Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter 2 System Administration - 1 Overview Introduction to system administration Importance of system administration to information security General system administration facilities provided by enterprise software 2 Introduction to system administration Definition System administration A set of functions that provides support services ensures reliable operations promotes efficient use of the system ensures that prescribed service-quality objectives are met System administration functions installation, configuration and maintenance 3 network equipment (switches, routers, DHCP, DNS servers etc) computer systems (database systems, email systems, ERP systems etc) System administrators Definition Person responsible for the day-to-day operation of a technology system First line of defense System administrators secure critical information systems May also be system security officers Person responsible for writing, enforcing and reviewing security operating procedures Some of the most important IT personnel in an organization 4 Keep IT humming Motivation System administration is a foundational skill for an aspiring information security professional Most employers value these skills for entry-level positions Many students find system administration skills valuable Skills development requires Discipline time Hence introduced early Hands-on activities after every chapter designed to refine system administration and technical skills Tempting to skip 5 But persistence strongly encouraged Relation to information security First line of defense for all the three dimensions of information security Confidentiality Integrity Availability Examples Availability Anticipate failures Confidentiality Use appropriate file permissions 6 Prevent the hardware failure from affecting end users Ensure that unauthorized people cannot not read or copy transcripts Common system administration tasks Installation Writing necessary data in the appropriate locations on a computer’s hard drive, for running a software program e.g. Installing operating system Installing application programs System administration challenge Streamline process across thousands of computers in the organization Consumers often believe When in doubt, install Professional system administrators believe 7 When in doubt, do not install Common tasks (contd.) Configuration Selecting one among many possible combinations of features of a system Has information security implications Vulnerabilities can arise due to interactions among components System administrators must comprehend the implications of these interactions Challenge Many software components desired by end users are not maintained by their creators 8 Resulting information security hazards must be controlled Common tasks (contd.) Access control Limiting access to information system resources only to authorized users, programs, processes, or other systems Typically refers to And, establishing what authorized users can do on a system Files or directories a user can read, modify or delete Can also include Limiting access to network ports Application level 9 Limiting rows and/or columns a user can see in a database Available screens in a business application. Common tasks (contd.) User management Defining the rights of organizational members to information in the organization Key component of access control Creating and removing user accounts Updating permissions when users change roles Challenge Managing large numbers of users Commonly organized into groups E.g., all faculty members in the Computer Science department 10 users with similar privileges Members of the CompSci-Faculty group Granted access to mailing list for email discussions. Common tasks (contd.) Monitoring listening and and/or recording the activities of a system to maintain performance and security Required continuously after installation and configuration To ensure desired performance and security Two kinds Reactive monitoring Detecting and analyzing failures after they have occurred Problem notifications Analyzing logs after failures 11 Identify modus-operandi Identify affected systems Proactive testing Common tasks (contd.) Proactive testing Testing a system for specific issues before they occur Vulnerability scanners Access systems and look for potential vulnerabilities. Prioritize and resolve identified vulnerabilities Penetration testing Usually carried out by a professional security firm Actively exploiting vulnerabilities found Recent developments Chaos Monkey Deliberately destroy running systems 12 Assessing the level of access that is gained Promoted by Netflix Common tasks (contd.) Updates Replacing defective software components with components in which the identified defects have been removed Remove vulnerabilities detected during ongoing use and monitoring of software Two categories Operating system updates Fix issues with the low-level components of the system software 13 Developed and released by the operating system vendor All modern operating systems can automatically check for and install required security updates without system administrator intervention Common tasks (contd.) Application updates Fix problems in individual applications Typically involve more effort Many customizations not well documented or tested Ensure functioning of plug-ins from other vendors And in-house additions Impact of an application update on customizations not predictable Manual updates often necessary to deploy application updates Typical update procedure Install update on a development server Test all applications on the development system If successful 14 Deploy update to production systems Common tasks (contd.) Single points of failure A part of a system whose failure will stop the entire system from working is a single point of failure Related to hardware Availability implications Standard solution Redundancy Surplus capability, which is maintained to improve the reliability of a system E.g. spare power supply Cold spares Extra parts used when necessary Hot spares Redundant components already in operation that can replace the failed component 15 Involve down time No downtime Used in all mission critical components System administration utilities Available for all enterprise software Microsoft Windows Systems Center Configuration manager Operations center Monitor installation and configuration of software across enterprise Monitor hardware status across enterprise Unix/ Linux Various utilities 16 Puppet, Oracle Jumpstart Unix family tree Unics BSD OpenBSD 17 NetBSD System III FreeBSD SunOS System V Hp/ UX Mac OSX AIX Solaris XENIX Summary Role of system administration Role of system administrators Common system administration tasks Enterprise utilities 18 Example case: T J Maxx Major corporate information security incident 2007 Hackers had complete access to credit-card databases August 5, 2008 US government charged 11 individuals T. J. Maxx, Barnes and Noble, Office Max and other retailers Wire fraud, damage to computer systems, conspiracy, criminal forfeiture, and other related charges System administration failure 19 No encryption at T J Maxx stores Web application vulnerabilities at other stores T J Maxx sales (around intrusion) 20.5 19.5 Sales ($ bn) 18.5 17.5 16.5 15.5 14.5 2005 2006 2007 2008 Year 20 2009 2010 Design case Email provider selection 21 Hands-on activity Install VirtualBox Download and install the OS image Start the virtual machine 22