System Administration

Slides:



Advertisements
Similar presentations
Module 6 – Systems Administration MIS5122: Enterprise Architecture for the IT Auditor.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Maintaining and Troubleshooting Computer Systems Computer Technology.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Security+ Guide to Network Security Fundamentals
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
© 2004, David Gadish, Ph.D.1 Software Engineering CIS 410 Winter 2004 Week 9 Lecture Dr. David Gadish.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Awareness: Applying Practical Security in Your World
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Concepts of Database Management Seventh Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Chapter 16 Alternative Avenues for Systems Acquisitions
Concepts of Database Management Eighth Edition
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Information Systems Security Operational Control for Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chap1: Is there a Security Problem in Computing?.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
UNIT V Security Management of Information Technology.
Information Systems Security
Chapter 40 Internet Security.
Securing Information Systems
Systems Analysis and Design in a Changing World, Fifth Edition
Review of IT General Controls
Securing Network Servers
BUSINESS DRIVEN TECHNOLOGY
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Controlling Computer-Based Information Systems, Part I
Configuring and Troubleshooting Routing and Remote Access
Chapter 17 Risks, Security and Disaster Recovery
Processing Integrity and Availability Controls
Information Resource Management
Module 6 – Systems Administration
Firewalls.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Systems Architecture, Seventh Edition
INFORMATION SYSTEMS SECURITY and CONTROL
Information Systems, Ninth Edition
PLANNING A SECURE BASELINE INSTALLATION
Information Systems Security and Control
G061 - Network Security.
Presentation transcript:

System Administration Chapter 14 System Administration

Chapter 14 System Administration Chapter Outline System Administration Focus - A Standard Hardware Platform? The Acquisition Process Determining Requirements and Evaluating Performance Focus - Windows XP and Server Performance Monitoring Security Physical Environment

Chapter Goals Describe system administration responsibilities and tasks Explain the process of acquiring computer hardware and system software Describe tools and processes for evaluating application resource requirements and computer system performance Define a system security model and describe how it can be implemented Understand issues related to installing and protecting computer hardware

Chapter Topics

System Administration Primary responsibility Ensure efficient and reliable delivery of IS services Broad categories of tasks Acquiring new IS resources Maintaining existing IS resources Designing and implementing an IS security policy Varies among organizations

Strategic Planning Goal-Plan Paradigm Set long-range goals Develop a plan to attain those goals Tends to follow rather than lead strategic plans of other organizational units IS serves business needs

Strategic Goals and Plans Identify services to be provided and the resources needed to provide those services Plan Strategies for developing services and markets for them Strategies for acquiring sufficient resources for operations and growth Organizational structure and control

Hardware and Software as Infrastructure Strategic issues relevant to IS Services to be provided Charging for services Infrastructure composition Infrastructure improvement and maintenance

Standards Required when providing infrastructure-based services to a wide variety of users Potential issues Tends to stifle innovation May fail to meet needs of some users Incompatibility Problems for users who need services at or near the leading edge of technology

Competitive Advantage Technology can be applied to: Provide services that competitors are unable to provide Provide services of unusually high quality Provide services at unusually low price Generate services at unusually low cost Restricted useful life due to: Rapid technology changes High cost for developers and early adopters

The Acquisition Process Determine applications that will be supported Specify hardware and software capability and capacity requirements Draft and circulate a request for proposals (RFP) Evaluate RFP responses Negotiate purchase, installation, and/or maintenance contract

Request for Proposals (RFP) Formal document sent to vendors States requirements Solicits proposals to meet requirements

Evaluating Proposals Determine acceptability of each proposal Rank acceptable proposals Validate high-ranking proposals Benchmarking

Determining Requirements and Evaluating Performance Hardware requirements depend on hardware and system software resources required Is application software going to be developed? Yes: hardware and system software resource consumption can be measured No: determining resource requirements is complex use benchmark testing

Determining Requirements and Evaluating Performance Mathematical models for estimating computer requirements Application demand model Resource availability model

Benchmarks Measure of computer system performance while executing specific processing tasks Organizations that develop widely used benchmarks and perform computer system testing SPEC (Standard Performance Evaluation Corporation) TPC (Transaction Processing Performance Council)

Measuring Resource Demand and Utilization Hardware and software monitors Detect and report processing or I/O activity Operate continuously or intermittently Help identify performance bottlenecks Program profilers Describe resource or service utilization of an application program during execution

Windows XP and Server Performance Monitoring System Monitor (SM) Monitors hardware and software resource use in real time Captures performance and utilization data for defined objects Each object has a set of counters Has many display options

Security Well-integrated approach protects hardware, software, and data resources against accidental loss or damage, malicious tampering, unauthorized access, and accidental disclosure First line of defense: Authentication and authorization Other defensive measures: Password control Auditing Virus protection Regular software updates Firewalls

Physical Security Restrict access to prevent theft, tampering, and unauthorized access Lock doors Limit distribution of keys, key cards, etc. Reinforce doors and walls Lock equipment to desks

Access Controls Based on two key processes Authentication (verifies identity) Password-based most common Biometric Authorization (verifies rights) Based on security tickets Access control list

Password Controls and Security Ways to enhance password-based authentication Restrictions on length and composition of valid passwords Requirements that passwords periodically be changed Analysis of password content to identify passwords that are easily guessed Encryption of passwords in files and during transmission over a network

Auditing Process of creating and managing records of user activity or resource access Useful tool for examining security policy and analyzing security breaches

Limitations of Auditing Size of logs Auditing log files can grow very large Reduction in system performance Auditing uses lots of system resources Poor tool for prevention Auditing is backward-looking Difficult to use Automated search tools required to extract useful information

Viruses Programs or program fragments that: Infect computer by permanently installing themselves in a hard-to-find location Perform malicious acts on infected computer Replicate and spread using services of infected computer Types: boot virus, macro virus, worm

Virus Protection Common features of antivirus software Scans e-mail messages and attachments for known viruses; disables or deletes them Monitors access to important system files and data structures and logs or denies access as appropriate Scans removable media for known viruses when they are inserted Periodically scans file system and important data structures for viruses

Software Updates Fix bugs, errors, and security holes as they are discovered Used to be a manual process; now typically automated

Firewalls Hardware devices, software, or a combination that prevents unauthorized users in one network from accessing resources on another network A firewall is typically a stand-alone device with embedded software that physically separates a private network from a public network.

Firewalls A firewall is typically a stand-alone device with embedded software that physically separates a private network from a public network.

Types of Firewalls Packet-filtering firewall Simplest type Examines each packet; matches header content to a list of allowed or denied packet types Stateful firewalls Tracks progress of complex client-server interactions Application firewall Handles service requests of external users of applications Shields internal servers and resources from direct access by outside users

Application Firewall

Physical Environment Considerations when choosing or preparing a location for computer hardware Electrical power Heat dissipation Moisture Cable routing Fire protection

Electrical Power Fluctuations can cause momentary loss of operation or damage to electrical circuits Types of fluctuations Momentary power surges surge protector Momentary power sags Long-term voltage sags Total loss of power auxiliary power source, such as USP

Heat Dissipation Excessive heat can cause intermittent or total failure of electrical circuits Means of heat dissipation Vents or fans on the computer itself Cooling the room Auxiliary cooling of cabinet

Moisture Excessive moisture Danger of short circuits Low humidity Buildup of static electricity Protective measures Well-designed cabinets protect against spills and leaks Mount hardware above floor level Control humidity with optional components of heating, ventilation, and air conditioning systems

Cable Routing Provide protection and ease of access with: Raised floors Dedicated cable conduits

Fire Protection Protection Carbon dioxide Fire retardant foams and powders Gaseous compounds Supplemental detection equipment within computer room

Disaster Planning and Recovery Periodic data backup and storage of backups at alternate sites Backup and storage of critical software at alternate sites Installing duplicate or supplementary equipment at alternate sites Arrangements for leasing existing equipment at alternate sites

Summary System administration The acquisition process Determining requirements Evaluating performance Security Physical environment

Chapter Goals Describe system administration responsibilities and tasks Explain the process of acquiring computer hardware and system software Describe tools and processes for evaluating application resource requirements and computer system performance Define a system security model and describe how it can be implemented Understand issues related to installing and protecting computer hardware