1 / 30

Maintaining the Network

Maintaining the Network. 17. Hot and Cold Spares. Hot spare requires no technician intervention Cold spare requires technician to install it into the system after removing the failed component. Hot, Cold, and Warm Sites.

kent
Download Presentation

Maintaining the Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Maintaining the Network 17

  2. Hot and Cold Spares Hot spare requires no technician intervention Cold spare requires technician to install it into the system after removing the failed component

  3. Hot, Cold, and Warm Sites Describes the readiness of an off-site data storage facility to recover from a failure at the primary site

  4. Electrical Surge Can be suppressed by a lightening arrestor or an Uninterruptible Power Supply (UPS)

  5. Electrical Spike Can be caused by electrical equipment, such as motors, welders, and switches The result of inductive reactance, which is associated with the coils inside some electrical equipment Isolating the computer system electrical circuit can reduce the effects

  6. Brownout Main cause is excessive consumption of electricity Can damage electrical equipment UPS unit could prevent its effects

  7. Blackout Routinely caused by electrical system equipment failure Can cause a loss of data UPS unit could prevent its effects

  8. Uninterruptable Power Supply (UPS) • Protects against electrical surges, spikes, brownouts, and blackouts • Exact length of time UPS can supply power during a blackout depends on the: • Amount of electrical load it must support • Size or amp-hour capacity of the batteries in the UPS unit • Provides power conditioning

  9. UPS Categories Standby UPS—Still possibility of data corruption Continuous UPS—Eliminates possibility of data corruption Isolation transformer—Normally used to raise or lower voltage levels in electrical systems A generator should be used for computer systems that require 24/7/365 uptime

  10. Protecting Networks from Malware • Malicious code can compromise security, damage data, and cause system failure • Best protection against malware is a combination of: • User policies • Antivirus software

  11. User Policies Outline how users are to use and not use their workstation and the network Should be set in place and enforced Typically called an Acceptable Use Policy

  12. Acceptable Use Policy Do not open e-mail attachments from unknown sources, or with exe, com, or bat extensions Do not download any files from unknown sources Update antivirus software on a regular basis Never open e-mail ads, chain letters, or junk mail Do not click icons embedded in files or e-mails If you doubt authenticity, verify source first

  13. Antivirus Software Used to scan files and e-mail for viruses Should be installed on server and each workstation Consists of a scan engine and a virus pattern file Virus pattern file should be updated on regular basis Antivirus suite can include firewall, spam protection and popup ad blocker

  14. Malware Contraction of description malicious software Unauthorized activity can be harmless or destructive The terms malware, virus, and worm are often used interchangeably; this is not technically correct Can be a combination of classifications

  15. Virus Three Phases of a Virus

  16. Worm Different than a virus in that it spreads to network computers from the infected computer Is typically distributed through e-mail

  17. Trojan Horse Once it is opened, the malware is activated Can cause immediate damage or wait until preset date Has harmless outward appearance Can cause most anything imaginable to the computer

  18. Applied Networking A user receives an e-mail posing to be from the IRS. Attached is a document with malicious code. When the attachment is opened, the code executes, steals banking information stored on the user’s computer, and forwards it to the malicious party. How would this type of virus be classified and why?

  19. Applied Networking A user receives an e-mail posing as a Facebook notification. The e-mail prompts the user to click a URL to view the message. When the user clicks the URL, he or she is taken to a site and prompted to install a fake Facebook Messenger program. This program, if installed, allows an intruder to execute any command from the user’s computer. How would this type of virus be classified and why?

  20. Joke Program Typically activated when the user invokes a certain action Some jokes are not destructive, but time is needed to remove program Examples: A dialog box indicating the hard disk drive is about to be formatted

  21. MBR Virus Plants a hexadecimal code in the master boot record, rendering the MBR useless Results in boot failure Many antivirus programs perform MBR backups as part of their installation

  22. Logic Bomb Can be triggered by a date, time, certain number, word, file name, etc. In waiting before delivering its payload, this malware has time to spread to other computers

  23. Backdoor Virus Not designed to be directly destructive, but to breach security systems Backdoor allows computer file system to be accessed by an intruder

  24. Password Virus Steals a password and stores it on another location Is closely associated with the backdoor virus and may be used in combination

  25. Stealth Virus Signature of a stealth virus is difficult to detect Antivirus program detects stealth virus by changes to file length

  26. Polymorphic Virus Changes its characteristics to go undetected by antivirus programs Most dangerous viruses use both polymorphic and stealth characteristics

  27. Hoax Can be classified as a prank Can cost money through loss of production Consumes a lot of time to determine that program is harmless

  28. Macro Virus Created with the macro feature of a software application Usually distributed as an e-mail attachment

  29. System Migration • Can refer to: • Combining two diverse network systems • Converting an operating system to a newer version that uses different technologies

  30. In class lab Roberts Labs 84,85 Next Class LabSim homework: 9.3.1-9.3.2

More Related