Professional Documents
Culture Documents
Objectives
Identify the characteristics of a network that keeps data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies
Viruses
Program that replicates itself with intent to infect more computers
Through network connections or exchange of external storage devices Typically copied to storage device without users knowledge
Trojan horse: program that disguises itself as something useful but actually harms system
Not considered a virus
Types of Viruses
Boot sector viruses: located in boot sector of computers hard disk
When computer boots up, virus runs in place of computers normal system files Removal first requires rebooting from uninfected, write-protected disk with system files on it
Macro viruses: take form of macro that may be executed as user works with a program
Quick to emerge and spread Symptoms vary widely
Worms: programs that run independently and travel between computers and across networks
Not technically viruses Can transport and hide viruses
Virus Characteristics
Encryption: encrypted virus may thwart antivirus programs attempts to detect it Stealth: stealth viruses disguise themselves as legitimate programs or replace part of legitimate programs code with destructive code Polymorphism: polymorphic viruses change characteristics every time transferred Time-dependence: time-dependent viruses programmed to activate on particular date
Antivirus Policies
Provide rules for using antivirus software and policies for installing programs, sharing files, and using floppy disks Suggestions for antivirus policy guidelines:
Every computer in organization equipped with virus detection and cleaning software Users should not be allowed to alter or disable antivirus software Users should know what to do in case virus detected
Virus Hoaxes
False alerts about dangerous, new virus that could cause serious damage to systems
Generally an attempt to create panic Should not be passed on Can confirm hoaxes online
Fault Tolerance
Capacity for system to continue performing despite unexpected hardware or software malfunction Failure: deviation from specified level of system performance for given period of time Fault: involves malfunction of system component
Can result in a failure
Varying degrees
At highest level, system remains unaffected by even most drastic problems
Environment
Must analyze physical environment in which devices operate
e.g., excessive heat or moisture, break-ins, natural disasters
Data Backup
Copy of data or program files created for archiving or safekeeping
No matter how reliable and fault-tolerant you believe your servers hard disk (or disks) to be, still risk losing everything unless you make backups on separate media and store them off-site
Optical Media
Capable of storing digitized data
Uses laser to write and read data CD-ROMs and DVDs
Requires proper disk drive to write data Writing data usually takes longer than saving data to another type of media
Tape Backups
Relatively simple, capable of storing large amounts of data, at least partially automated On relatively small networks, standalone tape drives may be attached to each server On large networks, one large, centralized tape backup device may manage all subsystems backups
Usually connected to computer other than file server
For backing up large amounts of data, likely to use external disk drive with backup control features, high capacity, and fast read-write access Faster data transfer rates than optical media or tape backups
Network Backups
Save data to another place on network
Must back up data to different disk than where it was originally stored
Most NOSs provide utilities for automating and managing network backups Online backup: saves data across Internet to another companys storage array
Strict security measures to protect data in transit Backup and restoration processes automated
Backup Strategy
Strategy should address following questions:
What data must be backed up? Rotation schedule? Time backups occur? Method of accuracy verification? Where and how long will backup media be stored? Who will take responsibility? How long will backups be saved? Where will documentation be stored?
Incremental backup: copies only data that has changed since last full or incremental backup
Unchecks archive bit for every file saved
Differential backup: does not uncheck archive bits for files backed up
Make sure backup activity recorded in backup log Establish regular schedule of verification
Warm site: same as cold site, but some computers and devices appropriately configured, updated, or connected Hot site: computers, devices, and connectivity necessary to rebuild network are appropriately configured, updated, and connected to match networks current state
Summary
Integrity refers to the soundness of your networks files, systems, and connections Several basic measures can be employed to protect data and systems on a network A virus is a program that replicates itself so as to infect more computers, either through network connections or through external storage devices passed among users A good antivirus program should be able to detect viruses through signature scanning, integrity checking, and heuristic scanning
Summary (continued)
The goal of fault-tolerant systems is to prevent faults from progressing to failures Fault tolerance is a systems capacity to continue performing despite an unexpected hardware or software malfunction A UPS is a battery power source that prevents undesired features of the power source from harming the device or interrupting its services For utmost fault tolerance in power supply, a generator is necessary
Summary (continued)
Critical servers often contain redundant NICs, processors, and/or hard disks to provide better fault tolerance Server mirroring involves utilizing a second, identical server to duplicate the transactions and data storage of one server Clustering links multiple servers together to act as a single server RAID is an important storage redundancy feature
Summary (continued)
Backups can be saved to optical media (such as CDs and DVDs), tapes, external disk drives, or to another location on a network The aim of a good backup rotation scheme is to provide excellent data reliability but not to overtax your network or require much intervention Disaster recovery is the process of restoring your critical functionality and data after an enterprisewide outage that affects more than a single system or a limited group of users