CH-1 Introduction to System Administration(Updated).pptx
Document Details
Uploaded by GlamorousKazoo6957
Ambo University
Tags
Related
Full Transcript
System and Network Administration CHAPTER-1 Introduction to system Administration [email protected] Ambo University, Department of Information Technology Outline Introduction to System Administration System Administration functions ...
System and Network Administration CHAPTER-1 Introduction to system Administration [email protected] Ambo University, Department of Information Technology Outline Introduction to System Administration System Administration functions Specializations of System administration Why is system administration important? Ethics for System Administrators 2 Introduction to System Administration System Administration is a set of functions that: Provides support services Ensures reliable operation Promotes efficient use of the system Ensures that prescribed service quality objectives are met 3 Cont’d Systems administration includes: Computer systems and the ways people use them in an organization: knowledge of operating systems and applications knowledge of hardware and software troubleshooting knowledge of the purposes for which people in the organization use the computers 4 Cont’d A person specialized in maintaining and operating a computer system is known as System administrator (sysadmin). The most important skill to a system administrator is problem solving frequently under various sorts of constraints and stress. 5 System Administration functions Installation Configuration Access control User management Support Monitoring 6 Cont’d Updating Maintenance of network equipment Switches, routers, DHCP servers, DNS servers Maintenance of computer systems Databases, email servers, ERP(Enterprise resource planning) systems 7 Cont’d Installation Writing necessary data in the appropriate locations on a computer’s hard drive for running a software program. e.g. Installing operating system, application programs Challenges: streamline process across thousands of computers. When to install? For who? What to install? 8 Cont’d Configuration After installing the software it must be configured for the business needs. Selecting one among many possible combinations of features of a system. 9 Cont’d Access control Limiting access to resources like programs, processes, or other systems and establishing what authorized users can do on a system. Limiting access to files or directories a user can read, modify or delete. Limiting access to network ports Challenge: who to give access? To what? 10 Cont’d User Management Defining the rights of organizational members to Resources in the organization. Includes: Creating and removing user accounts Setting and Updating permissions for users. The challenge is managing large numbers of users Done by Active Directory AD rule in the domain is implemented by Domain controller 11 Cont’d Monitoring Listening and/or recording the activities of a system to maintain performance and security. Two types of monitoring: Reactive:-detecting and analyzing failures after they have occurred. 12 Cont’d Reactive monitoring can be done by: Analyzing logs after failures(identifying affected systems) Problem notifications Proactive:-testing a system for specific issues before the failure occurs. Vulnerability scanners Penetration testing 13 Cont’d Updating Replacing defective software components with new or up to date component. Remove vulnerabilities detected during ongoing use and monitoring of the software. Two categories of Updating: Operating system updates: Fixissues with the low level components of the system software developed and released by the operating system vendor. Application updates: fix problems in individual application software. 14 Cont’d Summary of system admin duties: User account management Accounting and restrictions User IDs Home directories (quotas, drive capacities) Mail Default startup files (paths) Permissions, group memberships, Communicating policies and procedures Disabling / removing user accounts 15 Cont’d Hardware management Capacity planning Adding and removing hardware Hardware evaluation and purchase Inventory Cabling, wiring, DIP switches, etc. Device driver installation System configuration and settings User notification and documentation 16 Cont’d Perform file system backups, restores Install and configure new software and services Keep systems and services operating Monitor system and network Troubleshoot problems Maintain documentation 17 Cont’d Audit security System logging and audit facilities Evaluation and implementation Monitoring and analysis Traps, auditing and monitoring programs Unexpected or unauthorized use detection Monitoring of security advisories Security holes and weaknesses Live exploits Help users, performance tuning, and more! 18 Cont’d System Administration Challenges System administration needs: Broad knowledge of hardware and software To balance conflicting requirements Short-term vs. long-term needs End-user vs. organizational requirements Service provider vs. police model 19 Cont’d To work well and efficiently under pressure Availability Flexibility, tolerance, and patience Good communication skills People think of sysadmins only when things don't work! 20 Specializations of System administration Database Administration Maintaining a database system, and insuring the integrity of the data and the efficiency and performance of the system. A person who is responsible for the environmental aspects of a database is called a database administrator (DBA). 21 Cont’d Basic Duties of DBA: Installation of new database related software Configuration of hardware and software with the system administrator Security administration Data analysis Database design and data modeling and optimization Disaster recovery (backups and testing of backups) 22 Cont’d Network administration A network administrator maintains network infrastructure such as switches and routers, and diagnoses problems with these or with the behavior of network-attached computers. A person who is involved in computer network and that carry out network administration is known as network administrator (or network specialist or network analyst). 23 Cont’d Network administration normally includes Deployment Configuration Maintenance and Monitoring of active network gear: switches, routers, firewalls, etc. 24 Cont’d Network Administration also includes activities such as: Network address assignment Assignment of routing protocols and routing table configuration Configuration of authentication and authorization maintenance of network facilities in individual machines drivers and settings of personal computers as well as printers 25 Cont’d Maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems Security Administration Security administration needs a person who is specialist in computer and network security including the administration of security devices such as firewalls, as well as consulting on general security measures. 26 Importance of system administration The goal of system administration: Reduce the customer’s total cost of owning a computer and keeping it working. Most of this cost is people’s time rather than purchased hardware or software. 27 Ethics for System Administrators Professionalism Maintaining professional conduct in the workplace and will not allow personal feelings or beliefs that cause to treat people unfairly or unprofessionally. Personal Integrity Be honest in professional dealings and forthcoming about your competence and the impact of your mistakes. Avoidconflicts of interest and biases whenever possible 28 Cont’d Privacy Access private information on computer systems only when it is necessary in the course of your technical duties. Maintain and protect the confidentiality of any information to which you may have access. Laws and Policies Educate yourself and others on relevant laws, regulations, and policies regarding the performance of your duties. 29 Cont’d Communication Communicate with management, users, and colleagues about computer matters of mutual interest. Strive to listen to and understand the needs of all parties. System Integrity Strive to ensure the necessary integrity, reliability, and availability of the systems for which you are responsible. Design and maintain each system in a manner to support the purpose of the system to the organization. 30 Cont’d Education Continuously update and enhance your technical knowledge and other work-related skills. Share your knowledge and experience with others. Responsibility to Computing Community Cooperate with the larger computing community to maintain the integrity of network and computing resources. 31 Cont’d Social Responsibility As an informed professional, encourage the writing and adoption of relevant policies and laws consistent with the ethical principles. Ethical Responsibility Strive to build and maintain a safe, healthy, and productive workplace. Do your best to make decisions consistent with the safety, privacy, and well-being of your community and the public. Accept and offer honest criticism of technical work as appropriate and will credit properly the contributions of others. 32 Questions? 33