Sunday, April 28, 2013

Chapter 14 Ensuring Integrity and Availability


This chapter is all about safeguarding your data and protecting your network. It discusses backup and recovery practices and as well as disaster recovery and contingency plans. It begins with two important concepts Integrity and availability. That is to say integrity refers to the soundness of a network’s programs, data, services, devices, and connections. Availability refers to how consistent and reliably a file or system can be accessed by authorized personnel. 

The text goes into discourse about Malware and the various types and characteristics. It follows-up with malware protection, anti-malware software and polices. If malware is unchecked it will wreak havoc on the system.

Safeguarding against malware is important; however another key component in maintaining the availability and integrity of data is fault tolerance. Fault tolerance is the capacity for a system to continue performing despite an unexpected software or hardware failure. Examples of potential areas that need to be monitored are Environment, Power, and Network design. Maintaining these areas is key in keeping fault tolerance to a minimum.

It is also important to have a backup strategy and storage plan. It could entail optical media, tape backups, external disk backup or network backups. This would be a good time to lay out a disaster recovery plan along with any contingencies. 

Saturday, April 20, 2013

Chapter 13 Troubleshooting Network Problems


The chapter provides a logical and methodical way for troubleshooting network problems. This serves as a basic road map for identifying and resolving network issues. The process begins with identifying the problem and its symptoms. It is then important to determine the problems scope. Which is to say how many users are affected, a work group, a department, or the entire company? This data helps in determining the magnitude of the issue. The following bullet points provide a means to capture this information.  
  •  Gather information
  •  Identify symptoms
  •  Question users
  •  Determine if anything has changed

 After you have identified the scope of the problem it is then time to establish a theory of probable cause. An excellent way to learn more about the problem is to recreate the symptoms. One needs to be very careful in doing this because this could cause havoc for the system.  You must ask the obvious questions at this stage to help determine cause.   

Next you should test the theory to determine cause. It may be something as simple as a plug unplugged or a cable disconnected. The following bullet points provide a path.
  •  If theory confirmed, determine next steps
  •  If theory not confirmed, establish new theory or escalate

 At this juncture after you have analyzed the network and have identified the problem it’s time to establish action plan. In the action plan it should take into consideration what impact it will have on the users and network. After development you would implement the solution or escalate for further development. As part of the process the next step would be verify full functionality and implement preventative measures if applicable. And finally document findings, actions, outcomes.

The last part of the chapter spends time covering troubleshooting tools. It looks at tone generators and tone locator's, multimeters, cable continuity testers, cable performance testers, voltage event recorders. These are only a few.

The chapter had a lot of pictures, diagrams, and flow charts. It was very helpful in understanding the methodology of troubleshooting. 

Saturday, April 13, 2013

Chapter 12 Voice and Video IP


This chapter is all about the variety of methods in which various signals travel for communication purposes. It begins with convergence, the use of multiply terms to refer to the same or similar technologies in common. For instant IP Telephony the use of any network private or public to carry voice signals using TCP/IP protocol. This technology is commonly known as VOIP. (Voice over IP) There are many different clients and network designs with VOIP. One of the benefits of using IP Telephony is it mobility. Analog VOIP needs to connect to an ATA (analog telephone adapter) which digitizes the data in order for transmitting purposes. It is much easier with Digital VOIP it typically connects to a PBX.

Videoconferencing and streaming video opens another avenue of communication. It allows multiply participates to communicate while viewing each other. This type of communicating depends upon the exchange of information between the components of a network system to establish connection.

T
he text provides some really good insight as to how all this different communication processes work. This synopsis only scratches the surface; the chapter goes into much more detail and covers many more topics.

Saturday, April 6, 2013

Chapter 11 - Network Assessment


The threat of an outsider accessing an organization’s network via the internet and then stealing or destroying data is a real possibility today. Before spending any money or time on network security you should examine the network’s security risks. An organization should conduct a posture assessment which is a thorough examination of each aspect of the network to determine how it might be compromised. A security audit asses the security of your network.
Security risks come from all types of vulnerability weaknesses. When these weaknesses are taken advantage of it is known as exploiting. The following areas are of real concern:
  • Risks Associated with People
  • Risks Associated with Transmission and Hardware
  • Risks Associated with Protocols and Software
  • Risks Associated with Internet Access

 In an effort to help mitigate these risks an effective security policy goes a long way. It begins with identifying your security goals, risks, levels of authority, designated security coordinator, and team members’ responsibilities for each team member as well as responsibilities for each employee. It encompasses the following areas:
  •  Security Policy Goals
  • Security Policy Content
  • Response Policy

 The chapter goes into myriad of topics discussing the various types of Physical Security, Security in Network Design, Network Operating System Security, Authentication Protocols, and Wireless Network Security. Each one these areas are delved into with much detail.

I found this chapter to be very helpful in reviewing some previous learned topics. It was presented in an organized and informative manner