1 / 21

the Beneficent

In the NAME of. the Beneficent. the MERCIFUL. “Assuring Reliable and Secure IT Services”. Redundancy Availability Math High-Availability Facilities Securing Infrastructure against Threats Incident Management and Disaster Recovery. IT Redundancy: Its Value.

neile
Download Presentation

the Beneficent

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. In the NAME of theBeneficent theMERCIFUL

  2. “Assuring Reliable and Secure IT Services”

  3. Redundancy • Availability Math • High-Availability Facilities • Securing Infrastructure against Threats • Incident Management and Disaster Recovery

  4. IT Redundancy: Its Value ”The key to reliable systems is redundancy” • How much reliability to buy? • Some costs of failure are intangible and hard to quantify. It is difficult to estimate the probability of such failure. • Redundant systems are more complex than non-redundent systems, and this complexity must be managed. • Technologies To assure 24/7 operations get better all the time.

  5. Retool Your Data Center Transforming a data center for e-business is almost like rebuilding a 747 while it's flying. "The real challenge is to provide continuous application availability while changing everything around you." The most fundamental way to ease the transition is to get a better understanding of your business model, customer needs and how applications interact with one another in a Web-enabled world. Have an architecture that lets administrators add, remove, test or repair hardware and software - without taking down the complex.

  6. Availability Math • Availability of Components in Series • The effect of Redundancy on Availability • High Availability Facilities • N+1 And N+N Redundancy(six sigma 99.999%)

  7. Availability Math The Availability of Components in the Series

  8. Availability Math The Effects of Redundancy on Availability

  9. Availability Math High-Availability Facilities • Uninterruptible Electric Power Delivery • Physical Security • Climate Control and Fire Suppression • Network Connectivity • Help Desk and Incident Response Procedures

  10. Availability Math N + 1 and N + N Redundancy • N+1 means that for each type of critical component there should be at least one unit standing by. • N+N redundancy requires twice as many mission-critical components as are necessary to run a facility at any one time.

  11. Securing Infrastructure: • Who are the Attackers • Hacker: An outside person who has penetrated a computer system, usually with no criminal intent. • Cracker: A malicious hacker. • Social engineering: Getting around security systems by tricking computer users into revealing sensitive information or gaining unauthorized access privileges. • Cybercrimes: Illegal activities executed on the Internet. • Cyber war: War in which a country’s information systems could be paralyzed from a massive attack by destructive software. • Virus: Software that can attach itself to (“infect”) other computer programs without the owner of the program being aware of the infection.

  12. Defensive Measures • Security policies • Fire walls • Authentications • Encryptions

  13. Security Policies • What kinds of passwords are to be used, and how often should they be changed? • Who is allowed to have accounts on company systems? • What security features must be activated before a company can connect to a network? • What are users allowed to download? • Firewalls • Firewalls provide a boundary at the distant so that not everyone without authorize access can enter the system. • It is not the full proof system but is very effective in controlling unauthorized access.

  14. 3.Authentication • Passwords expire regularly and forms of passwords are restricted. • User name/password plus one other factor, such as biometric verification of identity (figure prints, DNA’s, Voice waves). 4.Encryption • Encryption is encoding the messages and sending to the recipient's and the recipient is decoding the message. • The sender and user both should have access to the key for this purpose and key should be kept safe so that no user in between and other than intended reads the message.

More Related