Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Ensuring Integrity and Availability Identify the characteristics of a network that keeps data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies | Network+ Guide to Networks, Fourth Edition Chapter 13 Ensuring Integrity and Availability Objectives Identify the characteristics of a network that keeps data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies Linux+ Guide to Linux Certification, Second Edition What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices, and connections Availability: how consistently and reliably file or system can be accessed by authorized personnel Need well-planned and well-configured network Data backups, redundant devices, protection from malicious intruders Phenomena compromising integrity and availability: Security breaches, natural disasters, malicious intruders, power flaws, human error Linux+ . | Network+ Guide to Networks, Fourth Edition Chapter 13 Ensuring Integrity and Availability Objectives Identify the characteristics of a network that keeps data safe from loss or damage Protect an enterprise-wide network from viruses Explain network- and system-level fault-tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies Linux+ Guide to Linux Certification, Second Edition What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices, and connections Availability: how consistently and reliably file or system can be accessed by authorized personnel Need well-planned and well-configured network Data backups, redundant devices, protection from malicious intruders Phenomena compromising integrity and availability: Security breaches, natural disasters, malicious intruders, power flaws, human error Linux+ Guide to Linux Certification, Second Edition What Are Integrity and Availability? (continued) General guidelines for protecting network: Allow only network administrators to create or modify NOS and application system files Monitor network for unauthorized access or changes Record authorized system changes in a change management system Install redundant components Perform regular health checks Linux+ Guide to Linux Certification, Second Edition What Are Integrity and Availability? (continued) General guidelines for protecting network (continued): Check system performance, error logs, and system log book regularly Keep backups, boot disks, and emergency repair disks current and available Implement and enforce security and disaster recovery policies Linux+ Guide to Linux Certification, Second Edition Viruses Program that replicates itself with intent to infect more computers Through network connections or exchange of external storage devices Typically copied to storage device .