DED9

Security Plus; How To Use Fault Tolerance Mechanisms?

A Big Part Of Ensuring High Availability Is Creating Redundancy In All Areas, Including Hardware. Redundancy Should Be Applied To Equipment Such As Servers, Hard Drives, Network Cards, Communication Links, Etc.

Snapshots

Fault Tolerance Mechanisms, Many organizations, use virtualization technology to build virtual machines (VMs) that run on servers on the network. You can create a virtual machine snapshot that provides a quick backup of the system status and configuration with virtualization software. The advantage of Snapshot is that you can quickly restore everything to a backup.

However, snapshots also have problems. For example, one of the drawbacks of images is that you lose all the changes made to the system after taking the pictures, so you have to use the snapshots in certain situations.

Snapshots are a point-in-time copy of a disc or set of disks, as far as backup is concerned. For example, solutions such as the VSS header Volume Snapshot Service, known as Shadow Copy, allow vendors to back up to a single disk.

When the backup starts, it backs up the snapshots and allows users to modify the files on the disk when the backup is done because they are technically preparing the images. Any changes to the files that occur during the backup are recorded and then recorded in the backup.

Schedule a backup

Most network administrators prefer to have late-night backup operations automated or enabled from home. That’s why they plan their backup operations so that they do not need to be in the office overnight to get started. Most backup software supports backup scheduling, and this is one of the features that you should look for when choosing a backup software.

It would help to create a backup plan when planning your backup operations. A backup plan includes a list of data prepared with each backup process and the type of backup (incremental, partial, or complete). You should also make sure that a backup program is included in this plan.

When developing your backup plan, make a detailed schedule of resources on the server (such as folders, databases, or emails) and their contents. Also, plan how often this information should back up.

In addition to the usual information about network diagrams, firewall rules, server settings, and the like, top companies also make backups to restore everything to its original state without any problems.

You must be a member of the Administrators or Operators Backup group to be able to back up your Windows operating system. You can also use the Backup file and directories section to get the necessary backup permission.

Back up and restore data on the Windows server.

In this exercise, you will learn how to backup files on your Windows server using Windows backup software and how to recover a file after accidental deletion. Be sure to watch the video of this exercise available in online sources and in this book.

  1. Go to the ServerA virtual machine. Selecting Manage | Add Roles and Features Install the Windows Server Backup feature.
  2. After installing the Windows Server Backup software, ensure you are still in the Server Manager window. More Tools | Select Windows Server Backup.
  3. Select Local Backup on the left.

4. To back up the LabFiles \ PacketCaptures folder, select the Backup Once option in the Actions section on the right.

5. Select the various options to specify your backup settings and click Next.

6. Select the Custom option to select the files you want to back up, and then click Next.

7. Click Add Items to add items that need to be backed up. Expand the contents of drive C: by selecting the + sign, and then open the LabFiles folder.

8. To back up the PacketCaptures folder, select the box next to the PacketCaptures folder and click OK.

9. Click Next. To back up a file to another disk, select Local Drive and click Next.

10. Click the Backup button to make a backup. This process should only take a minute.

Recover deleted file

11. to Computer path Drive C: | labfiles | Go to PacketCapture.

12. In the PacketCaptures folder, select and delete a file called httptraffic. Cap.

13. Click Yes to confirm that you want to delete the file.

14. Close all windows.

15. To recover the deleted file, launch Server Manager and then Tools | Select Windows Server Backup.

16. Click on the Recover link in the Actions panel.

17. Select This Server to specify the backup to be saved on your local server, and then click Next.

18. Make sure you select the current date as the day the backup performs. Click Next.

19. Select the Files and Folders option to recover separate files from the backup, and then click Next.

20. On the left, click the plus sign (+) to expand through the backup folder structure, where you will see the PacketCaptures folder. Select the PacketCaptures folder on the left to display the files in that folder.

21. Select the HTTPTtraffic.cap file on the right to retrieve.

22. Click Next.

23. In the recovery options, select Original Location to recover the file from which made the backup initially. Click Next. Note that ACLs (licenses) will also retrieve.

24. Click Recover to start the recovery operation.

25. After the recovery operation is complete, click Close and close the backup software. Check if the files are now in C: \ labfiles \ PacketCaptures?

Geographical considerations

When planning for disaster backup and recovery, you need to consider some geographical considerations regarding your physical location.

Implementing the Fault Tolerance Mechanism

A big part of disaster preparedness is ensuring that systems are up and running correctly, especially when the hardware has a problem. For example, companies need to ensure that there are at least two power supplies on one server so that if one power supply fails, the other power supply enters the circuit, and the server functions correctly. This section will get acquainted with different ways of tolerating error and redundancy.

What is redundancy?

A large part of the cybersecurity flexibility mechanism is the implementation of redundancy about assets such as hard drives, network devices, and power supplies. These include having multiple power supplies on various servers or communication channels when a connection to an Internet service provider is lost. Redundancy ensures that investments do not become entirely inaccessible in the event of a problem.

When creating redundancy, especially when it comes to data redundancy and services, you need to determine whether you want to use in-house solutions to achieve redundancy, which is a solution in your physical network, or whether you want to use a meta-centric mechanism.

For example, in the case of email servers, the redundancy solution could be to have an internal backup email server or an email service hosted in the cloud. Note that you can transfer all your resources to the cloud host.

Disk redundancy

Hard disks are the first component to look out for when implementing redundancy solutions. It is to protect the data when the server hard drives fail. There are two main ways to achieve hard drive redundancy that you should not ignore.

Network redundancy

Data redundancy is essential when implementing disk redundancy solutions such as RAID, but you should also have redundancy for other network components. The following are two critical technologies for redundancy in network components:

Redundancy on Power

As mentioned, it is essential to put redundancy in connection with electricity. There is still a way to supply power to critical assets such as servers and routers in a power outage.

Redundancy with Replication

Another technique for adding redundancy is duplicating data from source to destination at regular intervals. Here are two critical technologies that are used in connection with reproduction. There are common ones that use repetition:

To take Security Plus, you must know the various disk redundancy, network redundancy, power surplus, and duplication solutions. Mainly related to RAID, multitasking, load balancing, NIC teaming, dual power supply, and UPS.

Non persistence and Diversity

Security Plus test raises questions about the instability and variability of cybersecurity flexibility. By definition, instability means data loss when a system shuts down, or an application closes.

The following are some of the factors that can help you achieve system stability:

When implementing any of these redundancy technologies, make sure that the variety of solutions plays an essential role in the sustainability of the environment. Variation refers to the fact that there is always the possibility that some of the answers will attack; to solve this problem, you must use complementary solutions.

 There are many ways to achieve security diversity as follows:

Exit mobile version