CH-1 Introduction to System Administration(Updated).pptx

Full Transcript

System and Network Administration CHAPTER-1 Introduction to system Administration [email protected] Ambo University, Department of Information Technology Outline  Introduction to System Administration  System Administration functions ...

System and Network Administration CHAPTER-1 Introduction to system Administration [email protected] Ambo University, Department of Information Technology Outline  Introduction to System Administration  System Administration functions  Specializations of System administration  Why is system administration important?  Ethics for System Administrators 2 Introduction to System Administration System Administration is a set of functions that:  Provides support services  Ensures reliable operation  Promotes efficient use of the system  Ensures that prescribed service quality objectives are met 3 Cont’d  Systems administration includes:  Computer systems and the ways people use them in an organization:  knowledge of operating systems and applications  knowledge of hardware and software troubleshooting  knowledge of the purposes for which people in the organization use the computers 4 Cont’d A person specialized in maintaining and operating a computer system is known as System administrator (sysadmin).  The most important skill to a system administrator is problem solving frequently under various sorts of constraints and stress. 5 System Administration functions  Installation  Configuration  Access control  User management  Support  Monitoring 6 Cont’d  Updating  Maintenance of network equipment  Switches, routers, DHCP servers, DNS servers  Maintenance of computer systems  Databases, email servers, ERP(Enterprise resource planning) systems 7 Cont’d  Installation  Writing necessary data in the appropriate locations on a computer’s hard drive for running a software program.  e.g. Installing operating system, application programs  Challenges: streamline process across thousands of computers.  When to install? For who? What to install? 8 Cont’d  Configuration  After installing the software it must be configured for the business needs.  Selecting one among many possible combinations of features of a system. 9 Cont’d Access control  Limiting access to resources like programs, processes, or other systems and establishing what authorized users can do on a system.  Limiting access to files or directories a user can read, modify or delete.  Limiting access to network ports  Challenge: who to give access? To what? 10 Cont’d  User Management  Defining the rights of organizational members to Resources in the organization.  Includes:  Creating and removing user accounts  Setting and Updating permissions for users.  The challenge is managing large numbers of users  Done by Active Directory  AD rule in the domain is implemented by Domain controller 11 Cont’d  Monitoring  Listening and/or recording the activities of a system to maintain performance and security.  Two types of monitoring:  Reactive:-detecting and analyzing failures after they have occurred. 12 Cont’d  Reactive monitoring can be done by:  Analyzing logs after failures(identifying affected systems)  Problem notifications  Proactive:-testing a system for specific issues before the failure occurs. Vulnerability scanners Penetration testing 13 Cont’d  Updating  Replacing defective software components with new or up to date component.  Remove vulnerabilities detected during ongoing use and monitoring of the software.  Two categories of Updating:  Operating system updates:  Fixissues with the low level components of the system software developed and released by the operating system vendor.  Application updates:  fix problems in individual application software. 14 Cont’d  Summary of system admin duties:  User account management  Accounting and restrictions  User IDs  Home directories (quotas, drive capacities)  Mail  Default startup files (paths)  Permissions, group memberships,  Communicating policies and procedures  Disabling / removing user accounts 15 Cont’d  Hardware management  Capacity planning  Adding and removing hardware  Hardware evaluation and purchase  Inventory  Cabling, wiring, DIP switches, etc.  Device driver installation  System configuration and settings  User notification and documentation 16 Cont’d  Perform file system backups, restores  Install and configure new software and services  Keep systems and services operating  Monitor system and network  Troubleshoot problems  Maintain documentation 17 Cont’d  Audit security  System logging and audit facilities  Evaluation and implementation  Monitoring and analysis  Traps, auditing and monitoring programs  Unexpected or unauthorized use detection  Monitoring of security advisories Security holes and weaknesses Live exploits  Help users, performance tuning, and more! 18 Cont’d  System Administration Challenges  System administration needs:  Broad knowledge of hardware and software  To balance conflicting requirements  Short-term vs. long-term needs  End-user vs. organizational requirements  Service provider vs. police model 19 Cont’d  To work well and efficiently under pressure  Availability  Flexibility, tolerance, and patience  Good communication skills  People think of sysadmins only when things don't work! 20 Specializations of System administration  Database Administration  Maintaining a database system, and insuring the integrity of the data and the efficiency and performance of the system. A person who is responsible for the environmental aspects of a database is called a database administrator (DBA). 21 Cont’d  Basic Duties of DBA:  Installation of new database related software  Configuration of hardware and software with the system administrator  Security administration  Data analysis  Database design and data modeling and optimization  Disaster recovery (backups and testing of backups) 22 Cont’d  Network administration  A network administrator maintains network infrastructure  such as switches and routers, and  diagnoses problems with these or with the behavior of network-attached computers.  A person who is involved in computer network and that carry out network administration is known as network administrator (or network specialist or network analyst). 23 Cont’d  Network administration normally includes  Deployment  Configuration  Maintenance and  Monitoring of active network gear: switches, routers, firewalls, etc. 24 Cont’d  Network Administration also includes activities such as:  Network address assignment  Assignment of routing protocols and routing table configuration  Configuration of authentication and authorization  maintenance of network facilities in individual machines  drivers and settings of personal computers as well as printers 25 Cont’d  Maintenance of certain network servers:  file servers, VPN gateways, intrusion detection systems  Security Administration  Security administration needs a person who is specialist in computer and network security including  the administration of security devices such as firewalls, as well as consulting on general security measures. 26 Importance of system administration The goal of system administration:  Reduce the customer’s total cost of owning a computer and keeping it working.  Most of this cost is people’s time rather than purchased hardware or software. 27 Ethics for System Administrators  Professionalism  Maintaining professional conduct in the workplace and will not allow personal feelings or beliefs that cause to treat people unfairly or unprofessionally.  Personal Integrity  Be honest in professional dealings and forthcoming about your competence and the impact of your mistakes.  Avoidconflicts of interest and biases whenever possible 28 Cont’d  Privacy  Access private information on computer systems only when it is necessary in the course of your technical duties.  Maintain and protect the confidentiality of any information to which you may have access.  Laws and Policies  Educate yourself and others on relevant laws, regulations, and policies regarding the performance of your duties. 29 Cont’d  Communication  Communicate with management, users, and colleagues about computer matters of mutual interest.  Strive to listen to and understand the needs of all parties.  System Integrity  Strive to ensure the necessary integrity, reliability, and availability of the systems for which you are responsible.  Design and maintain each system in a manner to support the purpose of the system to the organization. 30 Cont’d  Education  Continuously update and enhance your technical knowledge and other work-related skills.  Share your knowledge and experience with others.  Responsibility to Computing Community  Cooperate with the larger computing community to maintain the integrity of network and computing resources. 31 Cont’d  Social Responsibility  As an informed professional, encourage the writing and adoption of relevant policies and laws consistent with the ethical principles.  Ethical Responsibility  Strive to build and maintain a safe, healthy, and productive workplace.  Do your best to make decisions consistent with the safety, privacy, and well-being of your community and the public.  Accept and offer honest criticism of technical work as appropriate and will credit properly the contributions of others. 32 Questions? 33

Use Quizgecko on...
Browser
Browser