Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Fourth Edition
Chapter 13
Ensuring Integrity and Availability
Objectives
Identify the characteristics of a network that keeps
data safe from loss or damage
Protect an enterprise-wide network from viruses
Explain network- and system-level fault-tolerance
techniques
Discuss issues related to network backup and
recovery strategies
Describe the components of a useful disaster
recovery plan and the options for disaster
contingencies
Network+ Guide to Networks, 4e
Viruses
Program that replicates itself with intent to infect
more computers
Through network connections or exchange of
external storage devices
Typically copied to storage device without users
knowledge
Types of Viruses
Boot sector viruses: located in boot sector of
computers hard disk
When computer boots up, virus runs in place of
computers normal system files
Removal first requires rebooting from uninfected,
write-protected disk with system files on it
Virus Characteristics
Encryption: encrypted virus may thwart antivirus
programs attempts to detect it
Stealth: stealth viruses disguise themselves as
legitimate programs or replace part of legitimate
programs code with destructive code
Polymorphism: polymorphic viruses change
characteristics every time transferred
Time-dependence: time-dependent viruses
programmed to activate on particular date
10
11
Antivirus Policies
Provide rules for using antivirus software and
policies for installing programs, sharing files, and
using floppy disks
Suggestions for antivirus policy guidelines:
Every computer in organization equipped with virus
detection and cleaning software
Users should not be allowed to alter or disable
antivirus software
Users should know what to do in case virus detected
12
13
Virus Hoaxes
False alerts about dangerous, new virus that could
cause serious damage to systems
Generally an attempt to create panic
Should not be passed on
Can confirm hoaxes online
14
Fault Tolerance
Capacity for system to continue performing despite
unexpected hardware or software malfunction
Failure: deviation from specified level of system
performance for given period of time
Fault: involves malfunction of system component
Can result in a failure
Varying degrees
At highest level, system remains unaffected by even
most drastic problems
15
Environment
Must analyze physical environment in which
devices operate
e.g., excessive heat or moisture, break-ins, natural
disasters
16
17
18
UPSs (continued)
Factors to consider when deciding on a UPS:
Amount of power needed
Power measured in volt-amps
19
Generators
20
21
22
23
24
Servers
Make servers more fault-tolerant by supplying them
with redundant components
NICs, processors, and hard disks
If one item fails, entire system wont fail
Enable load balancing
25
Server Mirroring
Mirroring: one device or component duplicates
activities of another
Server Mirroring: one server duplicates
transactions and data storage of another
Must be identical machines using identical
components
Requires high-speed link between servers
Requires synchronization software
Form of replication
26
Clustering
Link multiple servers together to act as single
server
Share processing duties
Appear as single server to users
If one server fails, others automatically take over
data transaction and storage responsibilities
More cost-effective than mirroring
To detect failures, clustered servers regularly poll
each other
Servers must be close together
Network+ Guide to Networks, 4e
27
28
29
30
31
32
33
34
35
36
NAS (continued)
37
38
Data Backup
Copy of data or program files created for archiving
or safekeeping
No matter how reliable and fault-tolerant you believe
your servers hard disk (or disks) to be, still risk
losing everything unless you make backups on
separate media and store them off-site
39
40
Optical Media
Capable of storing digitized data
Uses laser to write and read data
CD-ROMs and DVDs
41
Tape Backups
Relatively simple, capable of storing large amounts
of data, at least partially automated
On relatively small networks, standalone tape
drives may be attached to each server
On large networks, one large, centralized tape
backup device may manage all subsystems
backups
Usually connected to computer other than file server
42
43
Network Backups
Save data to another place on network
Must back up data to different disk than where it was
originally stored
44
Backup Strategy
Strategy should address following questions:
45
46
47
48
Disaster Recovery:
Disaster Recovery Planning
Disaster recovery: process of restoring critical
functionality and data after enterprise-wide outage
Disaster recovery plan accounts for worst-case
scenarios
Contact names and info for emergency coordinators
Details on data and servers being backed up,
backup frequency, backup location, how to recover
Details on network topology, redundancy, and
agreements with national service carriers
Strategies for testing disaster recovery plan
Plan for managing the crisis
Network+ Guide to Networks, 4e
49
50
Summary
Integrity refers to the soundness of your networks
files, systems, and connections
Several basic measures can be employed to
protect data and systems on a network
A virus is a program that replicates itself so as to
infect more computers, either through network
connections or through external storage devices
passed among users
A good antivirus program should be able to detect
viruses through signature scanning, integrity
checking, and heuristic scanning
Network+ Guide to Networks, 4e
51
Summary (continued)
The goal of fault-tolerant systems is to prevent
faults from progressing to failures
Fault tolerance is a systems capacity to continue
performing despite an unexpected hardware or
software malfunction
A UPS is a battery power source that prevents
undesired features of the power source from
harming the device or interrupting its services
For utmost fault tolerance in power supply, a
generator is necessary
Network+ Guide to Networks, 4e
52
Summary (continued)
Critical servers often contain redundant NICs,
processors, and/or hard disks to provide better fault
tolerance
Server mirroring involves utilizing a second,
identical server to duplicate the transactions and
data storage of one server
Clustering links multiple servers together to act as
a single server
RAID is an important storage redundancy feature
53
Summary (continued)
Backups can be saved to optical media (such as
CDs and DVDs), tapes, external disk drives, or to
another location on a network
The aim of a good backup rotation scheme is to
provide excellent data reliability but not to overtax
your network or require much intervention
Disaster recovery is the process of restoring your
critical functionality and data after an enterprisewide outage that affects more than a single system
or a limited group of users
Network+ Guide to Networks, 4e
54