Network+ Guide to Networks 4th - CHP 13 - Ensuring Integrity and Availability

Network+ Guide to Networks 4th - CHP 13 - Ensuring Integrity and Availability

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Network+ Guide to Networks, Fourth Edition Chapter 13 Ensuring Integrity and Availability
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 2 Objectives Identify the characteristics of a network that keeps data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies
Background image of page 2
Network+ Guide to Networks, 4e 3 What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices, and connections Availability: how consistently and reliably file or system can be accessed by authorized personnel Need well-planned and well-configured network Data backups, redundant devices, protection from malicious intruders Phenomena compromising integrity and availability: Security breaches, natural disasters, malicious intruders, power flaws, human error
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 4 What Are Integrity and Availability? (continued) General guidelines for protecting network: Allow only network administrators to create or modify NOS and application system files Monitor network for unauthorized access or changes Record authorized system changes in a change management system Install redundant components Perform regular health checks
Background image of page 4
Network+ Guide to Networks, 4e 5 What Are Integrity and Availability? (continued) General guidelines for protecting network (continued): Check system performance, error logs, and system log book regularly Keep backups, boot disks, and emergency repair disks current and available Implement and enforce security and disaster recovery policies
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 6 Viruses Program that replicates itself with intent to infect more computers Through network connections or exchange of external storage devices Typically copied to storage device without user’s knowledge Trojan horse: program that disguises itself as something useful but actually harms system Not considered a virus
Background image of page 6
Network+ Guide to Networks, 4e 7 Types of Viruses Boot sector viruses: located in boot sector of computer’s hard disk When computer boots up, virus runs in place of computer’s normal system files Removal first requires rebooting from uninfected, write-protected disk with system files on it Macro viruses: take form of macro that may be executed as user works with a program Quick to emerge and spread Symptoms vary widely
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 8 Types of Viruses (continued) File-infected viruses: attach to executable files When infected executable file runs, virus copies itself to memory Can have devastating consequences Symptoms may include damaged program files, inexplicable file size increases, changed icons for programs, strange messages, inability to run a
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK+ G Networks+ taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 54

Network+ Guide to Networks 4th - CHP 13 - Ensuring Integrity and Availability

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online