IT Infrastructure: Security and Resilience Solutions

IT Infrastructure: Security and Resilience Solutions

IT Infrastructure: Security and Resilience Solutions
Автор: Süß Ralf, Süß Yannik
Дата выхода: 2024
Издательство: Apress Media, LLC.
Количество страниц: 309
Размер файла: 2.7 MB
Тип файла: PDF
Добавил: codelibs
 Проверить на вирусы

Table of Contents....5

About the Authors....13

Introduction....15

How Did It All Begin?....15

Today’s IT Infrastructures....17

Chapter 1: The Architecture of IT Cloud Services....19

1.1 Cloud Services....22

1.2 IT Services Provided by CSP....23

1.2.1. Data as a Service (DaaS)....24

1.2.2. Communications as a Service (CaaS)....25

1.2.3. Infrastructure as a Service (IaaS)....25

1.2.4. Platform as a Service (PaaS)....26

1.2.5. Software as a Service (SaaS)....26

1.2.6. Business Process as a Service (BaaS)....27

1.2.7. X as a Service (XaaS)....27

1.3 Deployment Models of Cloud Services....28

1.3.1. Deployment Models....29

1.3.2. Public Model....29

1.3.3. Private Model....29

1.3.4. Community Model....30

1.3.5. Hybrid Model....30

1.4 Summary....31

Chapter 2: Data Center Facilities....33

2.1 Data Center Facility Design....35

2.2 Established Standards for Data Centers....36

Uptime Institute Tier Standard....36

EN 50600 Series....38

ASHRAE....38

Other Examples....38

2.3 Space....39

Physical Space....39

Lighting....40

Noise....40

Weight....40

2.4 Facility Management....40

2.5 Infrastructure....41

Racks....41

2.6 Cooling....42

Temperature....42

Cooling....42

2.7 Power....44

Power Demands of DC....44

Uninterruptible Power Supply (UPS)....45

2.8 Security....48

Access Control....48

2.9 Summary....49

Chapter 3: Compute and Virtualization....50

3.1 Hardware....51

3.2 Software....52

3.3 Types of Computer Systems....53

3.4 Purpose of Computer Systems....55

General-Purpose Computer....55

Specialized Computer Systems....57

3.5 Data Centers....58

3.6 Compute Resources....60

Compute Building Blocks....60

Rackmount Server....60

Benefits of a Rack Server....61

Blade Server....63

Benefits of a Blade Server....64

High-Performance Computer or Supercomputer....65

3.7 Computer Operating Systems....69

Key Functions of an Operating System....69

History of Operating Systems....70

Operating System Functions....73

Operating System Types....78

Embedded Operating Systems....78

Real-Time Operating Systems....79

Server Operating Systems....81

Distributed Operating Systems....82

Cloud Operating Systems....85

Operating Systems for Client Systems....87

3.8 Compute Virtualization....87

Hardware Virtualization....87

Types of Hardware Virtualization....88

Autonomic Computing....89

Container....91

Benefits of Containers....92

Kubernetes....93

Control Plane....94

Key Value Store....94

Nodes....95

Pods....95

API Server....96

Kubernetes Scheduler....96

Kubernetes Controller Manager....97

Types of Kubernetes Controllers....97

Cloud Controller Manager....98

Controllers with Cloud Provider Dependencies....98

Kubernetes Node Components....98

3.9 Edge Computing....100

3.10 Compute Resiliency....104

Definition....104

Fault-Tolerant Computing....104

Resilient Computing....106

Federated Architecture....108

3.11 Provisioning and Administration of Compute Resources....109

Computer Workload....109

Types of Computer Workloads....109

Workload Deployment....112

Benefits and Challenges of Private and Public Clouds....113

CSP....113

Benefits....113

Risks....114

Private Clouds....115

Benefits....115

Challenges....116

Kubernetes Workload Management....116

3.12 Charging for Compute Resources....119

Terminology....119

Pricing Variables....120

Dashboards....121

Charging Structure....121

3.13 Summary....122

Chapter 4: Storage and Virtualization....123

4.1 Storage Resources....125

Primary Storage....125

Secondary Storage....127

HDD....128

SSD....129

Tertiary Storage....130

Offline Storage....130

4.2 External Storage Systems....132

Direct Attached Storage (DAS)....133

Network-Attached Storage (NAS)....134

Storage Area Network (SAN)....135

4.3 External Disk Configurations....137

JBOD....137

Disk Arrays....138

RAID....139

RAID Levels....140

RAID 0....140

RAID 1....141

RAID 2....142

RAID 3....143

RAID 4....143

RAID 5....143

RAID 6....145

Nested RAID Levels....145

RAID 01....145

RAID 10....146

RAID 50....147

4.4 Storage Virtualization....148

Access Modes for Virtualized Storage....149

Types of Storage Virtualization....150

Symmetric and Asymmetric Virtualization....151

Virtualization Methods....152

Storage Virtualization Benefits....154

4.5 Storage Security and Resilience....155

Data Resiliency....156

Key Methods to Ensure Storage Data Security....157

Data Protection....158

Data Security....158

Threats to Data Security....159

External....159

Internal....159

Areas of Vulnerabilities of Storage System....160

Cloud Storage....160

Physical Security....160

Data Encryption....160

Deletion of Data....161

Data Storage Security Principles....161

Availability....161

Integrity....161

Confidentiality....161

Best Practices for Data Resiliency....162

Storage Security Implementation....165

4.6 Storage Provisioning and Administration....166

Classic SAN Provisioning....166

Storage Provisioning in Modern DCs....167

Thick Provisioning....167

Thin Provisioning....168

Storage Pools....168

Storage Allocation Tiering....171

Comparison of Public and Private Storage Infrastructure....171

4.7 Charging for Storage Resources....172

Cost-Saving Options for Cloud Storage....174

4.8 Summary....175

Chapter 5: Network....177

5.1 DC Network Components....178

Cables....178

Cables for Power Distribution....179

Cables for Data Connection....179

Structured Cabling....180

Switches and Router....181

DC Switches....183

Functions....183

Capacities....183

Connection Speed....183

Ports....184

Network Management....184

Router....184

DC Gateway....185

5.2 DC Network Topology....186

Centralized Topology....186

Zoned Network Topology....187

Top-of-Rack Topology....188

Mesh Network Topology....188

Multi-tier Network Topology....189

Software-Defined Networks....191

SDN Architecture....192

SDN Application....193

SDN Control Plane....193

SDN Data Plane....193

5.3 Network Resiliency....194

Network Fault Management....194

5.4 Network Provisioning and Administration....195

Network Provisioning....195

Network Administration....196

Monitoring....197

Network Administration Areas....199

Security Management....199

Account Management....199

Fault Management....199

Configuration Management....200

Performance Management....200

5.5 Resilient Network for IT Data Center....200

Security Threats....201

Physical Network Security....201

Technical Network Security....201

Administrative Network Security....201

5.6 Resilient Network Architecture for IT Data Centers....202

5.7 Summary....204

Chapter 6: Backup....206

6.1 Evolution of Backup Systems....206

6.2 Today’s Backup Systems....209

Backup in Private Data Centers or Private Clouds....209

Cloud-Based Backup Systems....209

6.3 Types of Backup Methods....210

6.4 Disaster Recovery Planning....212

Understanding Disaster Recovery....213

The Disaster Recovery Process....213

Key Considerations in Disaster Recovery Planning....214

The Role of Technology in Disaster Recovery....216

6.5 Summary....216

Chapter 7: Data Center Security and Resiliency....218

7.1 Vulnerabilities of Computer Systems....219

Denial-of-Service Attack....219

Phishing....220

Spoofing Attack....220

Eavesdropping....221

Backdoor....222

Direct-Access Attacks....222

Privilege Escalation....223

Reverse Engineering....223

Multivector and Polymorphic Attacks....223

Social Engineering....223

Malware....224

7.2 Motivations and Impact of Attacks....225

Impact of Security Breaches....225

Attacker Motivation....225

7.3 Security by Design....227

Security Architecture....229

Security Infrastructure....229

Vulnerability Assessment and Management....230

Reducing Vulnerabilities....232

Hardware Protection....233

Access Control Lists....236

Security Tools....237

Security Training....238

Cyber Hygiene....238

Incident Response....239

Cybersecurity Planning....241

7.4 DC Resilience....242

DC Security....242

Critical Services....245

Achieving Data Center Resiliency....245

Improving Resilience....246

7.5 Summary....247

Chapter 8: IT Support Services....250

8.1 IT Help Desk....251

Options to Contact a Help Desk....252

Call the Help Desk....252

IVR Systems....252

Several Functions Offered by IVR Systems....253

Benefits of Using an IVR System for a Call Center....253

Drawbacks of the IVR System....254

Help Desk....255

Pros....256

Cons....256

Email....256

Pros....257

Cons....257

Online Chat....257

Pros....258

Cons....258

Chatbots....258

Benefits of Chatbots....259

Summary – Options to Communicate with a Help Desk....260

Trouble Ticketing Systems....260

Trouble Ticketing Dashboard....261

8.2 IT Service Desk....264

8.3 Remote DC and Edge Computing Support....267

Remote DC Support....267

Edge Computing Support....267

8.4 Summary....270

Chapter 9: Summary....271

9.1 Resilient IT Infrastructure....272

9.2 IT Services Provided by Cloud Service Providers....272

9.3 Data Center....273

9.4 Compute....274

9.5 Storage....276

9.6 Network....278

9.7 Backup....280

Backup System....280

9.8 Resiliency....281

9.9 IT Services....283

Help Desk....283

Service Desk....284

References....285

Index....297

Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components of modern IT infrastructure—compute, storage, backup, and beyond. As technology continues to surge forward, cyber threats evolve in tandem, prompting a dire need for reinforced data center security and resilience.

This book provides readers with a holistic, layered understanding of IT operations in our interconnected age. You will dive deep into the heart of technological advancements, appreciating the symbiotic relationship between evolving hardware capabilities and the progressive nature of cloud services.You will understand the intricacies of data center design, management, and the strategic role they play amid the growing reliance on both private and public clouds. Asindustries pivot towards a more digital-first approach, this book serves as a guiding star, illuminating the pathways, challenges, and opportunities of the vast IT infrastructure landscape.

What You Will Learn

  • Trace the rich history and evolution of data centers over the last 60 years
  • Get comprehensive insights into cloud services architecture, from IaaS to SaaS
  • Gain in-depth knowledge of data center facilities, infrastructure, and security
  • Know best practices in storage provisioning, administration, and cost management
  • Develop strategies and tools for ensuring data center security and resilience
  • Understand the multi-faceted world of IT support service in modern digital environments

Who This Book Is For

IT professionals: from system administrators and network architects to IT managers and data center overseers, plus students and tech enthusiasts seeking deep insights into IT infrastructure


Похожее:

Список отзывов:

Нет отзывов к книге.