Assuring Reliable and Secure IT Services - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Assuring Reliable and Secure IT Services

Description:

N 1 means that for each type of critical component there should be at least one ... Patching and Change Management. Intrusion Detection and Network Monitoring ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 17
Provided by: sga92
Category:

less

Transcript and Presenter's Notes

Title: Assuring Reliable and Secure IT Services


1
Chapter 6
  • Assuring Reliable and Secure IT Services

2
IT Redundancy Its Value
  • How much reliability to buy?
  • Customer Service impacted as a result of 15
    minutes downtime?
  • Privacy?
  • Security?
  • Normal Accidents?

3
(No Transcript)
4
(No Transcript)
5
(No Transcript)
6
(No Transcript)
7
Availability Math N 1 and N N Redundancy
  • N1 means that for each type of critical
    component there should be at least one unit
    standing by.
  • NN redundancy requires twice as many
    mission-critical components as are necessary to
    run a facility at any one time.
  • Redundancy

8
(No Transcript)
9
External Attacks and Intrusion
  • External attacks are actions against computing
    infrastructure that harm it or degrade its
    services without actually gaining access to it.
    The most common is DOS or Denial of Service. A
    distributed DOS attacks use automated routines
    secretly deposited on Internet-connected
    computers. Spoofing is used by clever attackers
    to simulate a distributed attack by inserting
    false origin information into packets to mislead
    filtering software at a target site.
  • Intrusion occurs when an intruder gains access to
    a companys internal IT infrastructure by a
    variety of methods.
  • Viruses and worms are malicious software programs
    that replicate, spreading themselves to other
    computers.

10
Securing Infrastructure Against Malicious Threats
  • Classification of Threats
  • External Attacks
  • Intrusion
  • Viruses and Worms
  • Defensive Measures
  • Firewalls
  • Security Policies
  • Authentication
  • Encryption
  • Patching and Change Management
  • Intrusion Detection and Network Monitoring

11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
Securing Infrastructure against Malicious
ThreatsDefensive measures
  • Security Policies
  • Firewalls
  • Authentication
  • Encryption
  • Patching and Change Management
  • Intrusion Detection and Network Monitoring

15
Risk Management of Availability and Security
  • See Figure 6.9 Managing Infrastructure Risk p445
  • Incident Management and Disaster Recovery
  • Managing incidents before they occur
  • Managing incidents when they occur
  • Managing incidents after they occur

16
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com