CS5493(7493): Secure System Administration J. Childress Rayzor 2090

Slides:



Advertisements
Similar presentations
Work-based learning Click on the speaker on each slide to learn more!
Advertisements

Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
An Introduction to System Administration Chapter 1.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Software Engineering Code Of Ethics And Professional Practice
Computer Security: Principles and Practice
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
1 SPIRIT Silicon Prairie Initiative on Robotics in Information Technology Engineering Ethics.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
* SOFTWARE * Computer software, or just software, is a collection of computer programs and related data that provides the instructions. It can not be touched.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Security Guide for Interconnecting Information Technology Systems
CMM Level 3 KPA’s CS4320 Fall Organizational Process Focus (Goals) Software process development and improvement activities are coordinated across.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computers & Employment By Andrew Attard and Stephen Calleja.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
New SA Training Topic 1: Introduction to System Administration  New hires are expected to be operating at Systems Administrators Guild Level 1  Level.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Module 13: Maintaining Software by Using Windows Server Update Services.
S OFTWARE E NGINEERING C ODE O F E THICS A ND P ROFESSIONAL P RACTICE Software Engineering Ethics and Professional Practices © 1999 by the Institute of.
Ethics CPTE 433 John Beckett. Ethics & Morals Morals tell us what is right and good. –Religious people believe morals come from God –SAs often say something.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
University of Management & Technology 1 Operating Systems & Utility Programs.
Module 7: Fundamentals of Administering Windows Server 2008.
Advantages Cloud Computing. customers only pay for the access and interfaces that they need. The customer buys only the services they need Cost Advantages.
CS3353: System Administration J. Childress KEP U331
Physical Design of a network People who develop & support networks.
Georgia Institute of Technology CS 4320 Fall 2003.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
University of Sunderland COM 220 Lecture Seven Slide 1 Database Users & Administration.
Operating Systems Concepts 1/e Ruth Watson Chapter 8 Chapter 8 Network Administrator Ruth Watson.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Requisite Skills for IS Management and Interpersonal Skills.
Elementary School Administration and Management GADS 671 Section 55 and 56.
Database Administration Basics. Basic Concepts and Definitions  Data Facts that can be recorded and stored  Metadata Data that describes properties.
Jeff Wettlaufer Sr. Technical Product Manager System Center SESSION CODE: MGT308 B T jeffwettlaufer E
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
IT Jobs Positions available in the field of Information Technology.
6/14/20161 System Administration 1-Introduction to System Administration.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
© Akaza Research, LLC : 1 :: 10 Professional open source for clinical research.
July 7, System and Network Administration: Introduction Abdul Wahid.
System Administration 101
«My future profession»
TCSEC: The Orange Book.
Business System Development
The Marshall University Experience with Implementing Project Server 2003 August 9, 2005 Presented by: Chuck Elliott, M.S. Associate Director, Customer.
Oracle Database Administration
Introduction to Operating Systems
Unit 2 Computer Systems HND in Computing and Systems Development
Network management system
IS4680 Security Auditing for Compliance
System Admin Security Training
An Introduction to System Administration
CS-480b Network Security Dick Steflik
Presentation transcript:

CS5493(7493): Secure System Administration J. Childress Rayzor 2090

Computing Systems A computing system is a topology of computing hardware devices, software, and data with a defined boundary.

Computer System Consists of: Computer Hardware – the physical equipment and connections that make up a computing system. Computer Software – the computer operating system, drivers, programs (applications and utilities), and their associated documentation. Data

The System Administrator AKA the SA for short The professional responsible for making computing systems work effectively. –One can be an SA at home or at work. –If you own and maintain a computer, then you are a system administrator for that computer.

System Admin Tasks Perform backup and restore operations. Add and remove users Add and remove hardware and software Configure and maintain hardware and software General user support: Answering users' questions Maintain documentation and licenses Negotiate with vendors

System Admin Tasks (cont.) System planning –Scaling the system –Assessing new technologies –Anticipate and avoid problems Security Management Monitor system usage and performance Detect and correct problems Optimize System Performance Manage resources (disc, memory, CPU)

System Admin Tasks (cont.) Retire hardware De-install software Write programs to automate as many tasks as possible. Determine and enforce usage policy Educate users Role model Liaison between user needs and the budgetary, resource, and technology limitations.

SA Requirements Patience Tenacity Strong Organizational Skills Well developed logic, reasoning, and critical thinking skills. The ability to read and comprehend technical information. Ethical behavior

System Admin Guilde: SAGE Established 1992 out of USENIX/LISA conferences (Large Installation Systems Administrators) A professional body for practicing SAs. SAGE is made up of SA organizations from all over the world.

SAGE Guidelines Creed Code of ethics Mantra

SAGE Creed We as professional System Administrators do hereby commit ourselves to the highest standards of ethical and professional conduct, and agree to be guided by this code of ethics, and encourage every System Administrator to do the same.

SAGE-Code of Ethics Integrity must be beyond reproach Do not unnecessarily infringe on the rights of others. Contact with all clients and colleagues must be kept to the highest standards of professional behavior. Maintain an exemplary work ethic Must display professionalism in the performance of duties at all times.

SA Mantra The computer environment does not exist solely for the amusement of the SA. (Mantra-mystical words or sounds used to facilitate a meditative conscious state.)