Guide to Operating System Security Chapter 11 Security through Disaster

advertisement
Guide to Operating
System Security
Chapter 11
Security through Disaster
Recovery
Objectives




Deploy UPS systems
Create hardware redundancy and apply faulttolerance options
Deploy RAID
Back up data and operating system files
Guide to Operating System Security
2
Uninterruptible Power Supply



Best fault-tolerance method to prevent power
problems from causing data loss and
component damage
Provides immediate battery power to
equipment during unexpected power loss
Protects against lost data and downtime
Guide to Operating System Security
3
Uninterruptible Power Supply
Guide to Operating System Security
4
Selecting and Deploying a UPS
(Continued)

Online (inline)



Powered directly from batteries
More guaranteed protection
Offline (standby)



Switches to batteries when reduction in city power
is detected
Less expensive
Batteries can last longer, but may not switch to
battery in time for full protection
Guide to Operating System Security
5
Selecting and Deploying a UPS
(Continued)




Provides power for limited time period
Usually guards against power surges
Can communicate information to computers it
supports
Requires periodic testing to ensure it is
working
Guide to Operating System Security
6
Configuring a UPS in
Windows 2000/XP/2003

All support serial and USB communications
with a UPS
Guide to Operating System Security
7
Configuring a UPS in
Red Hat Linux



Supported by Red Hat Linux 9.x
Obtain UPS serial or USB communications
software from manufacturer
Use configuration software provided by UPS
manufacturer
Guide to Operating System Security
8
Configuring a UPS in
NetWare 6.x

Communicates through serial port connection
and employment of AIOCOMX and UPS_AIO
NLMs
Guide to Operating System Security
9
UPS_AIO Configuration Options
(Continued)
Option
Description
msgdelay=seconds
Configured in seconds, time to wait until a message
is sent to all users that power is out (default - 5
seconds)
msginterval=seconds
Configured in seconds, interval between multiple
warning messages sent to all users (default - 30
seconds; minimum interval - 20 seconds)
path
Location of UPS_AIO NLM if it is not in the
SYS:SYSTEM directory
downtime=seconds
Configured in seconds, amount of time to wait on
battery power (while main power is out) until
automatically shutting down
port=portnumber
Number of the port to which UPS is attached, such
as serial port 1(port=1)
Guide to Operating System Security
10
UPS_AIO Configuration Options
(Continued)
Option
Description
signal_high
Specifies that signal sent from UPS is a high signaling
value (most UPSs employ a low signal; this option is not
typically used; consult UPS manual)
drivertype=value
Driver loaded to enable UPS communications (AIOCOMX is
1; check documentation for the value associated with a
specialized driver accompanying UPS)
board=value
Value used with a specialized communications board
provided with UPS (consult UPS documentation)
?
Displays brief description of options used with UPS_AIO
NLM (options are not displayed in the graphic—GUI—
mode; press Alt+Esc after entering the command to see
description; press Alt+Esc repeatedly; click forward arrow to
return to graphic mode)
Guide to Operating System Security
11
Configuring a UPS in
Mac OS X

Obtain UPS serial or USB communications
software from manufacturer
Guide to Operating System Security
12
Creating Hardware Redundancy
and Fault Tolerance

Hardware redundancy includes





Using redundant components
Employing multiprocessor systems
Clustering services
Placing servers in different locations
Implementing data warehousing
Guide to Operating System Security
13
Using Redundant Components


Network interface cards (NICs)
Power supplies
Guide to Operating System Security
14
Using Redundant NICs


Designed to match particular network transport
methods, computer bus types, network media
Network connection requirements:




Appropriate connector for network medium
Transceiver
MAC controller
Protocol control firmware
Guide to Operating System Security
15
Considerations When Using
Redundant NICs





Fast speed (up to 100 Mbps for a workstation)
Match network transport method
Support both full-duplex and half-duplex
transmissions
Brand-name, high-quality NICs
Latest driver and protocol control firmware
Guide to Operating System Security
16
Using Redundant Power
Supplies


Can take over if main power supply fails
Consider for the following:




SMTP mail servers
Servers that authenticate users to a network
Web servers
Database servers
Guide to Operating System Security
17
Employing Multiprocessor
Systems

Symmetric multiprocessor (SMP) computers



Two or more computers share the processing load
If one stops working, remaining processors take
over
Make sure you understand the specific
requirements for adding CPUs to your OS
Guide to Operating System Security
18
Clustering Servers


Links multiple computers and their resources
Two models


Shared disk model
Shared nothing model
Guide to Operating System Security
19
Clustering Servers
Guide to Operating System Security
20
Shared Nothing Clustering
Model
Main connection
Backup connection is case of server failure
Main connection
Figure 11-3 Shared nothing clustering model
Guide to Operating System Security
21
Placing Servers in Different
Locations

Microsoft distributed file system (DFS)


Available in Windows 2000 Server/Server 2003
Provides fault tolerance by placing copies of the
same folders on computers in different locations
•

Folders appear to exist in one centralized hierarchy of
folders
Has many advantages
Guide to Operating System Security
22
Implementing Data
Warehousing


Duplicating a main database’s data, typically
on another computer
Often created for queries and reporting and to
provide backup of the main database
Guide to Operating System Security
23
Fault-Tolerance Options



Disk mirroring
Disk duplexing
Redundant array of inexpensive (or
independent) disks (RAID)
Guide to Operating System Security
24
Disk Mirroring
Guide to Operating System Security
25
Disk Duplexing
Guide to Operating System Security
26
Using RAID


Set of standards for lengthening disk life and
preventing data loss
Goal: to spread disk activity equally across all
volumes
Guide to Operating System Security
27
Essential RAID levels






RAID level 0 (striping)
RAID level 1 (mirroring and duplexing)
RAID level 2
RAID level 3
RAID level 4
RAID level 5 (striping combined with error
correction and checksum verification)
Guide to Operating System Security
28
RAID Support in Windows 2000
Server/Server 2003

Support only RAID levels 0, 1, and 5 for disk
fault tolerance


Levels 1 and 5 recommended
Recognize two types of disks


Basic
Dynamic
Guide to Operating System Security
29
RAID Support in Windows 2000
Server/Server 2003 (Continued)

Configuration considerations



Boot and system files can be placed on RAID level
1, but not on RAID level 5
RAID level 1 uses two hard disks; RAID level 5
uses from 3 to 32
RAID level 1 is more expensive to implement than
RAID level 5
Guide to Operating System Security
30
RAID Support in Windows 2000
Server/Server 2003 (Continued)

Configuration considerations



RAID level 5 requires more memory than RAID
level 1
Disk read access is faster than write access in
RAID level 1 and RAID level 5
RAID level 5 has much faster read access than
RAID level 1
Guide to Operating System Security
31
Creating a RAID Volume in
Windows 2000 Server/Server 2003
Guide to Operating System Security
32
RAID Support in
Red Hat Linux 9.x





Supports RAID levels 0, 1, and 5
Configured at installation when using GUI
installation mode
First install all disks and associated hardware
Plan for the number of spare partitions
Choose Disk Druid from Disk Partitioning
Setup screen
Guide to Operating System Security
33
RAID Support in NetWare 6.x



Supports RAID levels 0, 1, and 5
Can manage RAID using Novell Storage
Services (NSS) tools from ConsoleOne
NetWare 6.5 offers iManage, a browser tool
for managing objects
Guide to Operating System Security
34
RAID Support in Mac OS X


Supports RAID levels 0 (striping) and 1
(mirroring)
Apple recommends not placing boot files on
RAID disks
Guide to Operating System Security
35
Software RAID versus
Hardware RAID

Software RAID


Implements fault tolerance through computer’s
operating system
Hardware RAID



Implemented through RAID hardware (eg,
adapter)
Independent of operating system
More expensive than software RAID
Guide to Operating System Security
36
Advantages of Hardware RAID




Faster read and write response
Ability to place boot and system files on
different RAID levels
Ability to “hot swap” a failed disk with one
that works or is new
More setup options to retrieve damaged data
and to combine different RAID levels within
one array of disks
Guide to Operating System Security
37
Backing Up Data



Binary backup
Full file-by-file backup
Partial backups


Differential
Incremental
Guide to Operating System Security
38
Advantages of Local Backups
over Remote Backups




No extra load on network
Enable backups on multiple computer network
Provide more assurance that the Registry is
backed up (Windows 2000/XP/2003)
Attacker using a sniffer cannot intercept
backup traffic over a network
Guide to Operating System Security
39
Tape Rotation


Ensures alternatives in case there is a bad or
worn tape
Tower of Hanoi procedure
Guide to Operating System Security
40
Tape Rotation
Guide to Operating System Security
41
Windows 2000/XP/2003
Backups





Normal
Incremental
Differential
Copy
Daily
Guide to Operating System Security
42
Backup Options
Guide to Operating System Security
43
UNIX and Red Hat Linux
Backup Tools

volcopy (not available in Red Hat Linux)



Sometimes used with labelit utility
Sometimes tar utility is used
dump

Commands used to restore
•
•
•
restore (Red Hat Linux)
ufsrestore
restor
Guide to Operating System Security
44
NetWare 6.x Backup Options


Uses Storage Management System (SMS)
NLMs are loaded at Server Console prior to
starting backup – TSAs designed to read and
back up specific types of data
Guide to Operating System Security
45
Target Service Agents (TSAs)





TSA600 for NetWare 6.x
TSANDS to back up NDS database and
eDirectory
GWTSA for GroupWise information
Windows NT TSA to back up Windows NT,
2000, and XP data
W95TSA to back up Windows 95/98 data
Guide to Operating System Security
46
Starting a backup in Netware 6.0
Guide to Operating System Security
47
Choosing What to Backup in
Netware 6.0
Guide to Operating System Security
48
NetWare 6.x Backup Options
Guide to Operating System Security
49
Mac OS X

Supports use of dump and tar



From the terminal window, or
Obtain a third-party utility that uses these utilities
for backup
Can also use Copy utility on Edit menu
Guide to Operating System Security
50
Summary (Continued)

Using disaster recovery techniques to:




Secure operating systems
Prevent data loss
Reduce downtime
Selecting and deploying a UPS to prevent
power interruptions
Guide to Operating System Security
51
Summary (Continued)


Using redundant hardware components and
implementing RAID for secure data storage
Backing up data and operating system files to
minimize loss in the event of computer failure
Guide to Operating System Security
52
Download