Ensuring Integrity and Availability - PowerPoint PPT Presentation

1 / 62
About This Presentation
Title:

Ensuring Integrity and Availability

Description:

Antivirus Policies. Virus detection and cleaning software that regularly scans for viruses ... A good antivirus program should be able to detect viruses ... – PowerPoint PPT presentation

Number of Views:31
Avg rating:3.0/5.0
Slides: 63
Provided by: ter775
Category:

less

Transcript and Presenter's Notes

Title: Ensuring Integrity and Availability


1
Ensuring Integrity and Availability
  • Dean (3rd), Chapter 13

2
Overview
  • Characteristics of network that keep data safe
    from loss or damage
  • Protect enterprise-wide network from viruses
  • Network- and system-level fault-tolerance
    techniques
  • Network backup and recovery strategies
  • Disaster recovery plan

3
Integrity and Availability
  • Integrity soundness of a networks programs,
    data, services, devices, and connections.
  • Availability how consistently and reliably files
    and systems can be accessed by authorized
    personnel

4
Guidelines for Protecting Network
  • Allow only network administrators to create or
    modify NOS and application system files
  • Monitor network for unauthorized access or
    changes
  • Record authorized system changes
  • Install redundant components
  • Perform regular health checks on the network
  • Check system performance, error logs, and the
    system log book regularly
  • Keep backups, boot disks, and emergency repair
    disks current and available
  • Implement and enforce security and disaster
    recovery policies

5
Viruses and Malicious Software
  • A virus is a program that replicates itself with
    the intent to infect more computers
  • Other unwanted and potentially destructive
    programs are called viruses, but technically do
    not meet the criteria used to define a virus
  • Program that disguises itself as something useful
    but actually harms your system is called a Trojan
    horse

6
Types of Malicious Software
  • Viruses
  • Boot sector viruses
  • Macro viruses
  • File-infected viruses
  • Network viruses
  • Worms
  • Trojan horse
  • Bots

7
Virus Characteristics
  • Encryption
  • Stealth
  • Polymorphism
  • Time-dependence

8
Virus Protection
  • Virus symptoms
  • Antivirus software
  • Antivirus policies

9
Virus Symptoms
  • Unexplained increases in file sizes
  • Significant, unexplained decline in system
    performance
  • Unusual error messages
  • Significant, unexpected loss of system memory
  • Fluctuations in display quality

10
Antivirus Software
  • Antivirus software should perform
  • Signature scanning
  • Integrity checking
  • Monitoring of unexpected file changes
  • Regular updates and modifications
  • Consistently report only valid viruses
  • Heuristic scanning -- most fallible

11
Antivirus Policies
  • Virus detection and cleaning software that
    regularly scans for viruses
  • Users not allowed to alter or disable
  • Users know what to do
  • Antivirus team appointed maintaining antivirus
    measures
  • Users prohibited from installing any unauthorized
    software
  • System-wide alerts issued

12
Virus Hoaxes
  • Type of rumor consists of a false alert about a
    dangerous, new virus
  • Verify a possible hoax

13
Fault Tolerance
  • Capacity for a system to continue performing
    despite an unexpected hardware or software
    malfunction
  • Failure is a deviation from a specified level of
    system performance for a given period of time
  • Fault involves the malfunction of one component
    of a system

14
Sources of Faults and Failures
  • Environment
  • Analyze the physical environment in which your
    devices operate
  • Power flaws

15
Power Flaws
  • SurgeA momentary increase in voltage
  • NoiseA fluctuation in voltage levels
  • BrownoutA momentary decrease in voltage
  • BlackoutA complete power loss

16
Uninterruptible Power Supplies (UPSs)
  • Prevents A/C power from harming device or
    interrupting its services
  • Standby UPS provides continuous voltage to a
    device by switching
  • Online UPS providing power to a network device
    through its battery

17
Examples of UPSs
18
Selecting Emergency Power Source
  • Which UPS is right for your network
  • Amount of power needed
  • Period of time to keep a device running
  • Line conditioning
  • Cost
  • Generators
  • If your organization cannot withstand a power
    loss you might consider investing in an
    electrical generator for your building

19
Inclusion of UPS and Generator
20
Topology and Connectivity
  • Each physical topology inherently assumes certain
    advantages and disadvantages
  • Supplying multiple paths data can use to travel
    from any one point to another

21
Network with VPN
22
Firewall with T1 Connection
23
Redundant T1 Connections
24
Fault Tolerance (continued)
  • Servers

25
Server Mirroring
  • Mirroring is a fault-tolerance technique in which
    one device or component duplicates the activities
    of another
  • In server mirroring, one server continually
    duplicates the transactions and data storage of
    another

26
Redundant NICs
27
Clustering
  • Fault-tolerance technique that links multiple
    servers together to act as a single server

28
Fault Tolerance (continued)
29
Storage
  • Redundant Array of Independent (or Inexpensive)
    Disks (RAID)
  • Collection of disks that provide fault tolerance
    for shared data and applications
  • Hardware RAID
  • Set of disks and a separate disk controller
  • Software RAID
  • Software to implement and control RAID

30
Fault Tolerance (continued)
  • Storage

31
RAID Levels
  • RAID Level 0Disk Striping
  • Data is written in 64 KB blocks equally across
    all disks in the array
  • RAID Level 1Disk Mirroring
  • Provides redundancy through a process called disk
    mirroring
  • RAID Level 3Disk Striping with Parity ECC
  • Involves disk striping with a special error
    correction code (ECC)
  • RAID Level 5Disk Striping with Distributed
    Parity
  • Highly fault-tolerant
  • Data is written in small blocks across several
    disks
  • Parity error checking information is distributed
    among the disks

32
RAID 0Data Striping
33
RAID 1Disk Mirroring
34
Parity and Parity Bit
35
RAID 3Striping Parity Disk
36
RAID 5Striping Data Parity
37
Network Attached Storage
  • Specialized storage device or group of storage
    devices that provides centralized fault-tolerant
    data storage for a network

38
Network Attached Storage
39
Storage Area Networks (SANs)
  • Distinct networks of storage devices that
    communicate directly with each other and with
    other networks

40
Storage Area Network
41
Data Backup
  • A backup is a copy of data or program files
    created for archiving or safekeeping
  • Tape Backups
  • Copying data to a magnetic tape

42
Tape Media
43
Data Backup (continued)
  • Tape Backups (continued)

44
Select Appropriate Tape Backup
  • Sufficient storage capacity
  • Proven to be reliable
  • Data error-checking techniques
  • Is the system quick enough
  • Tape drive, software, and media cost
  • Hardware and software be compatible with existing
    network
  • Frequent manual intervention
  • Accommodate your networks growth

45
Online Backups
  • Companies on the Internet now offer to back up
    data over the Internet

46
Backup Strategy
  • What data must be backed up
  • What kind of rotation schedule
  • When will the backups occur
  • How will you verify
  • Where will backup media be stored
  • Who will take responsibility
  • How long will you save backups
  • Where will backup and recovery documentation be
    stored

47
Data Backup (continued)
  • Backup Strategy (continued)

48
Different Backup Methods
  • Full backup
  • Incremental backup
  • Differential backup

49
Backup Generations
50
Disaster Recovery
  • A disaster recovery plan should identify a
    disaster recovery team
  • Contact for emergency coordinators
  • Which data and servers are being backed up
  • Network topology, redundancy, and agreements
  • Regular strategies for testing
  • A plan for managing the crisis

51
Chapter Summary
  • Integrity refers to the soundness of your
    networks files, systems, and connections
  • Several basic measures can be employed to protect
    data and systems
  • A virus is a program that replicates itself
  • Boot sector viruses position their code in the
    boot sector
  • Macro viruses take the form of a macro

52
Chapter Summary (continued)
  • File-infected viruses attach themselves to
    executable files
  • Network viruses take advantage of network
    protocols
  • A virus bot is a virus that spreads automatically
    between systems
  • Worms are not technically viruses
  • A Trojan horse claims to do something useful but
    instead harms

53
Chapter Summary (continued)
  • Any type of virus may have additional
    characteristics that make it harder to detect and
    eliminate
  • A good antivirus program should be able to detect
    viruses through signature scanning, integrity
    checking, and heuristic scanning
  • Antivirus software is merely one piece of the
    puzzle in protecting your network

54
Chapter Summary (continued)
  • A virus hoax is a false alert about a dangerous,
    new virus
  • A failure is a deviation from a specified level
    of system performance for a given period of time

55
Chapter Summary (continued)
  • A fault is the malfunction of one component of a
    system
  • Fault tolerance is a systems capacity to
    continue performing despite an unexpected
    hardware or software malfunction

56
Chapter Summary (continued)
  • Networks cannot tolerate power loss or less than
    optimal power
  • A UPS is a battery power source directly attached
    to one or more devices and to a power supply
  • A standby UPS provides continuous voltage to a
    device by switching

57
Chapter Summary (continued)
  • An online UPS uses the A/C power from the wall
    outlet to continuously charge its battery
  • For utmost fault tolerance in power supply, a
    generator is necessary

58
Chapter Summary (continued)
  • Network topologies such as a full mesh WAN or a
    star-based LAN with a parallel backbone offer the
    greatest fault tolerance
  • Hot swappable components can be changed (or
    swapped) while a machine is still running (hot)
  • Critical servers often contain redundant
    components

59
Chapter Summary (continued)
  • Utilizing a second, identical server to duplicate
    the transactions and data storage of one server
    is called server mirroring
  • Server clustering links multiple servers together
    to act as a single server

60
Chapter Summary (continued)
  • An important storage redundancy feature is a
    Redundant Array of Independent (or Inexpensive)
    Disks (RAID)
  • Network attached storage (NAS) is a dedicated
    storage device
  • A storage area network (SAN) is a distinct
    network of multiple storage devices and servers

61
Chapter Summary (continued)
  • A backup is a copy of data or program files
    created for archiving or safekeeping
  • A popular, economical method for backing up
    networked systems is tape backup
  • You can also back up data over the Internet

62
Chapter Summary (continued)
  • The aim of a good backup rotation scheme is to
    provide excellent data reliability
  • Every organization should have a disaster
    recovery team
Write a Comment
User Comments (0)
About PowerShow.com