Confidential
Objectives
Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the
options for disaster contingencies
Confidential 2
Confidential 3
Confidential 4
Confidential 5
Viruses
Confidential 6
Types of Viruses
Confidential 7
Worms: programs that run independently and travel between computers and across networks
Not technically viruses Can transport and hide viruses
Confidential 8
Confidential 9
Virus Characteristics
Confidential 10
Confidential 11
Antivirus Policies
Provide rules for using antivirus software and policies for installing
programs, sharing files, and using floppy disks
Confidential 12
Confidential 13
Virus Hoaxes
False alerts about dangerous, new virus that could cause serious
damage to systems
Generally an attempt to create panic Should not be passed on Can confirm hoaxes online
Confidential 14
Fault Tolerance
Varying degrees
At highest level, system remains unaffected by even most drastic problems
Confidential 15
Environment
Confidential 16
Confidential 17
Online UPS: uses power from wall outlet to continuously charge battery, while providing power to network device through battery
Confidential 18
UPSs (continued)
Confidential 19
Generators
Key to fault tolerance in network design is supplying multiple possible data paths
If one connection fails, data can be rerouted On LANs, star topology and parallel backbone provide greatest fault tolerance On WANs, full mesh topology offers best fault tolerance SONET networks highly fault-tolerant
Redundancy in network offers advantage of reducing risk of lost functionality and profits from network faults
Confidential 21
Confidential 23
Servers
Confidential 25
Server Mirroring
Mirroring: one device or component duplicates activities of another Server Mirroring: one server duplicates transactions and data storage of another
Must be identical machines using identical components Requires high-speed link between servers Requires synchronization software Form of replication
Confidential 26
Clustering
Confidential 27
Confidential 28
RAID Level 0
Disk Striping
Confidential 30
Confidential 32
Confidential 33
Hot spare: disk or partition that is part of array, but used only in case
a RAID disks fails
Confidential 34
Confidential 36
NAS (continued)
Data Backup
Confidential 39
Confidential 40
Optical Media
Requires proper disk drive to write data Writing data usually takes longer than saving data to another type of
media
Confidential 41
Tape Backups
Confidential 42
Confidential 43
Network Backups
Confidential 44
Backup Strategy
Confidential 45
Incremental backup: copies only data that has changed since last full or incremental backup
Unchecks archive bit for every file saved
Differential backup: does not uncheck archive bits for files backed up
Confidential 46
Make sure backup activity recorded in backup log Establish regular schedule of verification
Confidential 47
Confidential 49
Warm site: same as cold site, but some computers and devices appropriately configured, updated, or connected Hot site: computers, devices, and connectivity necessary to rebuild network are appropriately configured, updated, and connected to match networks current state
Confidential 50
Summary
Integrity refers to the soundness of your networks files, systems, and connections Several basic measures can be employed to protect data and systems on a network A virus is a program that replicates itself so as to infect more computers, either through network connections or through external storage devices passed among users A good antivirus program should be able to detect viruses through signature scanning, integrity checking, and heuristic scanning
Confidential 51
Summary (continued)
Confidential 52
Summary (continued)
Clustering links multiple servers together to act as a single server RAID is an important storage redundancy feature
Confidential 53
Summary (continued)
Confidential 54