Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Operations Chapter 11 Part 2 Pages 1262 to 1279.

Similar presentations


Presentation on theme: "Security Operations Chapter 11 Part 2 Pages 1262 to 1279."— Presentation transcript:

1 Security Operations Chapter 11 Part 2 Pages 1262 to 1279

2 Data Leakage Data Breaches – Target, Anthem – Costs Investigation, penalties and fines, credit reporting, reputation Inappropriate removal of information – Insecure home computer so employee can work at home – Theft of a laptop

3 Data Leakage Security awareness training – Employees know that security is part of their job. Employees using latest computer technology – BYOD – USB drives

4 Network and Resource Availability Redundant hardware for “hot swapping” Fault-tolerant technologies Service level agreements Solid operational procedures to maintain availability

5 MTBF/ MTTR MTBF - Mean time between failures – Either based on historical data or scientifically estimated by vendors. – Higher MTBF usually has a higher price. MTTR – time to get device fixed and back into production – Replacing a failed drive – If MTTR is too high for critical devices, then redundancy should be used.

6 RAID Redundant array of independent disks. Figure on page 1269 If a drive fails, the parity is used to rebuild the lost drive. Most RAID systems have hot-swapping, which means they can replace a drive while the system is running. Table 11-2 on page 1270

7 MAID Massive Array of Inactive Disks Medium-scale storage arena up to several terabytes of data. All inactive disks are powered down with only the disk controller active When an application asks for data, the controller powers the appropriate disk drive(s) and transfers the data.

8 RAIT Redundant Array of Independent Tapes For very large writ-mostly storage applications Similar to RAID but uses tapes

9 SAN Storage Area Networks Large amount of storage devices linked together by a high-speed private network SAN software finds the file Provides redundancy, fault tolerance, reliability, and backups For large companies with lots of data

10 Clustering Cluster = group of servers that are viewed logically as one server to users and can be managed as a logical system. If one of the server fails, processing continues because the rest can pick up the load. All are used. None sit idle waiting for something to faile.

11 HSM Hierarchical Storage Management Figure 11-3 on page 1275 Faster media hold data accessed most often Can save money

12 Contingency Planning When an incident strikes, detailed procedures to keep critical systems available. On site, in a fireproof safe, offsite location Tested by exercises For small incidents such as power outage or disk failure BCP for disasters

13 Mainframes Expensive engineering means highly reliable and high software quality Designed for massive I/O Vast amount of processors, I/O processors, network processors Mainframes often perform batch processing


Download ppt "Security Operations Chapter 11 Part 2 Pages 1262 to 1279."

Similar presentations


Ads by Google