System Guide to Networks, Fourth Edition

1789 days ago, 647 views
PowerPoint PPT Presentation
System Guide to Networks, 4e. 2. What Are Integrity and Availability?. Uprightness: soundness of network\'s projects, information, administrations, gadgets, and connectionsAvailability: how reliably and dependably document or framework can be gotten to by approved personnelNeed all around arranged and very much designed networkData reinforcements, repetitive gadgets, security from noxious intrudersPhenomena trading off integrit

Presentation Transcript

Slide 1

Network+ Guide to Networks, Fourth Edition Chapter 13 Ensuring Integrity and Availability

Slide 2

What Are Integrity and Availability? Uprightness: soundness of system's projects, information, administrations, gadgets, and associations Availability: how reliably and dependably document or framework can be gotten to by approved faculty Need all around arranged and all around designed system Data reinforcements, repetitive gadgets, insurance from pernicious gatecrashers Phenomena bargaining trustworthiness and accessibility: Security breaks, catastrophic events, malevolent interlopers, control blemishes, human blunder Network+ Guide to Networks, 4e

Slide 3

Viruses Program that reproduces itself with plan to taint more PCs Through system associations or trade of outside capacity gadgets Typically duplicated to capacity gadget without client's learning Trojan steed: program that masks itself as something helpful in any case hurts framework Not considered an infection Network+ Guide to Networks, 4e

Slide 4

Types of Viruses Boot division infections: situated in boot segment of PC's hard circle When PC boots up, infection keeps running set up of PC's ordinary framework records Removal first requires rebooting from uninfected, compose ensured plate with framework records on it Macro infections: take type of large scale that might be executed as client works with a program Quick to rise and spread Symptoms shift broadly Network+ Guide to Networks, 4e

Slide 5

Types of Viruses (proceeded with) File-contaminated infections: connect to executable documents When contaminated executable record runs, infection duplicates itself to memory Can have annihilating outcomes Symptoms may incorporate harmed program documents, illogical document measure increments, changed symbols for projects, abnormal messages, powerlessness to run a program Worms: programs that run freely and traverse systems Not actually infections Can transport and stow away infections Network+ Guide to Networks, 4e

Slide 6

Types of Viruses (proceeded with) Trojan stallion: program that cases to accomplish something valuable yet rather hurts framework Network infections: engendered by means of system conventions, orders, informing projects, and information joins Bots: program that runs consequently, without requiring a man to begin or stop it Many bots spread through Internet Relay Chat (IRC) Used to harm/decimate information or framework records, issue offensive substance, additionally proliferate infection Network+ Guide to Networks, 4e

Slide 7

Virus Characteristics Encryption: scrambled infection may upset antivirus program's endeavors to distinguish it Stealth: stealth infections camouflage themselves as true blue projects or supplant some portion of true blue program's code with dangerous code Polymorphism: polymorphic infections change qualities each time exchanged Time-reliance: time-subordinate infections customized to initiate on specific date Network+ Guide to Networks, 4e

Slide 8

Virus Protection: Antivirus Software Antivirus programming ought to at any rate: Detect infections through mark examining Detect infections through honesty checking Detect infections by observing startling record changes or infection like practices Receive standard redesigns and alterations from a unified system reassure Consistently report just legitimate infections Heuristic filtering strategies endeavor to recognize infections by finding "infection like" conduct (may give "false positives") Network+ Guide to Networks, 4e

Slide 9

Antivirus Policies Provide rules for utilizing antivirus programming and approaches for introducing programs, sharing records, and utilizing floppy plates Suggestions for antivirus arrangement rules: Every PC in association outfitted with infection discovery and cleaning programming Users ought not be permitted to modify or debilitate antivirus programming Users ought to realize what to do on the off chance that infection identified Network+ Guide to Networks, 4e

Slide 10

Fault Tolerance Capacity for framework to keep performing notwithstanding unforeseen equipment or programming breakdown Failure: deviation from determined level of framework execution for given timeframe Fault: includes glitch of framework segment Can bring about a disappointment Varying degrees At most abnormal amount, framework stays unaffected by even most extraordinary issues Network+ Guide to Networks, 4e

Slide 11

Power: Power Flaws Power imperfections that can harm gear: Surge: flitting increment in voltage because of lightning strikes, sunlight based flares, or electrical issues Noise: variance in voltage levels brought on by different gadgets on system or electromagnetic obstruction Brownout: passing lessening in voltage; otherwise called a hang Blackout: finish control misfortune Network+ Guide to Networks, 4e

Slide 12

UPSs (Uninterruptible Power Supplies) Battery-worked influence source straightforwardly appended to at least one gadgets and to influence supply Prevents undesired elements of outlet's A/C influence from hurting gadget or interfering with administrations Standby UPS: gives constant voltage to gadget Switch to battery when influence misfortune identified Online UPS: utilizes influence from divider outlet to persistently charge battery, while giving influence to network gadget through battery Network+ Guide to Networks, 4e

Slide 13

Servers Make servers more blame tolerant by providing them with excess segments NICs, processors, and hard circles If one thing falls flat, whole framework won't fizzle Enable load adjusting Network+ Guide to Networks, 4e

Slide 14

Server Mirroring: one gadget or segment copies exercises of another Server Mirroring: one server copies exchanges and information stockpiling of another Must be indistinguishable machines utilizing indistinguishable segments Requires rapid connection between servers Requires synchronization programming Form of replication Servers can stand one next to the other or be situated in various areas Network+ Guide to Networks, 4e

Slide 15

Clustering Link numerous servers together to go about as single server Share preparing obligations Appear as single server to clients If one server comes up short, others naturally assume control information exchange and capacity duties More savvy than reflecting To identify disappointments, bunched servers routinely survey each different Servers must be near one another Network+ Guide to Networks, 4e

Slide 16

Storage: RAID (Redundant Array of Independent (or Inexpensive) Disks) Collection of circles that give adaptation to internal failure to shared information and applications Disk exhibit Collection of circles that cooperate in RAID setup, regularly alluded to as RAID drive Appear as single sensible drive to framework Hardware RAID: set of circles and separate circle controller Managed only by RAID circle controller Software RAID: depends on programming to actualize and control RAID procedures Network+ Guide to Networks, 4e

Slide 17

RAID Level 0 ― Disk Striping Simple usage of RAID Not blame tolerant Improves execution Figure 13-6: RAID Level 0—circle striping Network+ Guide to Networks, 4e

Slide 18

RAID Level 1—Disk Mirroring Data starting with one plate replicated then onto the next circle naturally as data composed Dynamic reinforcement If one drive comes up short, circle exhibit controller naturally changes to circle that was reflecting it Requires two indistinguishable circles Usually depends on framework programming to perform reflecting Disk duplexing: like plate reflecting, however isolate circle controller utilized for each plate Network+ Guide to Networks, 4e

Slide 19

RAID Level 1—Disk Mirroring (proceeded with) Figure 13-7: RAID Level 1—plate reflecting Network+ Guide to Networks, 4e

Slide 20

RAID Level 5—Disk Striping with Distributed Parity Data written in little squares over a few plates Parity mistake checking data conveyed among circles Highly blame tolerant Very well known Failed circle can be supplanted with little intrusion Hot extra: circle or parcel that is a piece of exhibit, yet utilized just on the off chance that a RAID circles comes up short Cold extra: copy part that can be introduced if there should arise an occurrence of disappointment Network+ Guide to Networks, 4e

Slide 21

RAID Level 5—Disk Striping with Distributed Parity (proceeded with) Figure 13-9: RAID Level 5—circle striping with dispersed equality Network+ Guide to Networks, 4e

Slide 22

NAS (Network Attached Storage) Specialized capacity gadget that gives concentrated blame tolerant information stockpiling Maintains possess interface to LAN Contains claim document framework streamlined for sparing and serving records Easily extended without intruding on administration Cannot discuss specifically with system customers Network+ Guide to Networks, 4e

Slide 23

NAS (proceeded with) Figure 13-10: Network joined capacity on a LAN Network+ Guide to Networks, 4e

Slide 24

SANs (Storage Area Networks) Figure 13-11: A capacity territory organize Network+ Guide to Networks, 4e

Slide 25

Data Backup Copy of information or program documents made for filing or supervision No matter how solid and blame tolerant you trust your server's hard circle (or plates) to be, still hazard losing everything unless you make reinforcements on particular media and store them off-webpage Many choices exist for making reinforcements Network+ Guide to Networks, 4e

Slide 26

Optical Media Capable of putting away digitized information Uses laser to compose and read information CD-ROMs and DVDs Requires appropriate plate drive to compose information Writing information for the most part takes longer than sparing information to another kind of media Network+ Guide to Networks, 4e

Slide 27

External Disk Drives Storage gadgets that can be joined briefly to a PC by means of USB, PCMCIA, FireWire, or Compact-Flash port Removable circle drives For moving down a lot of information, liable to utilize outer circle drive with reinforcement control highlights, high limit, and quick read-compose get to Faster information exchange rates than optical media or tape reinforcements Network+ Guide to Networks, 4e

Slide 28

Backup Strategy (proceeded with) Archive bit: document trait that can be checked or unchecked Indicates whether record must be chronicled Backup techniques utilize file bit in various ways Full reinforcement: all information replicated to capacity media, paying little mind to whether information is new or change