Ch02-SystemAdministration
Download
Report
Transcript Ch02-SystemAdministration
Chapter 2
System Administration - 1
Overview
Introduction to system administration
Importance of system administration to information
security
General system administration facilities provided by
enterprise software
2
Introduction to system administration
Definition
System administration
A set of functions that
provides support services
ensures reliable operations
promotes efficient use of the system
ensures that prescribed service-quality objectives are met
System administration functions
installation, configuration and maintenance
3
network equipment (switches, routers, DHCP, DNS servers etc)
computer systems (database systems, email systems, ERP systems etc)
System administrators
Definition
Person responsible for the day-to-day operation of a
technology system
First line of defense
System administrators secure critical information systems
May also be system security officers
Person responsible for writing, enforcing and reviewing security
operating procedures
Some of the most important IT personnel in an
organization
4
Keep IT humming
Motivation
System administration is a foundational skill for an
aspiring information security professional
Most employers value these skills for entry-level positions
Many students find system administration skills valuable
Skills development requires
Discipline
time
Hence introduced early
Hands-on activities after every chapter designed to refine
system administration and technical skills
Tempting to skip
5
But persistence strongly encouraged
Relation to information security
First line of defense for all the three dimensions of
information security
Confidentiality
Integrity
Availability
Examples
Availability
Anticipate failures
Confidentiality
Use appropriate file permissions
6
Prevent the hardware failure from affecting end users
Ensure that unauthorized people cannot not read or copy transcripts
Common system administration tasks
Installation
Writing necessary data in the appropriate locations on a
computer’s hard drive, for running a software program
e.g.
Installing operating system
Installing application programs
System administration challenge
Streamline process across thousands of computers in the organization
Consumers often believe
When in doubt, install
Professional system administrators believe
7
When in doubt, do not install
Common tasks (contd.)
Configuration
Selecting one among many possible combinations of features of
a system
Has information security implications
Vulnerabilities can arise due to interactions among components
System administrators must comprehend the implications of these
interactions
Challenge
Many software components desired by end users are not
maintained by their creators
8
Resulting information security hazards must be controlled
Common tasks (contd.)
Access control
Limiting access to information system resources only to
authorized users, programs, processes, or other systems
Typically refers to
And, establishing what authorized users can do on a system
Files or directories a user can read, modify or delete
Can also include
Limiting access to network ports
Application level
9
Limiting rows and/or columns a user can see in a database
Available screens in a business application.
Common tasks (contd.)
User management
Defining the rights of organizational members to information in
the organization
Key component of access control
Creating and removing user accounts
Updating permissions when users change roles
Challenge
Managing large numbers of users
Commonly organized into groups
E.g., all faculty members in the Computer Science department
10
users with similar privileges
Members of the CompSci-Faculty group
Granted access to mailing list for email discussions.
Common tasks (contd.)
Monitoring
listening and and/or recording the activities of a system to
maintain performance and security
Required continuously after installation and configuration
To ensure desired performance and security
Two kinds
Reactive monitoring
Detecting and analyzing failures after they have occurred
Problem notifications
Analyzing logs after failures
11
Identify modus-operandi
Identify affected systems
Proactive testing
Common tasks (contd.)
Proactive testing
Testing a system for specific issues before they occur
Vulnerability scanners
Access systems and look for potential vulnerabilities.
Prioritize and resolve identified vulnerabilities
Penetration testing
Usually carried out by a professional security firm
Actively exploiting vulnerabilities found
Recent developments
Chaos Monkey
Deliberately destroy running systems
12
Assessing the level of access that is gained
Promoted by Netflix
Common tasks (contd.)
Updates
Replacing defective software components with components in
which the identified defects have been removed
Remove vulnerabilities detected during ongoing use and monitoring of
software
Two categories
Operating system updates
Fix issues with the low-level components of the system software
13
Developed and released by the operating system vendor
All modern operating systems can automatically check for and install
required security updates without system administrator intervention
Common tasks (contd.)
Application updates
Fix problems in individual applications
Typically involve more effort
Many customizations not well documented or tested
Ensure functioning of plug-ins from other vendors
And in-house additions
Impact of an application update on customizations not predictable
Manual updates often necessary to deploy application updates
Typical update procedure
Install update on a development server
Test all applications on the development system
If successful
14
Deploy update to production systems
Common tasks (contd.)
Single points of failure
A part of a system whose failure will stop the entire system from
working is a single point of failure
Related to hardware
Availability implications
Standard solution
Redundancy
Surplus capability, which is maintained to improve the reliability of a system
E.g. spare power supply
Cold spares
Extra parts used when necessary
Hot spares
Redundant components already in operation that can replace the failed
component
15
Involve down time
No downtime
Used in all mission critical components
System administration utilities
Available for all enterprise software
Microsoft Windows
Systems Center
Configuration manager
Operations center
Monitor installation and configuration of software across enterprise
Monitor hardware status across enterprise
Unix/ Linux
Various utilities
16
Puppet, Oracle Jumpstart
Unix family tree
Unics
BSD
OpenBSD
17
NetBSD
System III
FreeBSD
SunOS
System V
Hp/ UX
Mac OSX
AIX
Solaris
XENIX
Summary
Role of system administration
Role of system administrators
Common system administration tasks
Enterprise utilities
18
Example case: T J Maxx
Major corporate information security incident
2007
Hackers had complete access to credit-card databases
August 5, 2008
US government charged 11 individuals
T. J. Maxx, Barnes and Noble, Office Max and other retailers
Wire fraud, damage to computer systems, conspiracy, criminal
forfeiture, and other related charges
System administration failure
19
No encryption at T J Maxx stores
Web application vulnerabilities at other stores
T J Maxx sales (around intrusion)
20.5
19.5
Sales ($ bn)
18.5
17.5
16.5
15.5
14.5
2005
2006
2007
2008
Year
20
2009
2010
Design case
Email provider selection
21
Hands-on activity
Install VirtualBox
Download and install the OS image
Start the virtual machine
22