Combine 1-4 Week IT602
Combine 1-4 Week IT602
Infrastructure
Information Technology Infrastructure
• Credit Hours: 3
• Lecturer: Shafaq Nisar
1. Introduction
2. IT Infrastructure
3. The Infrastructure Model
4. Non-functional Attributes
5. Non-functional Requirements
Topic 11
Introduction of IT Infratsructure
is IT
What is IT Infratsructure?
Infratsructure?
Infratsructure
Infratsructure
Infrastructure
IT Infratsructure
IT Infratsructure
Change is inevitable because
Rapid
development of
Big data
new types of
applications
❖ Business architecture
❖ Enterprise architecture
❖ Data architecture,
❖ Application architecture and
❖ Infrastructure architecture
Is there
Is there aa General
General Definition of IT
Definition of IT Infrastructure?
Infrastructure?
I
Application
I Infrastructure for application user
I
Server
I Infrastructure for systems manager
1
Building
I I
Electricity provider
I I
• Credit Hours: 3
• Lecturer: Shafaq Nisar
• Security
• Performnace
• Recoverability
• Testtability
• Scalability
Handling Conflicting NFRs
• Credit Hours: 3
• Lecturer: Shafaq Nisar
1. Introduction
2. Calculation of Availability
3. Mean Time Between Failures (MTBF)
4. Sources of Unavailability
5. Types of erros
6. Environmental issues
7. Complexity of the infrastructure
8. Availability Patterns
9. Redundancy, Failover
10. Business Continuity
Introduction
AVAILABILITY CONCEPTS
Introduction
z a
·-
z
4
Operating Systems C:
co
:i5 E
c �
Compute
"r
> e
c
4
a
G
c..
Storage
Networking
Datacenters
Calculation of Availability
2 2 MTBF 2 2 MTBF
[Failure] [ Fie@d
MTBF and MTTR
Network
Interface 250,000 8 0.9999680 99.99680
Controller (NIC)
Calculation Examples
I r' "·
] k
'
] Power
J
'suow Memory CPU >
99% availability
Power System
�
supply
Fan
board
Memory CPU NIC
h .
�
Power
supply
Fan
System
board
Memory CPU NIC v
99% availability
• Calculate availability:
𝐴 = 1 − (1 − 𝐴1 )𝑛
• Total availability = 1 − (1 − 0.99)2 = 99.99%
Sources of Unavailability - Human Errors
• 80% of outages impacting mission-critical services is caused by
people and process issues
• Examples:
• Performing a test in the production environment
• Switching off the wrong component for repair
• Swapping a good working disk in a RAID set instead of the
defective one
• Restoring the wrong backup tape to production
• Accidentally removing files
• Mail folders, configuration files
• Accidentally removing database entries
• Drop table x instead of drop table y
Sources of Unavailability - Software Bugs
• network failures, or
• Migrating data
• Creation of backups
• During planned maintenance the system is more vulnerable to
downtime than under normal circumstances
• A temporary SPOF could be introduced
• When a component still works after the first month, it is likely that it
will continue working without
Time
Sources of Unavailability - Environmental Issues
• Complex systems
• Sometimes it is better to just have an extra spare system in the closet than to use
complex redundant systems
Availability Patterns
• We just need to know what is shared and if the risk of sharing is acceptable.
• Examples:
• A single component having two power supplies; if one fails, the other
takes over
• Dual networking interfaces
• Redundant cabling
Failover
• Examples:
• Windows Server failover clustering
• Credit Hours: 3
• Lecturer: Shafaq Nisar
Performance Concepts
Introduction
Application
-- �
>- -
>--
factor Applications
management
Platform
-
-
�
>- -
>--
Application platform
• Nobody -
management
notices a highly -
-
�
>- >--
Infrastructure Infrastructure
management
End User Devices
performing system Operating Systems �
q
6
c >
5 e
E
•
·.::
.!!! � :,
Compute 7
>
0
t .,,u
0
Networking
Maintenance state
Performing backup
• Benchmarks compare:
• Performance of various subsystems
• Across different system architectures
Benchmarking
• Building prototypes:
• Hiring equipment from suppliers
• Using data centre capacity at a vendor’s premise
• Using cloud computing resources
• Focus on those parts of the system that pose the highest risk, as early as
possible in the design process
Vendor Experience
• Figures
• Best practices
User Profiling
• Predict the load a new software system will pose on the infrastructure
before the software is actually built
• Steps:
• Define a number of typical user groups (personas)
• Create a list of tasks personas will perform on the new system
• Decompose tasks to infrastructure actions
• Estimate the load per infrastructure action
• Calculate the total load
Performance of a Running System
Managing Bottlenecks
Calculation examples
• The performance of a system is based on:
• The performance of all its components
• The interoperability of various components
• Every system has at least one bottleneck that limits its performance
• Load testing - shows how a system performs under the expected load
of time
V)
C
0
0
V)
Q
r
• The test result shows how the Breakpoint
• A test conductor
• Coordinating tasks
• To reduce cost:
• Use a temporary (hired) test environment
Performance Patterns
Increasing Performance on Upper Layers
• Prioritizing tasks
• Working from memory as much as possible (as opposed to working with data
on disk)
• Disk controllers
• Operating system
• Cache memory:
• Stores all data recently read from disk
• Stores some of the disk blocks following the recently read disk blocks
Caching
• When users browse the internet, data can be cached in a web proxy
server
• A web proxy server is a type of cache
• Earlier accessed data can be fetched from cache, instead of from the internet
• Benefits:
• Users get their data faster
• All other users are provided more bandwidth to the internet, as the data does
not have to be downloaded again
Grid Computing
• Examples:
• SETI@HOME
• Credit Hours: 3
• Lecturer: Shafaq Nisar
1. Introduction
2. Computer Crimes
3. Risk Management
• Risk Response
• Exploits
4. Security Controls
• Attack vectores
5. Security Patterns
• Identity and Access management and Layered security
• Cryptography and Cryptographic Attacks
Introduction
Security Concepts
Introduction
..- -
• Availability Application
..- '"""
'"""
-
• Confidentiality
Applications
-- --
management
-
-
• Integrity Platform
-..- -
management
Application platform
-
-
• Focused on the recognition and Infrastructure
management
Infrastructure '"""
Networking
• In the past, the hacker community was very keen on getting personal
or group exposure by hacking into a secured IT infrastructure. When
hackers proved that they could enter a secured system and made it
public, they gained respect from other hackers.
• While nowadays most hacking activity is done for other reasons, there
are still large communities of hackers that enjoy the game.
Creating Damage
• For instance, by holding data hostage and asking for ransom money,
stealing credit card data, changing account data in bank systems
OR
• or
• A nuclear power plant, could result in chaos and fear amongst citizens
Warfare
• Examples:
• Key loggers can send sensitive information like passwords to third
parties
• Network sniffers can show network packages that contain sensitive
information or replay a logon sequence
• Data on backup tapes outside of the building can get into wrong hands
• Disposed PCs or disks can get into the wrong hands
• Corrupt or dissatisfied staff can copy information
• End users are led to a malicious website that steals information (phishing)
Security Controls
CIA
❑Confidentiality
❑Integrity
❑Availability
CIA
• Confidentiality - prevents the intentional or unintentional
unauthorized disclosure of data
• Integrity - ensures that:
• No modifications to data are made by unauthorized staff or processes
• Data is consistent
• Malicious code
• Applications that, when activated, can cause network and server
overload, steal data and passwords, or erase data
• Worms
• Self-replicating programs that spread from one computer to
another, leaving infections as they travel
Attack Vectors
• Virus
• Self-replicating program fragment that attaches itself to a program
or file enabling it to spread from one computer to another, leaving
infections as it travels
• Trojan Horse
• Appears to be useful software but will actually do damage once
installed or run on your computer
Attack Vectors
• Lower the Time to Live (TTL) of the DNS records to be able to reroute traffic
to other servers when an attack occurs
• Phishing
• A technique of obtaining sensitive information
• The phisher sends an e-mail that appears to come from a legitimate
source, like a bank or credit card company, requesting
"verification" of information
• The e-mail usually contains a link to a fraudulent web page
Security Patterns
Identity and Access Management (IAM)
• The process of managing the identity of people and systems, and their
permissions
• Only the receiver has the ability to decrypt this data, transforming it
back to the original information
• Stream ciphers
• Create an arbitrarily long stream of key material
• Combines key stream with the plaintext bit-by-bit or character-by-
character
• Used when data is in transit over the network
• RC4 is a widely-used stream cipher
Cryptographic Attacks