Title: Ensuring Integrity and Availability
1Ensuring Integrity and Availability
2Overview
- Characteristics of network that keep data safe
from loss or damage - Protect enterprise-wide network from viruses
- Network- and system-level fault-tolerance
techniques - Network backup and recovery strategies
- Disaster recovery plan
3Integrity and Availability
- Integrity soundness of a networks programs,
data, services, devices, and connections. - Availability how consistently and reliably files
and systems can be accessed by authorized
personnel
4Guidelines for Protecting Network
- Allow only network administrators to create or
modify NOS and application system files - Monitor network for unauthorized access or
changes - Record authorized system changes
- Install redundant components
- Perform regular health checks on the network
- Check system performance, error logs, and the
system log book regularly - Keep backups, boot disks, and emergency repair
disks current and available - Implement and enforce security and disaster
recovery policies
5Viruses and Malicious Software
- A virus is a program that replicates itself with
the intent to infect more computers - Other unwanted and potentially destructive
programs are called viruses, but technically do
not meet the criteria used to define a virus - Program that disguises itself as something useful
but actually harms your system is called a Trojan
horse
6Types of Malicious Software
- Viruses
- Boot sector viruses
- Macro viruses
- File-infected viruses
- Network viruses
- Worms
- Trojan horse
- Bots
7Virus Characteristics
- Encryption
- Stealth
- Polymorphism
- Time-dependence
8Virus Protection
- Virus symptoms
- Antivirus software
- Antivirus policies
9Virus Symptoms
- Unexplained increases in file sizes
- Significant, unexplained decline in system
performance - Unusual error messages
- Significant, unexpected loss of system memory
- Fluctuations in display quality
10Antivirus Software
- Antivirus software should perform
- Signature scanning
- Integrity checking
- Monitoring of unexpected file changes
- Regular updates and modifications
- Consistently report only valid viruses
- Heuristic scanning -- most fallible
11Antivirus Policies
- Virus detection and cleaning software that
regularly scans for viruses - Users not allowed to alter or disable
- Users know what to do
- Antivirus team appointed maintaining antivirus
measures - Users prohibited from installing any unauthorized
software - System-wide alerts issued
12Virus Hoaxes
- Type of rumor consists of a false alert about a
dangerous, new virus - Verify a possible hoax
13Fault Tolerance
- Capacity for a system to continue performing
despite an unexpected hardware or software
malfunction - Failure is a deviation from a specified level of
system performance for a given period of time - Fault involves the malfunction of one component
of a system
14Sources of Faults and Failures
- Environment
- Analyze the physical environment in which your
devices operate - Power flaws
15Power Flaws
- SurgeA momentary increase in voltage
- NoiseA fluctuation in voltage levels
- BrownoutA momentary decrease in voltage
- BlackoutA complete power loss
16Uninterruptible Power Supplies (UPSs)
- Prevents A/C power from harming device or
interrupting its services - Standby UPS provides continuous voltage to a
device by switching - Online UPS providing power to a network device
through its battery
17Examples of UPSs
18Selecting Emergency Power Source
- Which UPS is right for your network
- Amount of power needed
- Period of time to keep a device running
- Line conditioning
- Cost
- Generators
- If your organization cannot withstand a power
loss you might consider investing in an
electrical generator for your building
19Inclusion of UPS and Generator
20Topology and Connectivity
- Each physical topology inherently assumes certain
advantages and disadvantages - Supplying multiple paths data can use to travel
from any one point to another
21Network with VPN
22Firewall with T1 Connection
23Redundant T1 Connections
24Fault Tolerance (continued)
25Server Mirroring
- Mirroring is a fault-tolerance technique in which
one device or component duplicates the activities
of another - In server mirroring, one server continually
duplicates the transactions and data storage of
another
26Redundant NICs
27Clustering
- Fault-tolerance technique that links multiple
servers together to act as a single server
28Fault Tolerance (continued)
29Storage
- Redundant Array of Independent (or Inexpensive)
Disks (RAID) - Collection of disks that provide fault tolerance
for shared data and applications - Hardware RAID
- Set of disks and a separate disk controller
- Software RAID
- Software to implement and control RAID
30Fault Tolerance (continued)
31RAID Levels
- RAID Level 0Disk Striping
- Data is written in 64 KB blocks equally across
all disks in the array - RAID Level 1Disk Mirroring
- Provides redundancy through a process called disk
mirroring - RAID Level 3Disk Striping with Parity ECC
- Involves disk striping with a special error
correction code (ECC) - RAID Level 5Disk Striping with Distributed
Parity - Highly fault-tolerant
- Data is written in small blocks across several
disks - Parity error checking information is distributed
among the disks
32RAID 0Data Striping
33RAID 1Disk Mirroring
34Parity and Parity Bit
35RAID 3Striping Parity Disk
36RAID 5Striping Data Parity
37Network Attached Storage
- Specialized storage device or group of storage
devices that provides centralized fault-tolerant
data storage for a network
38Network Attached Storage
39Storage Area Networks (SANs)
- Distinct networks of storage devices that
communicate directly with each other and with
other networks
40Storage Area Network
41Data Backup
- A backup is a copy of data or program files
created for archiving or safekeeping - Tape Backups
- Copying data to a magnetic tape
42Tape Media
43Data Backup (continued)
44Select Appropriate Tape Backup
- Sufficient storage capacity
- Proven to be reliable
- Data error-checking techniques
- Is the system quick enough
- Tape drive, software, and media cost
- Hardware and software be compatible with existing
network - Frequent manual intervention
- Accommodate your networks growth
45Online Backups
- Companies on the Internet now offer to back up
data over the Internet
46Backup Strategy
- What data must be backed up
- What kind of rotation schedule
- When will the backups occur
- How will you verify
- Where will backup media be stored
- Who will take responsibility
- How long will you save backups
- Where will backup and recovery documentation be
stored
47Data Backup (continued)
- Backup Strategy (continued)
48Different Backup Methods
- Full backup
- Incremental backup
- Differential backup
49Backup Generations
50Disaster Recovery
- A disaster recovery plan should identify a
disaster recovery team - Contact for emergency coordinators
- Which data and servers are being backed up
- Network topology, redundancy, and agreements
- Regular strategies for testing
- A plan for managing the crisis
51Chapter Summary
- Integrity refers to the soundness of your
networks files, systems, and connections - Several basic measures can be employed to protect
data and systems - A virus is a program that replicates itself
- Boot sector viruses position their code in the
boot sector - Macro viruses take the form of a macro
52Chapter Summary (continued)
- File-infected viruses attach themselves to
executable files - Network viruses take advantage of network
protocols - A virus bot is a virus that spreads automatically
between systems - Worms are not technically viruses
- A Trojan horse claims to do something useful but
instead harms
53Chapter Summary (continued)
- Any type of virus may have additional
characteristics that make it harder to detect and
eliminate - A good antivirus program should be able to detect
viruses through signature scanning, integrity
checking, and heuristic scanning - Antivirus software is merely one piece of the
puzzle in protecting your network
54Chapter Summary (continued)
- A virus hoax is a false alert about a dangerous,
new virus - A failure is a deviation from a specified level
of system performance for a given period of time
55Chapter Summary (continued)
- A fault is the malfunction of one component of a
system - Fault tolerance is a systems capacity to
continue performing despite an unexpected
hardware or software malfunction
56Chapter Summary (continued)
- Networks cannot tolerate power loss or less than
optimal power - A UPS is a battery power source directly attached
to one or more devices and to a power supply - A standby UPS provides continuous voltage to a
device by switching
57Chapter Summary (continued)
- An online UPS uses the A/C power from the wall
outlet to continuously charge its battery - For utmost fault tolerance in power supply, a
generator is necessary
58Chapter Summary (continued)
- Network topologies such as a full mesh WAN or a
star-based LAN with a parallel backbone offer the
greatest fault tolerance - Hot swappable components can be changed (or
swapped) while a machine is still running (hot) - Critical servers often contain redundant
components
59Chapter Summary (continued)
- Utilizing a second, identical server to duplicate
the transactions and data storage of one server
is called server mirroring - Server clustering links multiple servers together
to act as a single server
60Chapter Summary (continued)
- An important storage redundancy feature is a
Redundant Array of Independent (or Inexpensive)
Disks (RAID) - Network attached storage (NAS) is a dedicated
storage device - A storage area network (SAN) is a distinct
network of multiple storage devices and servers
61Chapter Summary (continued)
- A backup is a copy of data or program files
created for archiving or safekeeping - A popular, economical method for backing up
networked systems is tape backup - You can also back up data over the Internet
62Chapter Summary (continued)
- The aim of a good backup rotation scheme is to
provide excellent data reliability - Every organization should have a disaster
recovery team