Module 6 – Systems Administration

Slides:



Advertisements
Similar presentations
Module 6 – Systems Administration MIS5122: Enterprise Architecture for the IT Auditor.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Maintaining and Troubleshooting Computer Systems Computer Technology.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Concepts of Database Management Sixth Edition
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Chapter Fifteen Working with Network Security. Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Overview Managing a DHCP Database Monitoring DHCP
Module 15 Managing Windows Server® 2008 Backup and Restore.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Chap1: Is there a Security Problem in Computing?.
FIT03.05 Explain features of network maintenance.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Install, configure and test ICT Networks
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
UNIT V Security Management of Information Technology.
8 – Protecting Data and Security
Information Systems Security
Chapter 40 Internet Security.
Securing Information Systems
Review of IT General Controls
Securing Network Servers
INFORMATION SYSTEMS SECURITY AND CONTROL.
Critical Security Controls
CONNECTING TO THE INTERNET
System Administration
Configuring and Troubleshooting Routing and Remote Access
Operating system Security
Processing Integrity and Availability Controls
Answer the questions to reveal the blocks and guess the picture.
Firewalls.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Systems Architecture, Seventh Edition
Data integrity and security
INFORMATION SYSTEMS SECURITY and CONTROL
Fire-wall.
Security.
IS4680 Security Auditing for Compliance
G061 - Network Security.
Presentation transcript:

Module 6 – Systems Administration MIS5122: Enterprise Architecture for the IT Auditor

Agenda Systems Administration Concepts Active Directory Activity

Case Study – Focus on Systems Administration Business Continuity? Disaster Recovery? High-Availability Backup/Recovery Electrical power Heat dissipation Moisture Cable routing Fire protection Password Controls & Auditing Physical Security Virus Protection & Updates Firewalls Monitoring & Metrics

Security Well-integrated approach protects hardware, software, and data resources against accidental loss or damage, malicious tampering, unauthorized access, and accidental disclosure What are some of the tools/technologies we have to help us with security? First line of defense: Authentication and authorization Other defensive measures: Password control, auditing, virus protection, regular software updates, and firewalls

Case Study – Physical Security Restrict access to prevent theft, tampering, and unauthorized access Lock doors Limit distribution of keys, key cards, etc. Reinforce doors and walls Lock equipment to desks Video Surveillance Security Guards

Question? What are the pros and cons of using passwords for authentication? Are there better methods of authentication? If they are better, why aren’t more people using them? Access Control Based on two key processes Authentication (verifies identity) Password-based most common Biometric Authorization (verifies rights) Based on security tickets Access control list

Password policies can be created and enforced on a per user, per group, or per system basis. Password Controls and Security Ways to enhance password-based authentication Restrictions on length and composition of valid passwords Requirements that passwords periodically be changed Analysis of password content to identify passwords that are easily guessed Encryption of passwords in files and during transmission over a network

Policies can be set to deal with failed attempts to log on.

Authorization

Auditing What is “auditing” all about, how is it used, and what are its limitations? Process of creating and managing records of user activity or resource access Useful tool for examining security policy and analyzing security breaches Limitations of Auditing Size of log files Reduction in system performance Backward-looking; poor tool for prevention Automated search tools required to extract useful information

Case Study – Password Controls & Auditing

What did you learn? _____________ is the process of determining or verifying the identity of a user or process owner. After a user has been authenticated, ___________ determines what resources this user has access to. Authentication authorization

What did you learn? _______________ focuses on restricting access to prevent theft, tampering, and unauthorized access. The most common form of authentication in use today is _____________. Physical security Password based

Question? How do you manage software updates at home? Is this the way you’d handle software updates for a company? How do you manage viruses at home? Is this the way you’d manage viruses for a company?

Viruses What is a computer virus? What can you do to deal with them? Programs or program fragments that: Infect computer by permanently installing themselves in a hard-to-find location Perform malicious acts on infected computer Replicate and spread using services of infected computer Types: boot virus, macro virus, worm Virus Protection Common features of antivirus software Scans e-mail messages and attachments for known viruses; disables or deletes them Monitors access to important system files and data structures and logs or denies access as appropriate Scans removable media for known viruses when they are inserted Periodically scans file system and important data structures for viruses

Software Updates What are “software updates” and how can you manage them on a large scale? Fix bugs, errors, and security holes as they are discovered Used to be a manual process; now typically automated Window Server Update Server (WSUS)

Case Study – Virus Protection & Updates

What did you learn? A(n) _____ is a program or program fragment that infects a computer by permanently installing itself, performs one or more malicious acts, and replicates and spreads itself using services of the infected computer. virus

Question? How many of you have a firewall at home? Which type of firewall is this? Do you believe it protects you from the chaos of the Internet?

A firewall is typically a stand-alone device with embedded software that physically separates a private network from a public network. Firewall Hardware devices, software, or a combination that prevents unauthorized users in one network from accessing resources on another network

Firewalls

Types of Firewalls Packet-filtering firewall Simplest type Examines each packet; matches header content to a list of allowed or denied packet types Application firewall Handles service requests of external users of applications Shields internal servers and resources from direct access by outside users Stateful firewalls Tracks progress of complex client-server interactions

Case Study – Firewalls & The DMZ

What did you learn? A(n) _______ is a hardware device, software, or a combination thereof that prevents unauthorized users in one network from accessing resources in another network. firewall

What did you learn? A(n) _____________________________ accepts service requests from an untrusted network and relays the requests to the appropriate server or servers. A(n) _____________ tracks the progress of complex client-server interactions and blocks packets that don’t conform to normal activity patterns. application firewall or proxy server statefull firewall

Question? How much should an organization invest in: Business Continuity Planning Disaster Recovery High Availability Solutions Backup/Restore Capability How much does downtime cost a company? BCP and DR are not in the book so simply discuss, don’t ask tough questions.

Business Continuity and Disaster Recovery Catastrophic loss of ability to deliver services from primary location Must resume services from alternate location Disaster recovery plan driven by the business’ Recover time objective (RTO) Recovery point objective (RPO) Business Continuity – How you continue to provide essential business services between time of the disaster and the execution of DR plan

Sobering Statistics From the U.S. National Fire Protection Agency and the U.S. Bureau of Labor Nearly 75% of all U.S. businesses have experienced a business interruption 20% of small to medium size businesses suffer a major disaster every five years 43% of US companies never reopen after a disaster and 29% close within three years 93% of companies that suffer a significant data lose are out of business within five

It’s not always what you expect It’s in not always an earthquake or a hurricane or an airplane crashing into a building: http://www.youtube.com/v/ANU-oSE5_hU

Recover Time Requirements MTD RPO RTO WRT Recover Work Backlog Recover Lost Data Recover Manually Collected Data Lost Data Work Backlog Collect Data Manually Systems Unavailable Manual Procedures Manual And Normal Procedures Normal Procedures Normal Procedures Last Backup Disruptive Event Systems Resources Recovered Start of Normal Processing Periodic data backup and storage of backups at alternate sites Backup and storage of critical software at alternate sites Installing duplicate or supplementary equipment at alternate sites Arrangements for leasing existing equipment at alternate sites

High Availability Clustering of redundant system components to ensure availability of a service regardless of a failure with a component Pools of web servers with network load balancer Failover for a database server Microsoft Cluster Server HACMP Others – All platform specific High Availability is not in the book so just discuss.

Backup/Restore Backup – Making duplicate copies of all necessary systems and application data on alternative media Restore – Rebuilding original systems and applications using backed up data Reasons Hardware failure Software failure Human error (most prevalent) Malicious destruction of data Technology selected based on business’ Recover time objective Recovery point objective

Case Study – Availability Business Continuity? Disaster Recovery? High-Availability Backup/Recovery

What did you learn? ________________________ is business process focused and keeps your business’ head above water until the DR plan has been executed ______________ is a technology focused exercise which is performed to get system back up and running after a catastrophic event Business continuity planning Disaster recovery

What did you learn? ______________ solutions focus on clustering of redundant system components to ensure availability of a service regardless of a failure with a component. High-availability

Question? Why do you want to know about serious problems or minor issues that could grow into serious problems before anyone else does?

Monitoring Red Light/Green Light Monitoring Performance Monitoring Know when your systems are down BEFORE your users contact the helpdesk (or your supervisor) Performance Monitoring Know when your users are experiencing performance problems BEFORE they contact the helpdesk (or your supervisor)

Metrics Tuck aside the data collected by system monitoring to: Report on service level compliance Know your baseline so you can identify anomalies Effectively troubleshoot problems

Case Study – Monitoring & Metrics

Change Control What changes are being made? When? By who? Proper approval? Potential impact? Backout plan? What changes have been made over time? Essential information for troubleshooting

What did you learn? __________ focuses on knowing about problems in your network before your users start calling the help desk (more importantly, before your supervisor knocks on your door). Monitoring

Physical Environment Considerations when choosing or preparing a location for computer hardware Electrical power Heat dissipation Moisture Cable routing Fire protection

Question? What is Halon? Why can’t we use it any more?

Electrical Power Fluctuations can cause momentary loss of operation or damage to electrical circuits Types of fluctuations Momentary power surges (surge protector) Momentary power sags Long-term voltage sags Total loss of power (auxiliary power source, such as USP)

Heat Dissipation Excessive heat can cause intermittent or total failure of electrical circuits Means of heat dissipation Vents or fans on the computer itself Cooling the room Auxiliary cooling of cabinet

Moisture Excessive moisture: Danger of short circuits Low humidity: Buildup of static electricity Protective measures Well-designed cabinets protect against spills and leaks Mount hardware above floor level Control humidity with optional components of heating, ventilation, and air conditioning systems

Cable Routing Provide protection and ease of access with: Raised floors Dedicated cable conduits

Fire Protection Protection Carbon dioxide Fire retardant foams and powders Gaseous compounds Supplemental detection equipment within computer room

What did you learn? A(n) _____ provides auxiliary power during blackouts and can notify the operating system when it is activated. Computer hardware must be protected against _______ and ____ in electrical power.  UPS surges sags

What did you learn? ______ does a great job at putting out fires. Too bad it is no longer legal to install one of these systems because in can kill people and can wear a hole in the ozone. Halon

Case Study – Physical Environment Electrical power Heat dissipation Moisture Cable routing Fire protection

Case Study – Focus on Systems Administration Business Continuity? Disaster Recovery? High-Availability Backup/Recovery Electrical power Heat dissipation Moisture Cable routing Fire protection Password Controls & Auditing Physical Security Virus Protection & Updates Firewalls Monitoring & Metrics

Review Systems Administration