The Practice of System and Network Administration Second Edition phần 10

Khi phục vụ các tập tin media, lưu trữ dữ liệu cơ bản và khả năng băng thông mạng trở nên quan trọng hơn. Phương tiện truyền thông máy chủ cung cấp streaming-phương tiện truyền thông hỗ trợ. Thông thường, các phương tiện truyền thông chỉ đơn giản là sử dụng một ứng dụng web trên máy chủ để cung cấp | 906 Chapter 36 Firing System Administrators System File Changes If someone suspects that he may be fired he may create a back door a secret way to get into the system or plant a logic bomb or software that causes damage once he has gone. Ideally you can take a snapshot of all software before the person becomes suspicious and compare it to the running system on a regular basis. However that is time consuming requires a lot of storage and would easily tip off the person that something is about to happen. However no suspicions can be raised if such a thing is always done. Programs that checksum system files and report changes are commonly found. The earliest to achieve popularity is named Tripwire. If this process is an automated system that is used regularly to notice external intruders system failures or other problems it will be much easier to use it without raising suspicion. However care must be taken to make sure that that person being fired doesn t update the database so that his changes aren t noticed. Such a system is an excellent measure to detect any kind of intrusions. However it is time consuming to process all the false-positives. The issue becomes scaling it to too many machines. Conclusion Firing SAs isn t fun or easy but sometimes it has to happen. The basics are very simple. The most important rule is to follow the policies of your HR department. HR personnel are the experts and you are supporting their process. Three tiers of access must be removed physical access remote access and service access. The primary benefit of the three-tier model is that it provides a structured rather than ad hoc approach and is tolerant of mistakes made at any one level. Architectures that seek to minimize the number of access databases and a well-maintained inventory ease the process considerably. In creating a checklist for all the manners of access to be disabled one might begin with the new-hire procedure as a starting point Whatever is done for a new .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
241    3    1    27-05-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.