Ensuring Integrity and Availability

Slides:



Advertisements
Similar presentations
RAID (Redundant Arrays of Independent Disks). Disk organization technique that manages a large number of disks, providing a view of a single disk of High.
Advertisements

RAID Oh yes Whats RAID? Redundant Array (of) Independent Disks. A scheme involving multiple disks which replicates data across multiple drives. Methods.
Network+ Guide to Networks 5th Edition
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Monitoring and Troubleshooting Servers
Chapter Thirteen Maintaining and Upgrading a Network.
Network+ Guide to Networks 6th Edition
Chapter 7: Configuring Server Storage, Backup, and Performance Options
Network+ Guide to Networks, Fourth Edition
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Concepts of Database Management Seventh Edition
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Introduction to Computer Networks Introduction to Computer Networks.
Chapter Sixteen Data Recovery and Fault Tolerance.
Hands-On Microsoft Windows Server 2008
Concepts of Database Management Sixth Edition
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Lecture 9 of Advanced Databases Storage and File Structure (Part II) Instructor: Mr.Ahmed Al Astal.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
IT Infrastructure Chap 1: Definition
Concepts of Database Management Eighth Edition
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
1 Selecting LAN server (Week 3, Monday 9/8/2003) © Abdou Illia, Fall 2003.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Disaster Recovery and Business Continuity Planning.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Group 2 Bernard Smith Thomas Laborde Hannah Prather Fault Tolerance Environment Power Topology and Connectivity Servers Hurricane Preparedness Network.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
CEG 2400 FALL 2012 Chapter 14 Ensuring Integrity and Availability 1Ensuring Integrity and Availability.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Chapter 13 Ensuring Integrity and Availability. What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices,
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Chapter 6 Protecting Your Files
Network+ Guide to Networks 5th Edition
Managing Multi-User Databases
Processing Integrity and Availability Controls
Network+ Guide to Networks 5th Edition
RAID RAID Mukesh N Tekwani
Chapter 2: Operating-System Structures
Prepared by Jaroslav makovski
RAID RAID Mukesh N Tekwani April 23, 2019
Chapter 2: Operating-System Structures
Presentation transcript:

Ensuring Integrity and Availability Chapter Fourteen Ensuring Integrity and Availability

Objectives Identify the characteristics of a network that keep data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan

What Are Integrity and Availability? Soundness of a network’s programs, data, services, devices, and connections Availability Refers to how consistently and reliably a file system to be accessed by authorized personnel

Guidelines for Protecting Your Network Prevent anyone other than a network administrator from opening or changing the system files Monitor the network for unauthorized access or change Process of monitoring a network for unauthorized access to its devices is known as intrusion detection

Guidelines for Protecting Your Network Record authorized system changes in a change management system Install redundant components Situation in which more than one component is installed and ready to use for storing, processing, or transporting data is referred to as redundancy

Guidelines for Protecting Your Network Perform regular health checks on the network Monitor system performance, error logs, and the system log book regularly Keep backups, boot disks, and emergency repair disks current and available Implement and enforce security and disaster recovery policies

Viruses Virus Trojan horse Program that replicates itself so as to infect more computers Trojan horse Disguises itself as something useful but actually harms your system

Types of Viruses Boot sector viruses Macro Viruses Reside on the boot sector of a floppy disk and become transferred to the partition sector or the DOS boot sector on a hard disk Macro Viruses Take the form of a word-processing or spreadsheet program macro File infected viruses Attach themselves directly to executable files

Types of Viruses Network viruses Worms Trojan horse Propagate themselves via network protocols, commands, messaging programs, and data links Worms Technically not viruses, but rather programs that run independently and travel between computers across networks Trojan horse

Virus Characteristics Encryption Stealth Polymorphism Time-dependence

Antivirus Software Symptoms of a virus Unexplained increases in file sizes Programs launching, running, or exiting more slowly than usual Unusual error messages appearing without probable cause Significant, unexpected loss of system memory Fluctuations in display quality

Antivirus Software Functions your antivirus software should perform Signature scanning Comparison of a file’s content with known virus signatures in a signature database Integrity checking Method of comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes It should detect viruses by monitoring unexpected file changes or virus-like behaviors

Antivirus Software Functions your antivirus software should perform (cont.) Receive regular updates and modifications from a centralized network console Consistently report only valid viruses, rather than reporting “false alarms” Heuristic scanning Attempt to identify viruses by discovering “virus-like” behavior

Antivirus Policy General guidelines for an antivirus policy Every computer in an organization should be equipped with virus detection and cleaning software that regularly scans for viruses Users should not be allowed to alter or disable the antivirus software Users should know what to do in case their antivirus program detects a virus

Antivirus Policy General guidelines for an antivirus policy (cont.) Every organization should have an antivirus team that focuses on maintaining the antivirus measures in place Users should be prohibited from installing any unauthorized software on their systems Organizations should impose penalties on users who do not follow the antivirus policy

Virus Hoaxes False alert about a dangerous, new virus that could cause serious damage to your workstation Usually have no realistic basis and should be ignored

Fault Tolerance Capacity for a system to continue performing despite an unexpected hardware or software malfunction Failure Deviation from a specified level of system performance for a given period of time Fault Involves the malfunction of one component of a system

Fault Tolerance Fail-over Process of one component immediately assuming the duties of an identical component A sophisticated means for dynamically replicating data over several physical hard drives is known as hard disk redundancy, called RAID (for Redundant Array of Inexpensive Disks) To assess the fault tolerance of your network, you must identify any single point of failure

Environment and Power Environment Power Analyze the physical environments in which your devices operate Power Whatever the cause, networks cannot tolerate power loss or less than optimal power

Power Flaws Surge Line noise Brownout Also known as a sag Blackout

Uninterruptible Power Supply (UPS) Battery-operated power source directly attached to one or more devices and to a power supply Standby UPS Switches instantaneously to the battery when it detects a loss of power from the wall outlet Figure 14-1: Standby UPS

Uninterruptible Power Supply (UPS) Online UPS Uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery Figure 14-2: Online UPS

Factors in Choosing a UPS Amount of power needed A volt-amp (VA) is the product of the voltage and current of the electricity on a line Period of time to keep a device running Line conditioning Cost

Generators If your organization cannot withstand a power loss of any duration, consider investing in an electrical generator for your building Generators do not provide surge protection, but do provide clean (free from noise) electricity

Figure 14-4: Network with one redundant connection Topology Figure 14-3: Fully-meshed network Figure 14-4: Network with one redundant connection

Figure 14-5: Self-healing SONET ring Topology Figure 14-5: Self-healing SONET ring

Figure 14-6: Redundancy between a firm and two customers Topology Figure 14-6: Redundancy between a firm and two customers

Figure 14-7: VPNs linking multiple customers Topology Figure 14-7: VPNs linking multiple customers

Figure 14-8: ISP connectivity Hot swappable Identical components that automatically assume the functions of their counterpart if one suffers a fault Figure 14-8: ISP connectivity

Connectivity Load balancing Automatic distribution of traffic over multiple links or processors to optimize response Figure 14-9: Fully redundant system

Figure 14-10: Server with redundant NICs Servers Server mirroring Fault tolerance technique in which one server duplicates the transactions and data storage of another Figure 14-10: Server with redundant NICs

Server Clustering Fault-tolerance technique that links multiple servers together to act as a single server Clustered servers share processing duties and appear as a single server to users Clustering is more cost-effective than mirroring

Storage Redundant Array of Inexpensive Disks (RAID) Collection of disks that provide fault tolerance for shared data and applications A group of hard disks is called a disk array The collection of disks working together in a RAID configuration is often referred to as the “RAID drive”

RAID Level 0—Disk Stripping Simple implementation of RAID in which data are written in 64 KB blocks equally across all disks in the array Figure 14-11: RAID Level 0—disk stripping

RAID Level 1—Disk Mirroring Data from one disk are copied to another disk automatically as the information is written Figure 14-12: RAID Level 1—disk mirroring

RAID Level 3—Disk Stripping with Parity ECC Disk stripping with a special type of error correction code (ECC) Term parity refers to the mechanism used to verify the integrity of data by making the number of bits in a byte sum to either an odd or even number TABLE 14-1 Use of parity bits to achieve parity

RAID Level 3—Disk Stripping with Parity ECC Parity error checking Process of comparing the parity of data read from disk with the type of parity used by the system FIGURE 14-13 RAID Level 3—disk stripping with parity ECC

RAID Level 5—Disk Stripping with Distributed Parity Data are written in small blocks across several disks Figure 14-14: RAID Level 5—disk stripping with distributed parity

Network Attached Storage (NAS) Specialized storage device or group of storage devices providing centralized fault-tolerant data storage for a network Figure 14-15: Network attached storage on a LAN

Storage Area Networks (SANS) Distinct networks of storage devices that communicate directly with each other and with other networks Extremely fault tolerant Extremely fast Much of their speed can be attributed to Fibre Channel

Storage Area Networks (SANS) Figure 14-16: A storage area network

Data Backup Copy of data or program files created for archiving purposes Without backing up data and storing them off-site, you risk losing everything Note that backing up workstations or backing up servers and other host systems are different operations

Tape Backups Most popular method for backing up networked systems Vault Tape storage library Figure 14-17: Examples of backup tape media

Figure 14-16: Tape drive on a medium or large network Tape Backups Figure 14-16: Tape drive on a medium or large network

Tape Backups Questions to ask when selecting the appropriate tape backup solution for your network: Does the backup drive and/or media provide sufficient storage capacity? Are the backup software and hardware proven to be reliable? Does the backup software use data error checking techniques? Is the system quick enough to complete the backup process before daily operations resume?

Tape Backups Questions to ask when selecting the appropriate tape backup solution for your network (cont.): How much do the tape drive, software, and media cost? Will the backup hardware and software be compatible with existing network hardware and software? Does the backup system require frequent manual intervention? Will the backup hardware, software, and media accommodate your network’s growth?

Online Backups and Backup Strategy Done over the Internet Questions to ask in developing a backup strategy: What kind of rotation schedule will backups follow? At what time of day or night will the backups occur? How will you verify the accuracy of the backups?

Backup Strategy Questions to ask in developing a backup strategy (cont.): Where will backup media be stored? Who will take responsibility for ensuring that backups occurred? How long will you save backups? Where will backup and recovery documentation be stored?

Backup Strategy Methods Full backup All data on all servers are copied to a storage medium Incremental backup Only data that have changed since the last backup are copied to a storage medium Differential backup Only data that have changed since the last backup are copied to a storage medium, and that information is then marked for subsequent backup

Backup Rotation Scheme Specifies when and how often backups will occur Figure 14-17: Grandfather-father-son backup rotation scheme

Disaster Recovery Process of restoring critical functionality and data after enterprise-wide outage that affects more than a single system or limited group of users Must take into account the possible extremes, rather than relatively minor situations

Pertinent Issues to a Data Recovery Plan Contact names for emergency coordinators who will execute the disaster recovery response Details on which data and servers are being backed up, how frequently backups occur, where backups are kept, and how backup data can be recovered in full Details on network topology, redundancy, and agreements with national service carriers Regular strategies for testing the disaster recovery plan Plan for managing the crisis

Chapter Summary Integrity refers to the soundness of your network’s files, systems, and connections Availability of a file or system refers to how consistently and reliably it can be accessed by authorized personnel Several basic measures can be employed to protect data and systems on a network A virus is a program that replicates itself so as to infect more computers In broad terms, a failure is a deviation from a specified level of system performance for a given period of time

Chapter Summary Fault tolerance is a system’s capacity to continue performing despite an unexpected hardware or software malfunction Networks cannot tolerate power loss or less than optimal power Type of network topology that offers the best fault tolerance is a mesh topology A backup is a copy of data or program files created for archiving or safekeeping purposes

Chapter Summary Have a strategy for backup Different backup methods provide varying levels of certainty and corresponding labor and cost Disaster recovery is the process of restoring critical functionality and data after an enterprise-wide outage that affects more than a single user or limited group of users Every organization should have a disaster recovery team and disaster recovery plan