Chapter 2 System Administration - 1. Overview Introduction to system administration Importance of...

22
Chapter 2 System Administration - 1

Transcript of Chapter 2 System Administration - 1. Overview Introduction to system administration Importance of...

Page 1: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

Chapter 2

System Administration - 1

Page 2: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

2

Overview Introduction to system administration

Importance of system administration to information security

General system administration facilities provided by enterprise software

Page 3: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

3

Introduction to system administration Definition

System administration A set of functions that

provides support services ensures reliable operations promotes efficient use of the system ensures that prescribed service-quality objectives are met

System administration functions installation, configuration and maintenance

network equipment (switches, routers, DHCP, DNS servers etc)

computer systems (database systems, email systems, ERP systems etc)

Page 4: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

4

System administrators Definition

Person responsible for the day-to-day operation of a technology system

First line of defense System administrators secure critical information

systems May also be system security officers

Person responsible for writing, enforcing and reviewing security operating procedures

Some of the most important IT personnel in an organization Keep IT humming

Page 5: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

5

Motivation System administration is a foundational skill for an

aspiring information security professional Most employers value these skills for entry-level

positions Many students find system administration skills valuable

Skills development requires Discipline time

Hence introduced early Hands-on activities after every chapter designed to

refine system administration and technical skills Tempting to skip

But persistence strongly encouraged

Page 6: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

6

Relation to information security First line of defense for all the three

dimensions of information security Confidentiality Integrity Availability

Examples Availability

Anticipate failures Prevent the hardware failure from affecting end users

Confidentiality Use appropriate file permissions

Ensure that unauthorized people cannot not read or copy transcripts

Page 7: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

7

Common system administration tasks Installation

Writing necessary data in the appropriate locations on a computer’s hard drive, for running a software program e.g.

Installing operating system Installing application programs

System administration challenge Streamline process across thousands of computers in

the organization

Consumers often believe When in doubt, install

Professional system administrators believe When in doubt, do not install

Page 8: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

8

Common tasks (contd.) Configuration

Selecting one among many possible combinations of features of a system

Has information security implications Vulnerabilities can arise due to interactions among

components System administrators must comprehend the implications of

these interactions

Challenge Many software components desired by end users

are not maintained by their creators Resulting information security hazards must be

controlled

Page 9: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

9

Common tasks (contd.) Access control

Limiting access to information system resources only to authorized users, programs, processes, or other systems And, establishing what authorized users can do on a

system Typically refers to

Files or directories a user can read, modify or delete Can also include

Limiting access to network ports Application level

Limiting rows and/or columns a user can see in a database Available screens in a business application.

Page 10: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

10

Common tasks (contd.) User management

Defining the rights of organizational members to information in the organization

Key component of access control Creating and removing user accounts Updating permissions when users change roles Challenge

Managing large numbers of users Commonly organized into groups

users with similar privileges E.g., all faculty members in the Computer Science

department Members of the CompSci-Faculty group Granted access to mailing list for email discussions.

Page 11: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

11

Common tasks (contd.) Monitoring

listening and and/or recording the activities of a system to maintain performance and security

Required continuously after installation and configuration To ensure desired performance and security

Two kinds Reactive monitoring

Detecting and analyzing failures after they have occurred Problem notifications Analyzing logs after failures

Identify modus-operandi Identify affected systems

Proactive testing

Page 12: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

12

Common tasks (contd.) Proactive testing

Testing a system for specific issues before they occur

Vulnerability scanners Access systems and look for potential vulnerabilities.

Prioritize and resolve identified vulnerabilities

Penetration testing Usually carried out by a professional security firm Actively exploiting vulnerabilities found

Assessing the level of access that is gained

Recent developments Chaos Monkey

Deliberately destroy running systems Promoted by Netflix

Page 13: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

13

Common tasks (contd.) Updates

Replacing defective software components with components in which the identified defects have been removed Remove vulnerabilities detected during ongoing use and

monitoring of software Two categories

Operating system updates Fix issues with the low-level components of the system

software Developed and released by the operating system vendor

All modern operating systems can automatically check for and install required security updates without system administrator intervention

Page 14: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

14

Common tasks (contd.) Application updates

Fix problems in individual applications Typically involve more effort

Ensure functioning of plug-ins from other vendors And in-house additions

Many customizations not well documented or tested Impact of an application update on customizations not

predictable Manual updates often necessary to deploy application updates

Typical update procedure Install update on a development server Test all applications on the development system If successful

Deploy update to production systems

Page 15: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

15

Common tasks (contd.) Single points of failure

A part of a system whose failure will stop the entire system from working is a single point of failure Related to hardware

Availability implications Standard solution

Redundancy Surplus capability, which is maintained to improve the reliability of a

system E.g. spare power supply

Cold spares Extra parts used when necessary

Involve down time

Hot spares Redundant components already in operation that can replace the failed

component No downtime Used in all mission critical components

Page 16: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

16

System administration utilities Available for all enterprise software Microsoft Windows

Systems Center Configuration manager

Monitor installation and configuration of software across enterprise

Operations center Monitor hardware status across enterprise

Unix/ Linux Various utilities

Puppet, Oracle Jumpstart

Page 17: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

17

Unix family tree

Unics

BSD

OpenBSD

NetBSD

FreeBSD

Mac OSX

SunOS

System III

System V

AIX Solaris

XENIX

Hp/ UX

Page 18: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

18

Summary Role of system administration

Role of system administrators

Common system administration tasks

Enterprise utilities

Page 19: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

19

Example case: T J Maxx Major corporate information security incident 2007

Hackers had complete access to credit-card databases T. J. Maxx, Barnes and Noble, Office Max and other

retailers

August 5, 2008 US government charged 11 individuals

Wire fraud, damage to computer systems, conspiracy, criminal forfeiture, and other related charges

System administration failure No encryption at T J Maxx stores Web application vulnerabilities at other stores

Page 20: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

20

T J Maxx sales (around intrusion)

2005 2006 2007 2008 2009 201014.5

15.5

16.5

17.5

18.5

19.5

20.5

Year

Sale

s (

$ b

n)

Page 21: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

21

Design case Email provider selection

Page 22: Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security

22

Hands-on activity Install VirtualBox

Download and install the OS image

Start the virtual machine