suppliers.
The source and material are important to make a product but suppliers always change it prices according to the market price. For example, AMD is more cheap than Microsoft. The price also affect from the situation of the world economy that is never constant. So, the manufacture companies must be smart and careful to make a decision before dealing with the suppliers.
3. The bargaining power from the customers.
Customers are the main thing in selling products. Some of the customer want the most powerful performance of the product. Remember, customer always right. So, to be the most trustful product, it has to fulfill the customers need. Most customers do not search for the famous products in the market but they will find the products that are satisfy with their need. Normally, customer will persuaded by the advertisement of the product.
4. The threat of substitute product of term`s.
Price of the products cannot change so frequently. It will affect the customers trust to the products. The price must suitable according to the products. Most customers will search for the cheapest products in the market but has the same function and quality with the other. For example, AMD provided the cheap price of motherboard than intel.
5. The rivalry among exists firms.
Many products in the market have the same function which make the customers cannot choose the better products. So, the manufacture companies has to upgrades, and make it as their trade mark to maintain their products as the most reliable in the market.

In brief, as a big company in this industry we have to makes a strategies by using this five Porter’s competitive force model. This model will helps and shows you the best way to become a very successful company in the world.

Template by:
Free Blog Templates