Ready to Start Your Career?

By: cdoyle
April 22, 2017
Cloud+ Outline - Module 10

By: cdoyle
April 22, 2017

- Something you know
- Something you have
- Something you are
- Allows a shared login to many networks
- Uses SSO to allow users or devices to other network resources
- When 2 companies agree that users can login to 1 network and access info from another server
- Most commonly used with Active Directory
- Groups and/or roles manage the permissions
- Permissions are inherited
- Groups permissions is called implicit permissions
- Users permissions is called explicit permissions
- Permissions are determined by policies (local group policy/GPOs)
- The OS enforces the policies
- The OS or applications do not have power over the permissions
- Permissions are allowed/managed only by the owner of the data
- Resources have an access control list (ACL) (who has access to the resource)
- Symmetric Encryption
- Uses one key that encrypts and decrypts data
- Used to encrypt files
- VPN and Wi-Fi networks can be secured
- PGP
- Uses two keys that encrypts and decrypts data (keys offered by GAL – global access list)
- A public key and a private key
- Keys are stored in an account database or on a smartcard
- Public key is shared
- Private key is saved by the owner of the key
- AES – 256 WiFi
- DES – 56 however 3DES is 56+56+56=168
- RC4 – 128 old WiFi (WEP/WPA, but not WPA2) and Radius
- Network Security
- DMZ
- IDS/IPS Host and Network
- Firewall
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Ping of Death (PoD)
- Ping Flood
- Unnecessary software
- Firmware
- Control account access
- Disable unneeded network ports
- Antivirus software
- Simulates an attack on the network
- Designed to look for vulnerabilities in the network
- Exploits security vulnerabilities
- Finds vulnerabilities and weakness in a network
- Designed to fix vulnerabilities and keep the network secure
- Most important part of any network
- Encryption
- Backups
- Needed to keep the IT staff up-to-date with current technologies
- Allows the IT staff to release software that keep the network safe
- Gives admins the ability to perform job functions and respond to incidents
- Rapid deployment allows admins to release solutions as quick as possible
- Fault Tolerance
- Allows a device to function after a hardware failure
- Hard drives are the most common fault tolerance device
- Geo Clustering connects multiple computers in different geographic locations
- Multipathing gives multiple paths to a device
- Allows redundancy for the system
- Usually used with storage devices
- Load Balancing
- Distributes the workload
- Disaster Recovery Methods
- Mean Time Between Failures (MTBF)
- How long a device will function it fails (i.e. projector)
- Mean Time to Repair (MTTR)
- The typical amount of time it takes to repair a failed component (i.e. few minutes)
- Recovery Time Objective (RTO)
- The time in-between an outage and the restoration (i.e. Exchange)
- Recovery Point Objective (RPO)
- The max time that data can be missed due to an incident
- Cold Site (physical move to another site)
- Hot Site (take nothing, all is in place prior)
- Warm Site (a few items may be required to continue working, minimal downtime)
- Backup is used to copy data in the event of a failure
- Four different backup functions
- Full (on Sunday)
- Used with VM
- Captures the state of a VM (specific VM)
- Is not a replacement for backups
- Has all data and files in the VM
- Used for short term recovery (no more than a month)