Inductionn + Chapter 1 Part 1
Inductionn + Chapter 1 Part 1
Course
Infrastructure Security
4 Communication security Goals
Attacks and Countermeasures
Access Control
5 DAC, MAC and RBAC
Contents
Strengthen the Infrastructure: Authentication Systems
Active Directory
Avenues to Compromise
Attractive Accounts for Credential Theft
Reducing the Active Directory Attack Surface
6 Implementing Least-Privilege Administrative Models
Implementing Secure Administrative Hosts
Securing Domain Controllers Against Attack
Monitoring Active Directory for Signs of Compromise
Audit Policy Recommendations
Network Security
Remote Access Architecture
AAA Server
7
SSO Technologies
Virtual Private Networks (VPNs)
PKI Architecture
8 Blockchain
Total
Course Book
1 Assignment 9 10
Quiz 4, 8 2 Quizzes (each 5
2
Marks)
3 Presentation 9 10
4 Mid- Term Theory Exam 6-7 20
5 Final Examination 12 50
Introduction
• Service providers have been
building massive data centers
that are distributed over
several geographical regions
to efficiently meet the
demand for their Cloud-
based services.
• In general, these data centers
are built using hundreds of
thousands of servers, and
virtualization technology is
used to provision computing
resources.
Introduction
• Due to the highly complex nature of the underlying infrastructure,
even carefully engineered data centers are subject to a large number
of failures.
• These failures evidently reduce the overall reliability and availability
of the cloud computing service.
• As a result, fault tolerance becomes of paramount importance to the
users as well as the service providers to ensure correct and
continuous system operation even in the presence of an unknown
and unpredictable number of failures.
Cloud Computing Fault Model
• A failure represents the condition in which the system deviates from
fulfilling its intended functionality or the expected behavior.
Failure in a given layer normally has an impact on the services offered by the layers
above it. For example, failure in a user-level middleware (PaaS) may produce errors
in the software services built on top of it (SaaS applications). Similarly, failures in
the physical hardware or the IaaS layer will have an impact on most PaaS and SaaS
services.
This implies that the impact of failures in the IaaS layer or the physical hardware is
significantly high; hence, it is important to characterize typical hardware faults
and develop corresponding fault tolerance techniques
Failure Behavior of Servers
Failure Behavior of the Network
• Servers are connected using a set of
network switches and routers.
• In all rack-mounted servers are first
connected via a 1 Gbps link to a top-of-
rack switch (ToR), which is in turn
connected to two (primary and backup)
aggregation switches (AggS). An AggS
connects tens of switches (ToR) to
redundant access routers (AccR). This
implies that each AccR handles traffic
from thousands of servers and routes it
to core routers that connect different
data centers to the Internet.
Failure Behavior of the Network
• A link failure happens when the connection between two devices on a specific interface is down,
and a device failure happens when the device is not routing/forwarding packets correctly (due to
power outage or hardware crash).
Figure 1.3b
BASIC CONCEPTS ON FAULT TOLERANCE
https://www.youtube.com/watch?v=VWG9xcwjxUg
Fault Tolerance Methods
Monitoring Checkpoint
Replication
Fault Tolerance Methods
• The most widely adopted methods to achieve fault tolerance against
crash faults and byzantine faults are as follows:
1- Checking and monitoring: The system is constantly monitored at
runtime to validate, verify, and ensure that correct system
specifications are being met. This technique, though very simple, plays
a key role in failure detection and subsequent reconfiguration.
2- Checkpoint and restart: The system state is captured and saved
based on predefined parameters (after every 1024 instructions or every
60 seconds). When the system undergoes a failure, it is restored to the
previously known correct state using the latest checkpoint information.
Fault Tolerance Methods
3- Replication: Critical system components are duplicated using
additional hardware, software, and network resources in such a way
that a copy of the critical components is available even after a failure
happens.
Replication mechanisms are mainly used in
two formats:
Active Passive
• In active replication, all the replicas are simultaneously invoked, and each
replica processes the same request at the same time. This implies that all
the replicas have the same system state at any given point of time, and it
can continue to deliver its service even in case of a single replica failure.
• In passive replication, only one processing unit (the primary replica)
processes the requests, while the backup replicas only save the system
state during normal execution periods. Backup replicas take over the
execution process only when the primary replica fails.
Replication Mechanisms (Cont.)
• Semiactive replication technique is derived from traditional
approaches wherein primary and backup replicas execute all the
instructions but only the output generated by the primary replica is
made available to the user.
• Output generated by the backup replicas is logged and suppressed
within the system so that it can readily resume the execution process
when the primary replica failure happens.