520 likes | 723 Views
Chapter 11. Security through Disaster Recovery. Objectives. Deploy UPS systems Create hardware redundancy and apply fault-tolerance options Deploy RAID Back up data and operating system files. Uninterruptible Power Supply.
E N D
Chapter 11 Security through Disaster Recovery
Objectives • Deploy UPS systems • Create hardware redundancy and apply fault-tolerance options • Deploy RAID • Back up data and operating system files Guide to Operating System Security
Uninterruptible Power Supply • Best fault-tolerance method to prevent power problems from causing data loss and component damage • Provides immediate battery power to equipment during unexpected power loss • Protects against lost data and downtime Guide to Operating System Security
Uninterruptible Power Supply Guide to Operating System Security
Selecting and Deploying a UPS (Continued) • Online (inline) • Powered directly from batteries • More guaranteed protection • Offline (standby) • Switches to batteries when reduction in city power is detected • Less expensive • Batteries can last longer, but may not switch to battery in time for full protection Guide to Operating System Security
Selecting and Deploying a UPS (Continued) • Provides power for limited time period • Usually guards against power surges • Can communicate information to computers it supports • Requires periodic testing to ensure it is working Guide to Operating System Security
Configuring a UPS inWindows 2000/XP/2003 • All support serial and USB communications with a UPS Guide to Operating System Security
Configuring a UPS inRed Hat Linux • Supported by Red Hat Linux 9.x • Obtain UPS serial or USB communications software from manufacturer • Use configuration software provided by UPS manufacturer Guide to Operating System Security
Configuring a UPS inNetWare 6.x • Communicates through serial port connection and employment of AIOCOMX and UPS_AIO NLMs Guide to Operating System Security
UPS_AIO Configuration Options (Continued) Guide to Operating System Security
UPS_AIO Configuration Options (Continued) Guide to Operating System Security
Configuring a UPS inMac OS X • Obtain UPS serial or USB communications software from manufacturer Guide to Operating System Security
Creating Hardware Redundancy and Fault Tolerance • Hardware redundancy includes • Using redundant components • Employing multiprocessor systems • Clustering services • Placing servers in different locations • Implementing data warehousing Guide to Operating System Security
Using Redundant Components • Network interface cards (NICs) • Power supplies Guide to Operating System Security
Using Redundant NICs • Designed to match particular network transport methods, computer bus types, network media • Network connection requirements: • Appropriate connector for network medium • Transceiver • MAC controller • Protocol control firmware Guide to Operating System Security
Considerations When Using Redundant NICs • Fast speed (up to 100 Mbps for a workstation) • Match network transport method • Support both full-duplex and half-duplex transmissions • Brand-name, high-quality NICs • Latest driver and protocol control firmware Guide to Operating System Security
Using Redundant Power Supplies • Can take over if main power supply fails • Consider for the following: • SMTP mail servers • Servers that authenticate users to a network • Web servers • Database servers Guide to Operating System Security
Employing Multiprocessor Systems • Symmetric multiprocessor (SMP) computers • Two or more computers share the processing load • If one stops working, remaining processors take over • Make sure you understand the specific requirements for adding CPUs to your OS Guide to Operating System Security
Clustering Servers • Links multiple computers and their resources • Two models • Shared disk model • Shared nothing model Guide to Operating System Security
Clustering Servers Guide to Operating System Security
Main connection Backup connection is case of server failure Main connection Figure 11-3 Shared nothing clustering model Shared Nothing Clustering Model Guide to Operating System Security
Placing Servers in Different Locations • Microsoft distributed file system (DFS) • Available in Windows 2000 Server/Server 2003 • Provides fault tolerance by placing copies of the same folders on computers in different locations • Folders appear to exist in one centralized hierarchy of folders • Has many advantages Guide to Operating System Security
Implementing Data Warehousing • Duplicating a main database’s data, typically on another computer • Often created for queries and reporting and to provide backup of the main database Guide to Operating System Security
Fault-Tolerance Options • Disk mirroring • Disk duplexing • Redundant array of inexpensive (or independent) disks (RAID) Guide to Operating System Security
Disk Mirroring Guide to Operating System Security
Disk Duplexing Guide to Operating System Security
Using RAID • Set of standards for lengthening disk life and preventing data loss • Goal: to spread disk activity equally across all volumes Guide to Operating System Security
Essential RAID levels • RAID level 0 (striping) • RAID level 1 (mirroring and duplexing) • RAID level 2 • RAID level 3 • RAID level 4 • RAID level 5 (striping combined with error correction and checksum verification) Guide to Operating System Security
RAID Support in Windows 2000 Server/Server 2003 • Support only RAID levels 0, 1, and 5 for disk fault tolerance • Levels 1 and 5 recommended • Recognize two types of disks • Basic • Dynamic Guide to Operating System Security
RAID Support in Windows 2000 Server/Server 2003 (Continued) • Configuration considerations • Boot and system files can be placed on RAID level 1, but not on RAID level 5 • RAID level 1 uses two hard disks; RAID level 5 uses from 3 to 32 • RAID level 1 is more expensive to implement than RAID level 5 Guide to Operating System Security
RAID Support in Windows 2000 Server/Server 2003 (Continued) • Configuration considerations • RAID level 5 requires more memory than RAID level 1 • Disk read access is faster than write access in RAID level 1 and RAID level 5 • RAID level 5 has much faster read access than RAID level 1 Guide to Operating System Security
Creating a RAID Volume in Windows 2000 Server/Server 2003 Guide to Operating System Security
RAID Support inRed Hat Linux 9.x • Supports RAID levels 0, 1, and 5 • Configured at installation when using GUI installation mode • First install all disks and associated hardware • Plan for the number of spare partitions • Choose Disk Druid from Disk Partitioning Setup screen Guide to Operating System Security
RAID Support in NetWare 6.x • Supports RAID levels 0, 1, and 5 • Can manage RAID using Novell Storage Services (NSS) tools from ConsoleOne • NetWare 6.5 offers iManage, a browser tool for managing objects Guide to Operating System Security
RAID Support in Mac OS X • Supports RAID levels 0 (striping) and 1 (mirroring) • Apple recommends not placing boot files on RAID disks Guide to Operating System Security
Software RAID versus Hardware RAID • Software RAID • Implements fault tolerance through computer’s operating system • Hardware RAID • Implemented through RAID hardware (eg, adapter) • Independent of operating system • More expensive than software RAID Guide to Operating System Security
Advantages of Hardware RAID • Faster read and write response • Ability to place boot and system files on different RAID levels • Ability to “hot swap” a failed disk with one that works or is new • More setup options to retrieve damaged data and to combine different RAID levels within one array of disks Guide to Operating System Security
Backing Up Data • Binary backup • Full file-by-file backup • Partial backups • Differential • Incremental Guide to Operating System Security
Advantages of Local Backups over Remote Backups • No extra load on network • Enable backups on multiple computer network • Provide more assurance that the Registry is backed up (Windows 2000/XP/2003) • Attacker using a sniffer cannot intercept backup traffic over a network Guide to Operating System Security
Tape Rotation • Ensures alternatives in case there is a bad or worn tape • Tower of Hanoi procedure Guide to Operating System Security
Tape Rotation Guide to Operating System Security
Windows 2000/XP/2003 Backups • Normal • Incremental • Differential • Copy • Daily Guide to Operating System Security
Backup Options Guide to Operating System Security
UNIX and Red Hat Linux Backup Tools • volcopy (not available in Red Hat Linux) • Sometimes used with labelit utility • Sometimes tar utility is used • dump • Commands used to restore • restore (Red Hat Linux) • ufsrestore • restor Guide to Operating System Security
NetWare 6.x Backup Options • Uses Storage Management System (SMS) • NLMs are loaded at Server Console prior to starting backup – TSAs designed to read and back up specific types of data Guide to Operating System Security
Target Service Agents (TSAs) • TSA600 for NetWare 6.x • TSANDS to back up NDS database and eDirectory • GWTSA for GroupWise information • Windows NT TSA to back up Windows NT, 2000, and XP data • W95TSA to back up Windows 95/98 data Guide to Operating System Security
Starting a backup in Netware 6.0 Guide to Operating System Security
Choosing What to Backup in Netware 6.0 Guide to Operating System Security
NetWare 6.x Backup Options Guide to Operating System Security
Mac OS X • Supports use of dump and tar • From the terminal window, or • Obtain a third-party utility that uses these utilities for backup • Can also use Copy utility on Edit menu Guide to Operating System Security