Bài giảng Network+ Certification - Chapter 16, Network Maintenance

Tài liệu Bài giảng Network+ Certification - Chapter 16, Network Maintenance: Chapter 16, Network Maintenance |1| Chapter Overview A. Backups B. Antivirus Policies C. Patches and Updates Chapter 16, Lesson 1 Backups |2| 1. What Is a Backup? A. Backups are copies of data that you make on a regular basis. 1. If a storage device fails or is damaged and the data stored there is lost, you can restore it from a backup in a timely manner. B. Even if you have other storage technologies in place that provide fault tolerance, such as mirrored disks or a redundant array of independent disks (RAID), you still need a backup solution. C. Networks both complicate and simplify the process of making regular backups. 1. The process is more complicated because you have data stored on multiple devices that must be protected. 2. The process is simpler because you can use the network to access those devices. D. A network backup strategy specifies what data you back up, how often you back it up, and what medium you use to store the ba...

pdf20 trang | Chia sẻ: honghanh66 | Ngày: 19/03/2018 | Lượt xem: 155 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 16, Network Maintenance, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 16, Network Maintenance |1| Chapter Overview A. Backups B. Antivirus Policies C. Patches and Updates Chapter 16, Lesson 1 Backups |2| 1. What Is a Backup? A. Backups are copies of data that you make on a regular basis. 1. If a storage device fails or is damaged and the data stored there is lost, you can restore it from a backup in a timely manner. B. Even if you have other storage technologies in place that provide fault tolerance, such as mirrored disks or a redundant array of independent disks (RAID), you still need a backup solution. C. Networks both complicate and simplify the process of making regular backups. 1. The process is more complicated because you have data stored on multiple devices that must be protected. 2. The process is simpler because you can use the network to access those devices. D. A network backup strategy specifies what data you back up, how often you back it up, and what medium you use to store the backups. E. The backup hardware, software, and administrative policies you will use depend on 1. How much data you have to back up 2. How much time you have to back it up 3. How much protection you want to provide 2. Backup Hardware |3| A. Selecting a backup drive 1. You can use any type of storage device for backups. 2. Try to automate as much of the backup process as possible. 3. Select a device that can store all of your data without frequent media changes. a. You do not need a drive that can hold all of the data stored on all of your network’s computers. b. Be selective about which data you want to back up. (1) Determine how much data needs to be protected before you decide on the capacity of your backup device. 4. Consider the speed at which the drive writes data to the medium. 2 Outline, Chapter 16 Network+ Certification, Second Edition 5. Backup jobs typically run during periods when the network is not otherwise in use so that all of the data on the network is available for backup. a. The amount of time that you have to perform your backups is sometimes called the backup window. 6. The backup device that you choose should depend in part on a. The amount of data you must protect b. The amount of time that you have to back it up c. Examples (1) If you have 10 GB of data to back up and your company closes down from 5:00 P.M. until 9:00 A.M., you have a 16-hour backup window—plenty of time to copy your data, using a medium-speed backup device. (2) If your company operates three shifts and only leaves you one hour, from 7:00 A.M. to 8:00 A.M., to back up 100 GB of data, you must use a much faster device or several devices. |4| 7. Cost is always a factor in selecting a hardware product. a. Faster drives are generally more expensive. b. A low-end backup drive can cost $100 to $200, which is suitable for backing up a home computer where speed is not a major factor. c. When you move up to the drives that have the speed and capacity that make them suitable for network backups, the prices increase exponentially. d. High-end backup drives can have prices that run into five figures. e. When you evaluate backup devices, be aware of the product’s media costs as well. f. Backup devices nearly always use a removable medium, such as a tape or disk cartridge, which you must buy along with the drive. g. At first, some products might seem to be economical because the drive is inexpensive, but in the long run they might not be because the media are so expensive. h. One of the most common methods of evaluating various backup devices is to determine the cost per megabyte of the storage that a device provides. (1) Divide the price of the medium by the number of megabytes it can store, and use this figure to compare the relative cost of various devices. |5| B. Selecting a drive interface 1. Backup devices can use any of the standard computer interfaces: a. IDE b. Universal serial bus (USB) c. SCSI d. Some backup drives connect to the computer’s parallel port, although this type of connection is just a form of SCSI that uses a different port. 2. The most common interface used in high-end network backup solutions is SCSI. Outline, Chapter 16 3 Network+ Certification, Second Edition a. SCSI devices operate more independently than IDE devices. (1) This means that the backup process, which often entails reading from one device while writing to another on the same interface, is more efficient. b. SCSI devices can (1) Maintain a queue of commands that they have received from the host adapter (2) Execute the commands sequentially and independently c. Most SCSI devices are available as internal or external units. 3. When multiple IDE devices share a channel, only one operates at a time. a. Each drive must receive, execute, and complete a command before the other drive can receive its next command. 4. Magnetic tape drives require a consistent stream of data to write to the tape with maximum effectiveness. a. If there are constant interruptions in the data stream, which can happen with the IDE interface, the tape drive must repeatedly stop and start the tape. (1) Reduces the tape drive’s speed and its overall storage capacity b. A SCSI drive can often operate continuously without pausing to wait for the other devices on the channel. 5. SCSI backup devices are always more expensive than a comparable IDE alternative, because a. The drive requires additional electronics b. The SCSI host adapter must be installed in the computer c. External units have their own power supplies, which also adds to the cost |6,7| C. Magnetic tape drives 1. Most common hardware device used to back up data 2. Unlike hard disk, removable disk, and CD-ROM drives, tape drives are not random access devices. a. You cannot simply move the drive heads to a particular file on a backup tape without spooling through all of the files before it. b. The drive unwinds the tape from a spool and pulls it across the heads until it reaches the point in the tape where the data you want is located. c. You cannot mount a tape drive in a computer’s file system, assign it a drive letter, and copy files to it, as you can with a hard disk drive. 3. A special software program is required to address the drive and send the data you select to it for storage. 4. Magnetic tape drives are well suited for backups. a. Advantages (1) Fast (2) Hold a lot of data (3) Media cost per megabyte is low, often less than one-half cent per megabyte 4 Outline, Chapter 16 Network+ Certification, Second Edition b. Tape drives are useless for anything other than backups. 5. There are many different types of magnetic tape drives that differ greatly in speed, capacity, and price. a. At the low end are quarter-inch cartridge (QIC) drives, which can cost as little as $200. (1) A single QIC tape cartridge holds 150 MB to 20 GB. b. At the high end are digital linear tape (DLT) and linear tape-open (LTO) drives, which can cost several thousand dollars and store as much as 100 GB on a single tape. 6. Drive compression a. The capacities of magnetic tape drives are generally specified with two figures, such as 40 GB to 80 GB. (1) These numbers refer to the capacity of a tape without compression and with compression. b. Most tape drives have hardware-based data compression capabilities built into them, but the additional capacity that you achieve when using compression is based on the type of data you are storing. c. The capacity figures assume an average compression ratio of 2:1. d. Some types of files, such as image files using uncompressed BMP or TIF formats, can compress at much higher ratios, as high as 8:1. e. Files that are already compressed, such as GIF or JPG image files or ZIP archives, cannot be compressed further and are stored at a 1:1 compression ratio. |9| D. CD-ROM drives 1. Writable CD-ROM drives, such as compact disc-recordables (CD-Rs) and compact disc rewritables (CD-RWs), can be used as backup devices. 2. Advantages a. The low cost of the media makes CDs an economical solution, even if the disks can be used only once, as is the case with CD-Rs. b. Many computers already have CD-ROM drives installed for other purposes, which eliminates the need to buy a dedicated backup drive. 3. Disadvantages a. By backup device standards, the capacity of a CD is low—about 650 MB. b. For network backups, CD-ROMs are usually inadequate. (1) Most networks need to back up many gigabytes worth of data, which would require many disk changes. (2) Network backup software products usually do not recognize CD-R and CD-RW drives. |10| E. Cartridge drives 1. Removable cartridge drives, such as Iomega’s Zip and Jaz drives, can be used for backups. a. Zip cartridges hold only 100 MB or 250 MB, which makes them less practical than CDs for backups. b. Jaz drives are available in 1-GB and 2-GB versions, which is sufficient for a backup device. Outline, Chapter 16 5 Network+ Certification, Second Edition 2. Cartridge drives mount into a computer’s file system. a. You can assign a drive letter to a cartridge drive and copy files to it, just as you can assign a drive letter and copy files to a hard drive. 3. Disadvantage: the cost of the media is extremely high, making cartridge drives impractical for network backups. a. A 2-GB Jaz cartridge can cost $125 or more, which is more than 6 cents per megabyte—far more than virtually any other storage device. |11,12| F. Autochangers 1. An autochanger is a unit that contains one or more drives and a robotic mechanism that swaps the media in and out of the drives. a. Also called jukeboxes or tape libraries b. Some autochangers are small devices with a single drive and an array that holds four or five tapes. c. Others are enormous devices with as many as four drives and an array of 100 tapes or more. 2. When a backup job fills one tape (or other storage medium), the mechanism extracts it from the drive and inserts another, and the job continues. 3. The autochanger also remembers which tapes are available and can load the appropriate tape to perform a restore job. a. This memory mechanism is commonly called an index. 4. If you buy a large enough autochanger, you can create a long-term backup strategy that allows backups to run completely unattended for weeks at a time. 5. Autochanger prices can be astonishingly high, reaching as much as six figures in some cases. 3. Backup Software A. Backup software products 1. Storage devices used as backup solutions are not treated like the other storage subsystems in a computer. a. A specialized software product is required to package the data that you want to back up and send to the drive. 2. Operating systems frequently include a backup program that you can use with your drive. a. These programs usually provide only basic functionality and lack features that are useful in a network environment. |13| B. Target selection and filtering 1. The most basic function of a backup software program is to let you select what you want to back up, sometimes called the target. 2. A good backup program enables you to select targets by selecting a. Entire computers b. Specific drives on those computers c. Specific directories on the drives d. Specific files in specific directories 6 Outline, Chapter 16 Network+ Certification, Second Edition |14| 3. Most backup programs provide a directory tree display that you can use to select the targets for a backup job. 4. In most cases, it is not necessary to back up all of the data on a computer’s drives. a. If a hard drive is completely erased or destroyed, you have to reinstall the operating system before you can restore files from a backup tape, so it is not worthwhile to back up all of the operating system files each time you run a backup. b. The same is true for applications, since you can reinstall an application from the original distribution media. (1) In this case, you might want to back up only your data files and the configuration settings for that application. c. As they run, most operating systems create temporary files, which you do not need to back up. d. Carefully selecting backup targets can mean the difference between fitting an entire backup job on one tape or staying late after work to insert a second tape into the drive. 5. Individually selecting the files, directories, and drives that you want to back up can be quite tedious, so many backup programs provide other ways to specify targets. a. Filters enable the software to evaluate each file and directory on a drive and decide whether to back it up. b. A good backup program provides a variety of filters that enable you to select targets based on file and directory names, extensions, sizes, dates, and attributes. c. You can use filters to limit your backups to only the files that have changed recently, using either date or attribute filters. d. The most common type of filter used by backup programs is the one for the archive attribute. (1) Enables the software to back up only the files that have changed since the last backup (2) This filter is the basis for incremental and differential backups. |15| C. Full backups 1. A full backup copies the entire contents of a computer’s drives to tape or another medium. a. You can perform a full backup every day, but this practice can be wasteful, both in terms of time and tape. b. When you perform a full backup every day, most of the files you are writing to the tape are exactly the same as they were the previous day. c. The only files that change on a regular basis are (1) Data files (2) The files that store configuration data (3) Special resources such as the Windows Registry and directory service databases Outline, Chapter 16 7 Network+ Certification, Second Edition d. To save tape and shorten the backup time, many network administrators perform full backups only once a week, or even less often. D. Incremental and differential backups 1. Between full backups, administrators perform special types of filtered jobs, called incremental and differential backups, that back up only the files that have recently been modified. a. An incremental backup is a job that backs up only the files changed since the last backup job of any kind. b. A differential backup is a job that backs up only the files that have changed since the last full backup. |16| 2. The backup software filters the files for backups by using a special file attribute called the archive bit, which is on every file on the computer. a. File attributes are 1-bit flags, stored with each file on a drive, that perform various functions. b. The archive bit for a file is activated by any application that modifies that file. c. When the backup program scans the target drive during an incremental or differential job, it selects for backup only the files with active archive bits. 3. During a full backup, the software backs up the entire contents of a computer’s drives, and also resets (that is, removes) the archive bit on all of the files. a. Immediately after the job is completed, you have a complete copy of the drives on tape, and none of the files on the target drive have an active archive bit. 4. As work on the computer proceeds after the backup job is completed, files are modified, and the archive bits for the modified files are activated. 5. The next day, you can run an incremental or differential backup job, which filters out all files that do not have an active archive bit. a. All of the program files that make up the operating system and the applications are skipped, along with all data files that have not changed. b. Compared to a full backup, an incremental or differential backup job is usually much smaller, so it takes less time and less tape. 6. The difference between an incremental and a differential job lies in the behavior of the backup software when it either resets or does not reset the archive bits of the files it copies to tape. |17| 7. Incremental jobs a. Incremental jobs reset the archive bits on the files they back up. b. When you run an incremental job, you back up only the files that have changed since the last backup, whether it was a full backup or an incremental backup. (1) Advantage: uses the least amount of tape (2) Disadvantage: lengthens the restore process 8 Outline, Chapter 16 Network+ Certification, Second Edition c. If you restore an entire computer, you must first perform a restore from the last full backup tape, and then restore each incremental job performed since the last full backup. (1) For example, suppose that you run a full backup job on a computer every Monday evening and incremental jobs every evening from Tuesday through Friday. If the computer’s hard drive fails on a Friday morning, you must restore the previous Monday’s full backup, and then restore the incremental jobs from Tuesday, Wednesday, and Thursday, in that order. d. The order of the restore jobs is essential if you want the computer to have the latest version of every file. |18| 8. Differential jobs a. Differential jobs do not reset the archive bit on the files they back up. b. Every differential job backs up all of the files that have changed since the last full backup. (1) For example, if you perform a full backup on Monday evening, Tuesday evening’s differential job will back up all files changed on Tuesday; Wednesday evening’s differential job will back up all files changed on Tuesday and Wednesday; and Thursday evening’s differential backup will back up all files changed on Tuesday, Wednesday, and Thursday. c. Advantage: differential backups simplify the restore process. (1) To completely restore the computer that failed on a Friday morning, you only have to restore Monday’s full backup tape and the most recent differential backup, which was performed Thursday evening. (2) Because the Thursday tape includes all of the files modified on Tuesday, Wednesday, and Thursday, no other tapes are needed. (3) The archive bits for these changed files are not reset until the next full backup job is performed. d. Disadvantage: differential backups use more tape, because some of the same files are backed up each day. 9. Running incremental or differential jobs often allows you to automate your backup regimen without spending too much on hardware. a. For example, if your full backup job totals 50 GB, a 20-GB drive might be adequate. (1) You must manually insert two additional tapes during your full backup jobs once a week, but you should be able to run incremental or differential jobs the rest of the week using only one tape. (2) Allows the jobs to run unattended E. Drive manipulation 1. When you have selected what you want to back up, the next step is to specify where to send the selected data. 2. The backup software typically lets you Outline, Chapter 16 9 Network+ Certification, Second Edition a. Select a backup device (if you have more than one) b. Prepare to run the job by configuring the drive and the storage medium 3. For backup to a tape drive, the configuration process can include any of the following tasks: a. Formatting a tape b. Supplying a name for the tape you are creating c. Specifying whether you want to append the backed-up files to the tape or overwrite the tape d. Turning on the drive’s compression feature |19| F. Scheduling 1. All backup products let you create a backup job and execute it immediately, but the key to automating a backup routine is being able to schedule jobs to execute unattended. a. Scheduled jobs can run when the office is closed and the network is idle, so that (1) All resources are available for backup (2) User productivity is not compromised by a sudden surge of network traffic b. Not all of the backup programs supplied with operating systems or designed for stand-alone computers will support scheduling, but all network backup software products do. 2. Backup programs use various methods to automatically execute backup jobs. a. The Windows 2000 Backup program uses the operating system’s Task Scheduler application. b. Other programs supply their own program or service that runs continuously and triggers the jobs at the appropriate times. c. Some of the higher-end network backup products can use a directory service, such as the Microsoft Active Directory service or Novell Directory Services (NDS). (1) These programs modify the directory schema (the code that specifies the types of objects that can exist in the directory) to create an object representing a queue of jobs waiting to be executed. 3. You specify whether you want to execute the job once or repeatedly at a specified time each day, week, or month, using an interface such as the Windows 2000 Backup program’s Schedule Job dialog box. 4. After creating a logical sequence of backup jobs that execute by themselves at regular intervals, you only need to change the tape in the drive each day. a. If you have an autochanger, you can eliminate this part of the job and create a backup job sequence that can run unattended for weeks or months. |21| G. Logging and cataloging 10 Outline, Chapter 16 Network+ Certification, Second Edition 1. When a backup job runs, the software accesses the specified targets and feeds the data to the backup drive in the appropriate manner. a. It is important for the data to arrive at the storage device in a consistent manner and at the proper rate of speed. 2. Most backup software products can maintain a log of the backup process as it occurs. a. You can often specify a level of detail for the log, such as whether it should contain a complete list of every file backed up or just record the major events that occur during the job. b. Periodically checking the log is an essential part of administering a network backup program. c. The log tells you (1) When selected files are skipped for any reason (2) When errors occur on either the backup drive or one of the computers involved in the backup process d. Some software products can generate alerts when errors occur, notifying you by sending a status message to a network management console, by sending you an e-mail message, or by other methods. 3. Backup software programs also catalog the files they back up, which facilitates the process of restoring files later. a. The catalog is a list of every file that the software has backed up during each job. b. To restore files from the backup medium, you browse through the catalog and select the files, directories, or drives that you want to restore. 4. Different backup software products store the catalog in different ways. a. For example, the Windows 2000 Backup program stores the catalog for each tape on the tape itself. (1) Disadvantage: you have to insert a tape into the drive to read the catalog and browse the files on that tape. b. More elaborate network backup software programs maintain a database of the catalogs for all of the backup tapes on the computer where the backup device is installed. (1) This database lets you browse through the catalogs for all of your tapes and select any version of any file or directory for restoration. c. In some cases, you can view the contents of the database in several different ways, such as (1) By the computer, drive, and directory where the files were originally located (2) By the backup job (3) By the tape or other media name d. The database feature can use a lot of the computer’s disk space and processor cycles, but it greatly enhances the usability of the software, particularly in a network environment. |22| H. Media rotation Outline, Chapter 16 11 Network+ Certification, Second Edition 1. Using new tapes for every backup job and storing them all permanently can become extremely expensive. a. It is more common to reuse backup tapes. b. To reuse tapes properly, you must carefully plan your media rotation scheme, so that you do not inadvertently reuse a tape you will need later. 2. One of the most common media rotation schemes is called Grandfather- Father-Son, which refers to backup jobs that run monthly, weekly, and daily. a. The Grandfather-Father-Son scheme requires you to maintain (1) One set of tapes for your daily jobs, which you reuse every week (2) A set of weekly tapes, which you reuse every month (3) A set of monthly tapes, which you reuse every year 3. There are other schemes that vary in complexity and utility, depending on the software product. 4. When the software program implements the rotation scheme, it a. Provides a basic schedule for the jobs b. Tells you what name to write on each tape as you use it c. Tells you which tape to insert for each job 5. You maintain a perpetual record of your data while using the minimum number of tapes without fear of overwriting a tape you need. |23| I. Restoring 1. Restoring data from your backups is the sole reason for making them in the first place. 2. You must perform periodic test restores from your backup tapes or other media to ensure that you can recover any lost data. a. Even if all your jobs are completed successfully and your log files show that all of your data has been backed up, there is no better test of a backup system than an actual restore. 3. Although making regular backups protects you from losing an entire hard drive, most of the jobs you perform will be restoring only one or a few files that a user has deleted. a. If a user needs to have one file restored and you have to insert tape after tape into the drive to locate it, everyone’s time is wasted. b. A backup program with a database that lets you search for a specific file makes your job much easier and lets you restore any file in minutes. |24| 4. Restore jobs are similar to backup jobs, in that you typically select the files or directories that you want to restore. a. You specify whether you want to restore the files to their original locations or to another location. b. If you restore the files to a different location, you can usually configure the software to place all of the restored files into one directory or re-create the directory structure that the files were backed up from. 12 Outline, Chapter 16 Network+ Certification, Second Edition J. Disaster recovery 1. Backup software products, like any applications, must run on an operating system. 2. If the drive in the computer hosting the backup drive fails, you first might need to reinstall the entire operating system and the backup software product before you can restore the complete backup of the computer. a. Can be time-consuming 3. Many backup software products provide a disaster recovery feature that lets you create a boot disk that loads just enough of the operating system and the backup application to perform a restore. a. A restore from a full backup will then provide all of the software needed to restart the computer in the normal manner. |25| K. Network backup functions 1. Choose a backup software product that is designed for network use. 2. A network backup software product differs from an application designed for stand-alone systems in that the network product can back up other computers on the network. a. This means you can use one backup drive to protect your entire network. b. Many stand-alone backup products can access drives on networked computers that you have mapped to a drive letter, but a fully functional network backup product can also back up important operating system features on other computers, such as the Windows Registry and directory service databases. c. You might have to install a software component on the target computer and on the computer where the backup drive is located. 3. Network backup products often have optional add-on components that allow you to perform specialized backup tasks, such as backing up live databases or computers running other operating systems. a. If you have database or e-mail servers that run around the clock, you might not be able to fully back them up using a standard software product because the database files are locked open. b. To back up a database of this type, you must do one of the following: (1) Close it by shutting it down. (2) Use a specialized piece of software that creates temporary database files (called delta files) that the server can use while the database itself is closed for the duration of the backup process. Chapter 16, Lesson 2 Antivirus Policies |26| 1. What Is a Virus? A. A software routine that is deliberately designed to attach itself to another piece of software on a computer, perform some Outline, Chapter 16 13 Network+ Certification, Second Edition preprogrammed activity, and spread to the other computers on a network 1. The worst types of viruses are engineered to irretrievably destroy all or part of the data stored on the computer by wiping out hard drives. 2. Potentially damaging programs such as viruses, Trojan horses, and worms can find their way onto a network through file downloads, e- mails, or removable disks. 3. However, there are many viruses with effects that are not so catastrophic. (a) Some viruses can cause intermittent problems on the computer, such as system lockups or specific feature failures, whereas others do nothing but display a message programmed by its author. B. There are many antivirus software products intended for stand-alone systems, but network administrators often use products that centralize the virus-scanning process so that every file transmitted over the network is checked. 1. Antivirus software products must be continually updated to cope with the constantly evolving techniques used by the creators of viruses. C. Like biological viruses, computer viruses are designed to replicate themselves by infecting other pieces of software. 1. A virus on an infected removable disk can migrate to the computer’s hard drive and infect the code on the hard drive. 2. In some cases, viruses are designed to remain dormant until the computer’s clock registers a particular date and time. |27| D. When a virus-infected computer is connected to a network, you have the functional equivalent of one sick child sharing a room with a group of healthy children. When one gets sick, the others are likely to get sick also. 1. Files transferred from the infected computer to the other systems on the network can spread the infection. 2. Depending on the design of the virus, the effect can range from a nuisance to a catastrophe. 3. Once the network is infected, it can be very difficult to completely remove the virus. 4. If you miss one infected file on one computer, the virus can reassert itself and start spreading all over again. E. Viruses can attach themselves to various parts of a computer’s software, and they are often classified by the area of the disk they reside in. |28| F. Virus types 1. Boot sector viruses a. Can come from a removable disk or an executable file b. Infect your computer by inhabiting the master boot record (MBR) of your hard drive 14 Outline, Chapter 16 Network+ Certification, Second Edition (1) Because the MBR executes whenever you start the computer, the virus is always loaded into memory and is therefore very dangerous. c. To remove a boot sector virus, you must either delete and re-create the MBR (which causes the data on the disk to be lost) or use an antivirus program. (1) By contrast, you can remove other types of viruses that infect files by deleting the infected file. 2. Executable file viruses a. Attach themselves to .exe or .com files or, less often, to other types of application modules, such as .dll and .bin files b. Load into memory when you run the infected program, and then can spread to other software that you execute c. You can receive executable file viruses in e-mail attachments and downloads, but they can infect your computer only if you run the infected program. 3. Polymorphic viruses a. Can reside in both the MBR and executable files b. Are designed to change their signatures periodically to fool virus- scanning routines that search for the code associated with particular viruses c. Modify themselves and use encryption to hide most of their code d. Are a direct result of the ongoing competition between the people who design viruses and those who design the tools to protect against them 4. Stealth viruses a. Many virus-scanning products function by detecting changes in the sizes of files stored on a computer’s hard drive. (1) Normal viruses add code to executable files, so the files grow in size by a small amount. (2) This is why installing an updated version of an application can sometimes trigger false positive results from a virus scanner. b. Stealth viruses attach themselves to executable files in the normal way, but they disguise their appearance by subtracting the same number of bytes from the infected file’s directory entry that their code added to the file. (1) The file appears not to have changed in size, even though virus code has been added to it. 5. Macro viruses a. A recent innovation that can infect data files b. In the past, viruses infected executable files only, but now data file viruses attach themselves to documents and spread themselves using the application’s macro capability. (1) Microsoft Word documents in particular were the original targets for this type of virus. (2) When a user opens an infected document file, the macro code executes, enabling the virus to enter into memory and spread Outline, Chapter 16 15 Network+ Certification, Second Edition to the template file (NORMAL.DOT) that Word uses for all open documents. (3) Once in the template file, the virus is read into memory whenever the application is launched, and it spreads to all of the documents the user loads afterward. c. Macro viruses do not usually cause severe damage, but because many businesses frequently exchange document files using e-mail and other methods, they spread very rapidly and are difficult to eradicate. d. Applications with macro capabilities now usually have a switch that lets you disable any macro code found in a document. (1) If you do not use macros, you can protect yourself from virus infections by using this feature. 6. Worms a. Not really a virus (1) Although worms are programs that can replicate themselves, they do not infect other files. b. Worms are separate programs that can insinuate themselves into a computer in various ways. (1) Example: inserting an entry in the Run Registry key that causes the worms to execute whenever the computer starts c. Once in memory, worms can create copies of themselves on the same computer or replicate to other computers over a network connection. 7. Trojan horses a. Not a virus, because they do not replicate or infect other files b. Masquerade as innocuous programs, so the user does not suspect that they are running c. Once loaded into memory, Trojan horses can perform any number of tasks that can be dangerous to the computer or to the network. (1) Some Trojan horses are essentially remote control server programs that open up a “back door” into the computer where they are running. (2) A user elsewhere on the network or on the Internet can run the client half of the program and access the remote computer through the back door. (3) Other types of Trojan horses can gather information on the remote system, such as passwords or data files, and transmit it to a host program running on another computer. |29| 2. Preventing Virus Infections A. To protect your network against virus infections, you should implement policies that prescribe both the behavior of your users and the configuration of their computers. 1. All users should be wary of removable disks from outside sources, and particularly of files attached to e-mail messages. a. One of the most common techniques for disseminating viruses is code that causes the victim’s computer to send an e-mail message with an infected attachment to all of the people in the user’s address book. 16 Outline, Chapter 16 Network+ Certification, Second Edition (1) Because the recipients recognize the name of the sender, they often open the e-mail and launch the attachment without thinking, thus infecting their own computers and beginning the same e-mail generation process. 2. Antivirus software products can protect individual computers from infection by viruses and other malicious programs. a. A typical antivirus program consists of a scanner that examines the computer’s MBR when the computer starts and checks each file as the computer accesses it. b. A full-featured program also checks e-mail attachments and Internet downloads by intercepting the files as they arrive from the e-mail or Internet server and by scanning them for viruses before passing them to the client application. 3. A virus scanner works by examining files and searching for specific code signatures that are peculiar to certain viruses. a. The scanner has a library of virus definitions that it uses to identify viruses. b. To keep your computers fully protected, you must update the virus signatures for your program on a regular basis. c. Some antivirus programs have a feature that automatically connects to the Internet and downloads the latest signatures when they become available. d. The product you select should update its virus signatures at least once a month. e. Check the software manufacturer’s policies for virus signature updates. (1) Some products include perpetual updates in the price of the software, but others include updates for a limited time before you must purchase a subscription. 4. All network computers, both servers and workstations, should run an antivirus program to protect the entire network. 5. Antivirus programs designed for use on networks do not provide greater protection against viruses, but they simplify the process of implementing the protection. a. The centralized management and monitoring capabilities in network- enabled antivirus products typically allow you to create policies for the computers on the network that force them to run the virus- scanning mechanisms you specify. b. Network antivirus products also simplify the process of deploying virus signature updates to all of the computers on the network. Chapter 16, Lesson 3 Patches and Updates 1. Introduction A. Another important part of the network administrator’s job is to keep the software running on the network computers up to date. Outline, Chapter 16 17 Network+ Certification, Second Edition B. All manufacturers of operating systems and applications periodically release patches or updates that correct problems with the software, enhance or modify existing features, or add new capabilities. 1. In most cases, the process of updating a computer involves downloading an update program from the manufacturer’s Web site and running it on the computer. C. Keeping your network software updated is not simply a matter of blindly downloading and installing every patch you can find. 1. The process includes researching the various updates that the manufacturers release, determining if they apply to your environment, and, in some cases, testing them before deployment. |30| 2. Major Updates A. Even a computer with a relatively simple configuration can have many different software components that are regularly updated. 1. The operating system is the chief element you should keep up to date, but you should also update applications and device drivers periodically. B. Years ago, manufacturers of operating systems would release many different software patches, each addressing a specific issue. 1. This caused problems for both users and developers because a. Users sometimes had to download and apply a dozen or more patches to keep their software current b. It was difficult for developers to know exactly how a particular installation was configured 2. If there are 10 patches available for a particular operating system version, people trying to support the product will have a difficult time keeping up with whether all of the patches have been applied and in what order. C. Now, operating system manufacturers release groups of updates in a single package. 1. This practice was pioneered by Microsoft with its Service Pack releases for Microsoft Windows NT. 2. Each Service Pack release for a product contains a collection of patches and updates, all of which are applied by one installation program. 3. Because the various patches have all been tested together, the operating system environment is consistent. 4. Now all Microsoft products are updated using Service Packs, and most other operating system and application manufacturers have followed suit (although they might use different names for their releases). a. When Microsoft releases multiple Service Packs for a product, each subsequent release is cumulative, meaning that it contains all of the updates from the previous Service Packs. b. This way, a user does not have to apply multiple Service Packs to bring a newly installed computer up to date. 5. Service Pack releases can be extremely large. a. Windows NT 4.0 Service Packs are now more than 30 MB, and the full version of Windows 2000 Service Pack 2 is over 100 MB. 18 Outline, Chapter 16 Network+ Certification, Second Edition b. Microsoft also makes Service Packs available on CD-ROM for a nominal fee. c. Downloadable versions of Microsoft’s Service Packs are a single compressed executable file that contains a large number of operating system components. 6. To install the Service Pack, you run the file, and then the program expands the components and installs them in the proper locations. a. The CD-ROM version of a Service Pack is the now-typical self- starting CD-ROM with a menu of options, one of which is installing the update. b. To deploy a Service Pack on a network, you might need to travel to every computer to install the Service Pack. c. You might be able to e-mail the Service Pack file to your users with instructions on how to install it. d. There are also network management software products that can automate the process of installing Service Packs and other updates on all of the computers on the network. D. It is a good idea to check an operating system update before you install it, either by running it yourself in a lab environment or by monitoring Web sites and trade publications for news on problems with the latest release. 1. You should also familiarize yourself with the release notes for the update, which list all of the specific changes that have been made to the operating system. |31| 3. Patches A. Between the releases of Service Packs or other major software updates, manufacturers may also make individual patches available. B. A patch is usually a small fix that is designed to address a highly specific problem. C. Be sure to carefully read about any patches that become available to determine whether you need to install them. 1. In some cases, manufacturers recommend that you install a patch only under certain conditions, such as when you are using a particular combination of components or when you are experiencing a specific error. a. If your environment does not qualify, do not assume that you should install the patch anyway, just to keep your software current. D. Read all of the documentation accompanying the release and carefully follow the manufacturer’s instructions. 4. Driver Updates A. Device drivers are regularly updated. B. When you deploy driver updates, you should be even more careful than you are when you deploy operating system updates. Outline, Chapter 16 19 Network+ Certification, Second Edition 1. If your hardware devices are functioning properly, there is probably no reason to update their device drivers with every new release that comes out. 2. Many network administrators are overzealous in this respect and start to assume that the latest release is automatically the greatest. a. This is often not the case. 3. Unless you have a specific reason for applying a device driver update (for example, if you are experiencing the specific problem the update is documented to address), you are generally better off leaving your installations alone. |32| 5. Software Upgrades A. In addition to patches and updates, software manufacturers typically release periodic upgrades. 1. An update is usually a relatively minor release that addresses specific issues or provides modest enhancements. 2. An upgrade is a major release that provides new features and capabilities. 3. In most cases, patches and updates are free, but you must buy an upgrade. B. Deciding whether to upgrade your software can be difficult. 1. In a network environment, a major software upgrade, whether of an operating system or an application, can be a complex and expensive undertaking. 2. In addition to buying the software itself, you might need to do any or all of the following: a. Upgrade the hardware in your computers (by adding memory, for example). b. Pay people to install the new software on all of the computers. c. Retrain your users to bring them up to speed on the new version. 3. The cumulative cost of the upgrade process can be enormous. 4. If you do not need new features, it might not be worth upgrading. a. However, it is also important to make sure that your software is not too out of date. b. If you stay with an older version of a software product because it does everything you want it to and because all of your users are familiar with it, you might eventually get to the point where (1) The manufacturer no longer supports the product (2) The cost of upgrading is much higher than it would have been earlier |33| Chapter Summary A. Backups 1. Magnetic tape is the most popular storage medium for backups because it is fast, inexpensive, and holds a lot of data. 20 Outline, Chapter 16 Network+ Certification, Second Edition 2. Backup software enables you to select the data you want to back up and sends it to the tape drive or other device you use for your backups. 3. There are three types of backups: full backups, incremental backups, and differential backups. a. Full backups copy all of the data on a computer. b. Incremental backups copy only the files that have changed since the last backup of any kind. c. Differential backups copy only the files that have changed since the last full backup. 4. A good backup software program allows you to schedule jobs to execute at any time. 5. Network backup software enables you to back up data from computers anywhere on the network and might also provide optional features such as live database backups. |34| B. Antivirus policies 1. Viruses are dangerous programs that can damage the data on a computer and spread to the other computers on a network. 2. To protect your network against viruses, you must run antivirus software on every computer. C. Patches and updates 1. Obtaining, evaluating, and deploying software patches and updates is an important part of the network administrator’s job. 2. Software upgrades are major undertakings that can be extremely expensive and time-consuming.

Các file đính kèm theo tài liệu này:

  • pdfch16_6522.pdf
Tài liệu liên quan