280 likes | 295 Views
Week 6 Monday, February 27. IT Infrastructure Reliability and Security of IT Services Security. IT Infrastructure, Another View…. IT Architecture and Advances in IT. Era I - Mainframe (1950’s - 1970s) IT paradigm Centralized computing Automated functions Information management
E N D
Week 6Monday, February 27 IT Infrastructure Reliability and Security of IT Services Security
IT Architecture and Advances in IT • Era I - Mainframe (1950’s - 1970s) • IT paradigm • Centralized computing • Automated functions • Information management • Focus on data (i.e., data processing and efficiency) • Fixed reporting • File-based
IT Architecture and Advances in IT • Era II - PC (1970’s - 1980s) • IT paradigm • Microcomputer • Decentralized, end-user developed computing • Information management • Focus on information (i.e., specialized applications) • Specialized and personal software (i.e., electronic spreadsheets, word processing, file management) • Islands of information
IT Architecture and Advances in IT • Era III - Network (1990’s - present) • IT paradigm • Client/server (fat and thin clients) • Internet, intranet (within the organization), extranet (between the organization and its suppliers/partners) • End-user computing • Information management • Focus on knowledge (i.e., OLAP tools, data warehousing/mining) • Relational and OO database (centralized data repository)
InfrastructureDelivering the right information to the right people at the right time • Delivering IT resources to support users throughout the organization • Four layer infrastructure (Weill and Broadbent) • IT components • Human IT infrastructure • Shared IT services – services that users can draw upon and share to conduct business • Shared and standard IT applications – stable applications that change less frequently
Structure of the IT Infrastructure Local applications IT infrastructure Shared and standard IT applications Shared IT services Human IT infrastructure IT components
Three Views of IT Infrastructure • Economies of scale (utility) – providing IT/IS as a service to the business to facilitate operations • Emphasis on reducing costs • Support for business programs (dependent) – IT tied to business plan and value-added initiatives • Flexibility to meet changes in the marketplace (enabling) – IT planning tied to business strategic plan • Co-alignment between business strategy and IT strategy • Strategic IT and strategic IT planning
Strategic Grid: Placing Infrastructure Planning and Management in Perspective High Mission Critical Strategic Strategic IT plan, initiatives Factory Operational IT Impact of Existing IT applications Support Basic elements Turnaround Gradual adoption Less critical Low Low High Impact of Future IT applications How we view reliability and security depends on where the organization lies on the strategic grid.
Infrastructure Reliability • Ensuring continuous operations in support of the organization • 27 x 7 operation (if important) • Redundancy of components • Cost of maintaining continuous operations vs. cost of failure • Threats and countermeasures
Availability Component 1 98% availability Component 2 98% availability Component 3 98% availability Component 4 98% availability Component 5 98% availability 100% .98 x .98 x .98 x .98 x .98 = .9039 Overall service availability Complexity of the system increases as the number of components increase Availability 0% Number of components
Availability Component 1 98% availability Component 2 98% availability Component 3 98% availability Component 4 98% availability Component 5 98% availability .98 x .98 x .98 x .98 x .98 = .9039 Component 1 98% availability Redundancy: If each component has a failure rate of .02, then a complete failure of the system is .02 x .02 x .02 x .02 x .02 = .000000032 Component 2 98% availability Component 3 98% availability Components running in parallel (i.e., each component is capable of doing all functions) Component 4 98% availability Component 5 98% availability
Making a High-Availability Facility • Uninterruptible electric power delivery • Physical security • Climate control and fire suppression • Network connectivity • N+1 and N+N redundancy of mission critical components
Malicious Threats and Defensive Measures • Types of threats: • External attacks – denial of service (DoS) • Intrusion – access via the IT infrastructure • Viruses and worms • Defensive measures • Security policies – defines security by recognizing IT as a resource • Firewalls • Authentication • Encryption • Patching and change management • Intrusion detection and network monitoring
Risk Management • Risk of failure or a breach of security • Must be classified (i.e., critical, not critical, etc.) • Addressed in proportion to their likelihood and potential consequences • Management action to mitigate risks • Costs vs. potential benefits • Expected loss (probability of a threat occurring x cost)
Prioritization of Risks High Fire Hacking Earthquake Intrusion Critical Threats Corporate espionage Consequences Construction Minor Threats Flooding Lightning Low 1 0 Probability
Managing Threats and Risks • Sound infrastructure design • Disciplined execution of operating procedures • Careful documentation • Established crisis management procedures • Rehearsing incident response • Security audit • Recovery procedures
Threats • Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently the organization. • Tangible losses (hardware, software, data) • Intangible losses (credibility, confidentiality) Countermeasures and Contingency Plans
Threats and Countermeasures • Initiate countermeasures to overcome threats • Consider the types of threat and their impact on the organization • Cost-effectiveness • Frequency • Severity
Threats and Countermeasures • Objective is to achieve a balance between a reasonable secure operation, which does not unduly hinder users, and the costs of maintaining it. • Risks are independent of the countermeasures Secured Operations Costs Countermeasures Risks
Countermeasures • Computer-based vs. Non-computer-based Implemented through the operating system and/or DBMS Management policies and procedures
Computer-Based Controls • Authorization • Backup (and recovery) • Journaling • Integrity controls • Encryption • Associated procedures
Noncomputer-Based Controls • Security policy and contingency plans • Personnel controls • Securing positioning of equipment • Secure data and software • Escrow agreements • Maintenance agreements • Physical access controls • Building controls • Emergency arrangements Management- oriented
Non-Computer-Based Controls:Countermeasures • Security policy and contingency plan • Security - covers the operations of the database • Contingency plan - addresses plans for catastrophic events • Procedures to follow • Line of command • Personal controls • Assessing and monitoring employees • Training • Responsibilities - sharing and splitting • Job controls
Non-Computer-Based Controls:Countermeasures • Securing: • Hardware • Data and software • Physical access controls • Internal and external • Emergency arrangements • Cold, warm and hot sites
Non-Computer-Based Controls:Countermeasures • Risk analysis • Identify assets • Identify threats and risks • Establish their costs relative to losses • Determine countermeasure • Establish effectiveness of the countermeasure • Establish cost of implementing the countermeasure • Examine cost/benefit of countermeasure • Make recommendation