Network+ Guide to Networks 5th Edition

Slides:



Advertisements
Similar presentations
RAID (Redundant Arrays of Independent Disks). Disk organization technique that manages a large number of disks, providing a view of a single disk of High.
Advertisements

RAID Oh yes Whats RAID? Redundant Array (of) Independent Disks. A scheme involving multiple disks which replicates data across multiple drives. Methods.
Network+ Guide to Networks 5th Edition
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Network+ Guide to Networks 6th Edition
Network+ Guide to Networks, Fourth Edition
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
CS 352 : Computer Organization and Design University of Wisconsin-Eau Claire Dan Ernst Storage Systems.
Introduction to Computer Networks Introduction to Computer Networks.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Ensuring Integrity and Availability
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
1 Higher Computing Topic 8: Supporting Software Updated
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Disaster Recovery and Business Continuity Planning.
"1"1 Introduction to Managing Data " Describe problems associated with managing large numbers of disks " List requirements for easily managing large amounts.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Group 2 Bernard Smith Thomas Laborde Hannah Prather Fault Tolerance Environment Power Topology and Connectivity Servers Hurricane Preparedness Network.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
Install, configure and test ICT Networks
CEG 2400 FALL 2012 Chapter 14 Ensuring Integrity and Availability 1Ensuring Integrity and Availability.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Chapter 13 Ensuring Integrity and Availability. What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices,
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
REDUNDANCY Dr. John P. Abraham Professor UTPA. This slide series is a summary of what we discussed in class. Power Broadband Hard Drive Backup Cluster.
Network+ Guide to Networks 5 th Edition Chapter 14 Ensuring Integrity and Availability.
Chapter 6 Protecting Your Files
File-System Management
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Local Area Networks, 3rd Edition David A. Stamper
Securing Network Servers
Integrating Disk into Backup for Faster Restores
Malware and Computer Maintenance
Network+ Guide to Networks 5th Edition
Discovering Computers 2012: Chapter 8
Introduction to Operating Systems
UNIT 19 Data Security 2.
Processing Integrity and Availability Controls
Introduction to Networks
Personal Computers and Applications
Disks.
RAID RAID Mukesh N Tekwani
Chap 10 Malicious Software.
Web Server Administration
UNIT IV RAID.
Computer communications
Chapter 2: Operating-System Structures
Chap 10 Malicious Software.
RAID RAID Mukesh N Tekwani April 23, 2019
Chapter 2: Operating-System Structures
G061 - Network Security.
Seminar on Enterprise Software
Presentation transcript:

Network+ Guide to Networks 5th Edition Chapter 14 Ensuring Integrity and Availability

Objectives Identify the characteristics of a network that keep data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies

What Are Integrity and Availability?

What Are Integrity and Availability? Network’s programs, data, services, devices, connections soundness Availability How consistently, reliably a file or system can be accessed By authorized personnel Both are compromised by: Security breaches, natural disasters, malicious intruders, power flaws, human error

What Are Integrity and Availability? (cont’d.) User error Unintentional Harm data, applications, software configurations, hardware Intentional Administrators must take precautionary measures to protect network Cannot predict every vulnerability Follow general guidelines for protecting network

General Guidelines for Protecting your Network Allow only network administrators to change NOS and application system files Monitor the network for unauthorized access or changes Record authorized changes in a change management system Install redundant components Perform regular health checks Network+ Guide to Networks, 5th Edition 6

General Guidelines for Protecting your Network Check system performance, error logs, and system log book Keep backups, boot disks, and emergency repair disks current and available Implement and enforce security and disaster recovery policies Network+ Guide to Networks, 5th Edition 7

Malware

Malware Program or code Examples: viruses, Trojan horses, worms, bots Designed to intrude upon or harm system and resources Examples: viruses, Trojan horses, worms, bots Virus Replicating program intent to infect more computers Through network connections, exchange of external storage devices Many destructive programs often called viruses Do not meet strict criteria of virus Example: Trojan horse

Types of Malware Boot sector viruses Macro Virus File-infector virus Infects the boot sector of hard disks or floppies Runs when the computer is started Macro Virus Infects Microsoft Office files File-infector virus Infects executable files Worm Runs independently, not attached to a file Spreads through attachments to email, instant messages, or other file transfer

Types of Malware Trojan horse Network Virus Bot Claims to be something desirable, but hides something harmful Network Virus Propagates through network protocols, like FTP Bot Makes your computer a zombie--remotely controlled by a criminal, through IRC or some other network channel A group of those computers form a botnet, controlled by a botmaster (link Ch 14a) Network+ Guide to Networks, 5th Edition 11

Malware Characteristics Making malware harder to detect and eliminate Encryption Used by viruses, worms, Trojan horses Thwart antivirus program’s attempts to detect it Stealth Malware hides itself to prevent detection Disguise themselves as legitimate programs, code Polymorphism Change characteristics every time they transfer to new system Use complicated algorithms, incorporate nonsensical commands

Malware Characteristics (cont’d.) Time dependence Programmed to activate on particular date Can remain dormant, harmless until date arrives Logic bombs: programs designed to start when certain conditions met Malware can exhibit more than one of these characteristics

Malware Protection Not just installing any virus-scanning program or anti-malware software Requires: Choosing appropriate anti-malware program Monitoring network Continually updating anti-malware program Educating users

Anti-Malware Software Malware leaves evidence Some detectable only by anti-malware software User viewable symptoms Unexplained file size increases Significant, unexplained system performance decline Unusual error messages Significant, unexpected system memory loss Periodic, unexpected rebooting Display quality fluctuations Malware often discovered after damage done

Anti-Malware Software (cont’d.) Minimal anti-malware functions Detect malware through signature scanning Comparing file’s content with known malware signatures Detect malware through integrity checking Comparing current file characteristics against archived version

Anti-Malware Software (cont’d.) Minimal anti-malware functions (cont’d.) Detect malware by monitoring unexpected file changes Receive regular updates and modifications Consistently report only valid instances of malware--not false positives Heuristic scanning: identifying malware by discovering “malware-like” behavior, is prone to false positives

Anti-Malware Policies Dependent upon environment’s needs Decide whether to install anti-malware software on Every desktop Servers Policies provide rules for: Using anti-malware software Installing programs, sharing files, using external disks Management should authorize and support policy Anti-malware policy guidelines Protect network from damage, downtime

Common Anti-Malware Software Free products Microsoft Security Essentials (probably the most logical choice for home users) (link Ch 14d) Avira Clamwin (no realtime protection, link Ch 14e) AVG (link Ch 14f) Commercial Products (for companies): McAfee, Norton Antivirus, F-Secure, eTrust Students get a free copy of McAfee Enterprise to use at home Network+ Guide to Networks, 5th Edition 19

Hoaxes False alert email about: Ignore Verification Dangerous, new virus Other malware causing workstation damage Ignore No realistic basis Attempt to create panic Do not pass on Verification Use reliable Web page listing virus hoaxes Watch for attached files

Fault Tolerance

Fault Tolerance Capacity for system to continue performing Failure Despite unexpected hardware, software malfunction Failure Deviation from specified system performance level Given time period Fault Malfunction of one system component Can result in failure Fault-tolerant system goal Prevent faults from progressing to failures

Levels of Fault Tolerance How critical are the network services to the company? Highest level of fault tolerance System remains unaffected by most drastic problem Power failure, flood, fire, etc. Lower level of fault tolerance System remains unaffected by more common problem Failure of a NIC or hard drive

Environment Protect devices from: Excessive heat, moisture Break-ins Purchase temperature, humidity monitors Break-ins Natural disasters

Power Blackout Brownout Causes Solution Complete power loss Temporary dimming of lights Causes Forces of nature Utility company maintenance, construction Solution Alternate power sources

Power Flaws Not tolerated by networks Types: Surge Noise Brownout Momentary increase in voltage Noise Fluctuation in voltage levels Brownout Momentary voltage decrease Blackout Complete power loss

UPSs (Uninterruptible Power Supplies) Battery-operated power source Directly attached to one or more devices Attached to a power supply Prevents Harm to device, service interruption Variances Power aberrations rectified Time providing power Number of supported devices Price

UPSs (cont’d.) Figure 14-1 Standby and online UPSs

Standby UPS (Offline UPS) Switches quickly to battery upon power loss Problems Time to detect power loss Does not provide continuous power

Online UPS Devices are always powered by the battery A/C power continuously charges battery No momentary service loss risk Handles noise, surges, sags Before power reaches attached device More expensive than standby UPSs Cost depends on power capacity

Generators Powered by diesel, liquid propane, gas, natural gas, or steam Do not provide surge protection Provide electricity free from noise Used in highly available environments Generator choice Calculate organization’s crucial electrical demands Determine generator’s optimal size

Figure 14-2 UPSs and a generator in a network design

Topology and Connectivity Before designing data links Assess network’s needs Fault tolerance in network design Supply multiple paths for data Avoid single points of failure LAN: star topology and parallel backbone WAN: full-mesh or partial-mesh topology SONET technology Relies on dual, fiber-optic ring

Redundant Internet Connections Supply duplicate connection Use different service carriers Use two different routes Critical data transactions must follow more than one possible path Network redundancy advantages Reduces network fault risk Lost functionality Lost profits

Fault Tolerance at the WAN Consider PayNTime, a company that needs to get data from two clients to print checks One solution: lease two T1s to each client Expensive Better solution Partner with ISP Establishing secure VPNs Outsources the network redundancy and design

Figure 14-3 VPNs linking multiple customers

Failures in the Data Room Many single points of failure T1 connection could incur fault Firewall, router, CSU/DSU, multiplexer, or switch might suffer faults in power supplies, NICs, or circuit boards Figure 14-4 Single T1 connectivity

Fault Tolerance in the Data Room Solution Redundant devices with automatic failover Immediately assume identical component duties Use hot swappable devices Desired for switches or routers supporting critical links Adds to device cost Does not address all faults occurring on connection Faults might affect connecting links

Load Balancing Uses all redundant paths to move data faster That way the fault tolerance is not just wasted money when nothing fails

Topology and Connectivity (cont’d.) Figure 14-5 Fully redundant T1 connectivity

Servers Critical servers Contain redundant components Provide fault tolerance, load balancing

Server Mirroring Mirroring Server mirroring Fault-tolerance technique One device, component duplicates another's activities Server mirroring One server continually duplicates another's transactions, data storage Uses identical servers, components High-speed link between servers Synchronization software Form of replication Dynamic copying of data from one location to another

Server Mirroring (cont’d.) Advantage Flexibility in server location Disadvantages Time delay for mirrored server to assume functionality Toll on network as data copied between sites Hardware and software costs May be justifiable

Clustering Links multiple servers together Act as single server Clustered servers share processing duties Appear as single server to users Failure of one server Others take over For large networks More cost-effective than mirroring

Clustering (cont’d.) Many advantages over mirroring Each clustered server Performs data processing Always ready to take over Reduces ownership costs Improves performance

Google Server Cluster Ch 14g

Storage Data storage: also has issues of availability and fault tolerance Different methods are available for making sure shared data and applications are never lost or irretrievable

RAID (Redundant Array of Independent [or Inexpensive] Disks) Collection of disks Provide shared data, application fault tolerance Disk array (drive) Group of hard disks RAID drive (RAID array) Collection of disks working in a RAID configuration Single logical drive

RAID (cont’d.) Hardware RAID Software RAID Set of disks, separate disk controller RAID array managed exclusively by RAID disk controller Attached to server through server’s controller interface Software RAID Software implements, controls RAID techniques Any hard disk type Less expensive (no controller, disk array) Performance rivals hardware RAID

RAID (cont’d.) RAID Level 0 - Disk Striping Simple RAID implementation Data written in 64-KB blocks equally across all disks Not fault-tolerant Does not provide true redundancy Best RAID performance (in this chapter) Uses multiple disk controllers

RAID (cont’d.) Figure 14-6 RAID level 0 - disk striping

RAID (cont’d.) RAID Level 1- Disk Mirroring Disk mirroring provides redundancy Data from one disk copied automatically to another disk Advantages Simplicity, automatic and complete data redundancy Disadvantages Cost of two disks CPU usage because software does the mirroring

RAID (cont’d.) Disk duplexing Similar to disk mirroring Data continually copied from one disk to another Separate disk controller used for each disk Provides added fault tolerance

RAID (cont’d.) Figure 14-7 RAID level 1 - disk mirroring

RAID (cont’d.) RAID Level 3 - Disk Striping with Parity ECC ECC (error correction code) Algorithm to detect, correct errors Known as parity error correction code Parity Mechanism to verify data integrity Number of bits in byte sum to odd, even number Use either even parity, odd parity, not both

RAID Level 3 - Disk Striping with Parity ECC (cont’d.) Table 14-1 The use of parity bits to achieve parity RAID Level 3 - Disk Striping with Parity ECC (cont’d.) Parity tracks data integrity Not data type, protocol, transmission method, file size Parity error checking Process of comparing data parity

RAID Level 3 - Disk Striping with Parity ECC (cont’d.) Figure 14-8 RAID level 3 - disk striping with parity ECC RAID Level 3 - Disk Striping with Parity ECC (cont’d.) Advantage High data transfer rate Disadvantage Parity information appears on single disk

RAID (cont’d.) RAID Level 5 - Disk Striping with Distributed Parity Most popular data storage technique Data written in small blocks across several disks Parity error checking information distributed among disks Advantages over RAID level 3 Writes data more rapidly Uses several disks for parity information Disk replacement causes little interruption Controlling software regenerates failed file parts

RAID (cont’d.) Figure 14-9 RAID level 5 - disk striping with distributed parity

RAID (cont’d.) RAID Level 5 - Disk Striping with Distributed Parity Hot spare (failover component) Array disk, partition used only when one RAID disk fails See link Ch 14i Cold spare (hot swappable component) Duplicate component Not installed

NAS (Network Attached Storage) Specialized storage device, storage device group Provides centralized fault-tolerant data storage Difference from RAID Maintains own interface to LAN

NAS (cont’d.) Advantages Disadvantage Use NAS device contains own file system Optimized for saving, serving files Reads, writes fast Easily expandable No service interruption Disadvantage No direct communication with network clients Use Enterprises requiring fault tolerance, fast data access

NAS (cont’d.) Figure 14-10 Network attached storage on a LAN

SANs (Storage Area Networks) Distinct networks of storage devices Communicate directly With each other, other networks Multiple storage devices Connected to multiple, identical servers

SANs (cont’d.) Advantages Fault tolerant Fast Special transmission method Special protocols, like Fibre Channel Despite the name, Fibre Channel can run over both copper and fiber media (link Ch 14k, 14l) SAN can be installed in location separate from LAN served Provides added fault tolerance Highly scalable Faster, more efficient method of writing data

SANs (cont’d.) Drawbacks Use High cost More complex than NAS, RAID Small SAN: $100,000 Large SAN: several million dollars More complex than NAS, RAID Training, administration efforts required Use Environments with huge data quantities requiring quick availability

Figure 14-11 A storage area network

Data Backup

Data Backup Backup Without backup Many backup options available Copies of data or program files Created for archiving, safekeeping Store off site Without backup You risk losing everything Many backup options available Performed by different software and hardware Use different storage media types Can be controlled by NOS utilities, third-party software

Backup Media and Methods Selecting backup media, methods Several approaches Each has advantages and disadvantages Ask questions to select appropriate solution

Optical Media Media storing digitized data Uses laser to write data, read data Examples CDs, DVDs Backup requirements Recordable CD or DVD drive, software utility CD-R (compact disc-recordable) Written to once, stores 650 MB data CD-RW (compact disc-rewriteable) Used more than once, stores 650 MB data

Optical Media (cont’d.) CD backups Simple to restore from Standard format Relatively low storage capacity Recordable DVD 4.7 GB on one single-layered side Double-layered, two-sided DVD Store up to 17 GB of data Several different formats

Optical Media (cont’d.) Disadvantage Writing data takes longer than other media Requires more human intervention

Tape Backups Copying data to magnetic tape Relatively simple Stores very large data amounts Requirements Tape drive connected to network Management software Backup media

Tape Backups (cont’d.) Figure 14-12 Tape backup media

Tape Backups (cont’d.) Small network Large network Stand-alone tape drives attached to each server Large network One large, centralized tape backup device Manages all subsystems’ backups Extremely large environments Robots retrieve, circulate tapes from vault Tape storage library

External Disk Drives Removable disk drives Attached temporarily to computer USB, PCMCIA, FireWire, CompactFlash port Simple to use Save, share data Temporary drive appears like any other drive Large data capacity Backup control features, higher storage capacity, faster read-write access Example: Iomega REV drive

Network Backups Save data to another place on network Online backup Different server, another WAN location SAN, NAS storage device Online backup Saves data across Internet To another company’s storage array Implement strict security measures Automated backup, restoration processes Online back up provider evaluation Test speed, accuracy, security, recovery

Online Backup Examples Iron Mountain Normal online backup on their servers Link Ch 14m Symform A cooperative service--your data is stored on other members' servers $5 a month, no data storage limit Ch 14n

Backup Strategy Goal Documented in common area Perform reliable backups providing maximum data protection Documented in common area Accessible by all IT staff Address various questions Archive bit File attribute Checked to set on or off On indicates file must be archived

Backup Methods Full backup Incremental backup All data copied Uncheck archive bits Uses the most tape and time Easiest restoration (play one tape) Incremental backup Copy data changed since last full or incremental backup Uses the least tape and time Most complex recovery--must play many tapes

Backup Methods Differential backup Copy only data changed since last backup All data marked for subsequent backup Does not uncheck archive bits Uses less tape and time than a Full Backup, but more than an Incremental Backup Data recovery requires two tapes

Backup Strategy (cont’d.) Determine best backup rotation scheme Plan specifying when and how often backups occur Goal Provide excellent data reliability without overtaxing network, requiring intervention Grandfather-Father-Son Uses backup sets Daily (son) Weekly (father) Monthly (grandfather)

Grandfather-Father-Son (cont’d.) Figure 14-13 The Grandfather-Father-Son backup rotation scheme Grandfather-Father-Son (cont’d.) Three backup types performed each month: Daily incremental (every Monday through Thursday) Weekly full (every Friday) Monthly full (last day of the month)

Backup Strategy (cont’d.) Ensure backup activity recorded in backup log Backup date Tape identification Type of data backed up, Type of backup Files backed up Site where tape stored Establish regular verification schedule

Disaster Recovery

Disaster Recovery Disaster recovery Consider possible extremes Restoring critical functionality, data After enterprise-wide outage Affecting more than single system, limited group Consider possible extremes Hurricane, fire, etc. Not relatively minor outages, failures, security breaches, data corruption

Disaster Recovery Planning Accounts for worst-case scenarios Identifies disaster recovery team Provides contingency plans Restore and replace: Computer systems Power Telephony systems Paper-based files Contains various sections Related to computer systems Lessens critical data loss risk

Disaster Recovery Contingencies Cold site Components necessary to rebuild network exist Not appropriately configured, updated, or connected Warm site Some appropriately configured, updated, and connected Hot site All are appropriately configured, updated, and connected Match network’s current state

Link Ch 14o