The document discusses the importance of security in system administration, focusing on malware protection, user access control, and the CIA Triad principles. It outlines various types of malware, safe browsing practices, and the role of firewalls in network security, along with data storage and backup strategies. Additionally, it emphasizes the need for disaster recovery planning and best practices for effective storage management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views
ITEC-110
The document discusses the importance of security in system administration, focusing on malware protection, user access control, and the CIA Triad principles. It outlines various types of malware, safe browsing practices, and the role of firewalls in network security, along with data storage and backup strategies. Additionally, it emphasizes the need for disaster recovery planning and best practices for effective storage management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
Lecture 5: Security in System Malware Protection
Administration 1. Viruses - a type of malware that
attaches itself to legitimate programs Importance of Security in System or files and spreads from one Administration computer to another when the Securing systems and data is critical for infected program or file is executed. modern organizations, as it helps prevent 2. Worms - a standalone malware that unauthorized access, protects against replicates itself to spread to other potential data breaches, and maintains the computers, often without user integrity and reliability of systems. intervention. 3. Trojans - or Trojan horse, is a type The CIA Triad—Confidentiality, Integrity, of malware that disguises itself as and Availability—is a foundational concept legitimate software or is hidden in cybersecurity that helps define the within legitimate programs to trick primary goals and priorities of protecting users into installing it. information and systems. 4. Ransomware - a type of malware that encrypts a user’s files or locks User Access Control and Permission them out of their system, demanding Controlling who has access to systems and a ransom payment to restore data is crucial for maintaining security, access. privacy, and operational stability within an organization. This access control forms the Malware Protection foundation of an effective security strategy, Using antivirus software and performing ensuring that sensitive information and regular scans are vital components of a critical resources are only available to comprehensive cybersecurity strategy. They authorized personnel. provide proactive protection against malware, help maintain system integrity and System Updates and Patch Management performance, and foster a culture of security When software, operating systems, or awareness. By prioritizing these practices, applications are released, they often contain individuals and organizations can vulnerabilities that could be discovered and significantly reduce their risk of malware exploited by malicious actors. Security infections and their associated impacts. patches are updates provided by vendors to address these vulnerabilities, closing the Malware Protection gaps that attackers could use to access or Safe browsing practices are essential for compromise systems. protecting users from cyber threats, such as phishing attacks and malware infections. Malware Protection Malware, short for malicious software, Safe Browsing Practices: refers to any software intentionally designed 1. Use Strong and Unique Password to cause damage to a computer system, 2. Enable Two-Factor Authentication network, or device. It can disrupt normal 3. Be wary of Suspicious Links operations, steal sensitive information, or 4. Look for HTTPS gain unauthorized access to resources. 5. Keep Software Updated 6. Use antivirus software and why educating users on security is 7. Avoid Public Wi-Fi for Sensitive important: Transactions 1. Acceptable Use Policy (AUP): Firewalls and Network Security Defines what employees can and can’t do with company resources. A firewall is a network security device or 2. Password Requirements: Sets rules software that monitors and controls for creating strong passwords, such incoming and outgoing network traffic based as minimum length, complexity on a set of security rules. Acting as a barrier (using numbers and symbols), and between a trusted internal network and regular updates. untrusted external networks (like the 3. Incident Response Protocols: internet), firewalls play a critical role in Having clear steps helps the protecting systems from unauthorized organization respond quickly and access and cyber threats. minimize damage if an issue occurs.
How Firewalls Work Importance of Educating Users
Firewalls enforce predetermined security Educating users on security is key to rules to allow or block traffic based on preventing security incidents. Training various criteria, such as: should include:
● IP addresses (where the traffic is ● Using Strong Passwords: Users
coming from or going to) learn to create secure passwords, ● Ports and protocols (types of making accounts harder to hack. communication being used, like ● Recognizing Phishing: Users learn HTTP or FTP) how to spot fake emails or ● Content filtering (blocking specific messages that try to steal websites or keywords) information. ● Reporting Suspicious Activity: Users Host-based vs Network-based Firewalls know to report anything unusual, helping to catch threats early.
Securing Data with Encryption
Encryption is the process of converting data into a coded format so that only authorized users can access it. This ensures that, even if data is intercepted or accessed by unauthorized people, it remains unreadable and secure. Security Policies and User Education Security policies are essential for setting rules that protect an organization’s data and systems. Here’s how they work in key areas Lecture 6: Storage Management and Implementing Data Storage Strategies Backup Policies ● Tiered Storage: Dividing data into categories based on how often it is MANAGING STORAGE accessed, and placing them in different storage devices Resource Allocation for Storage accordingly. - Resource allocation for storage is the ○ Hot Data: Frequently process of assigning and managing disk accessed and stored on fast, space to ensure optimal performance and expensive storage systems. data availability. Proper resource allocation ○ Cold Data: Infrequently helps maintain system efficiency and accessed, and stored on minimize issues like fragmentation or slower, less expensive storage overuse. systems. ● Data Deduplication: Reducing Types of Storage Resources storage costs by eliminating ● Primary Storage: The immediate, duplicate copies of repeating data, active storage where data is particularly used in backup accessed frequently (e.g., hard environments. drives, SSDs). ● Secondary Storage: Used for BACKUP STRATEGIES long-term storage and data backups Backups are essential for protecting data (e.g., tape drives, cloud storage). from corruption, hardware failure, human error, and other forms of loss. Different Data Retention Policies backup strategies allow businesses to strike A data retention policy defines how long a balance between storage usage, backup data is stored and when it is deleted or speed, and recovery time. archived. These policies are vital for regulatory compliance and efficient storage Full Backup - involves copying all data and management. storing it in a backup file. This type of backup is the most comprehensive, as it Policy Considerations contains all files necessary to restore a ● Regulatory Compliance: Many system to its last known good state. industries have laws regarding data Pros: retention (e.g., healthcare, finance). ● Complete snapshot of all data. ● Business Needs: Balancing the ● Easy and fast recovery from a full need for quick access to recent data backup. with the cost of storing old data. Cons: ● Data Types: Different types of data ● Takes a long time to complete, (e.g., operational data, financial especially for large datasets. records, emails) may have different ● Consumes a lot of storage space. retention requirements. Differential Backup - only copies the data that has changed since the last full backup. It is a compromise between full and Implementing Disaster Recovery Policies incremental backups. Pros: Importance of Disaster Recovery ● Faster than full backups because Disaster recovery (DR) policies ensure that only changed files are backed up. a business can recover its systems, data, ● Easier to manage and restore than and operations after an unexpected event incremental backups. (e.g., system failure, cyber-attack, natural Cons: disaster). A good DR plan minimizes ● As the backup chain lengthens, the downtime and data loss. size of differential backups increases. Key Components of a Disaster Recovery Plan Incremental Backup - only copies the data ● Business Impact Analysis (BIA): that has changed since the last Identify critical systems and data, backup—whether that was a full or and assess the potential impact of a incremental backup. disaster on business operations. Pros: ● Risk Assessment: Evaluate ● Fastest backup process since only potential risks to IT infrastructure, newly modified data is copied. data, and operations. ● Efficient use of storage. ● Recovery Strategies: Define Cons: procedures for recovering systems, ● Restoration is slower, as all previous applications, and data. This includes incremental backups need to be cold site, warm site and host site. applied on top of the last full backup. Data Recovery and Backup Testing Choosing the Right Backup Strategy ● Regular Testing: DR plans should To choose the right backup strategy, be regularly tested through mock consider: recovery drills to ensure they work ● Backup frequency: How often data when needed. changes and how quickly it needs to ● Backup Integrity: Regularly check be backed up. the integrity of backups and ensure ● Storage capacity: The amount of that they are usable for recovery. available storage space for backups. This includes verifying backup ● Recovery time objective (RTO): How completeness, accuracy, and quickly you need to restore data accessibility. after an incident. ● Recovery point objective (RPO): Cloud-Based Disaster Recovery How much data loss is acceptable Cloud-based disaster recovery is becoming between backup points. a popular option because of its cost-effectiveness, scalability, and flexibility. It allows businesses to store backups off-site and access recovery services remotely. ● Disaster Recovery as a Service (DRaaS): Cloud providers offer disaster recovery solutions that allow businesses to replicate their data and systems in the cloud for rapid recovery.
Recovery Time Objectives (RTO) and
Recovery Point Objectives (RPO) ● RTO is the maximum time allowed for recovery after a disaster. It helps define how quickly a system or data should be restored. ● RPO defines the maximum acceptable amount of data loss (measured in time), which informs backup frequency and strategy.
Best Practices for Storage and Backup
Management 1. Automate Backup Processes: Use automated backup software to schedule and execute regular backups. 2. Use Encryption: Encrypt backup data to ensure security and protect sensitive information. 3. Monitor Backup Health: Regularly monitor the status of backups to ensure they are successfully completed and data is safe. 4. Maintain Off-Site Backups: Store backups in a secure off-site location to ensure safety in case of a disaster. 5. Keep Multiple Backup Copies: Use the 3-2-1 backup rule: Three copies of data, on two different media types, with one copy off-site