𝔖 Scriptorium
✦   LIBER   ✦

📁

IT Infrastructure: Security and Resilience Solutions

✍ Scribed by Ralf Süß, Yannik Süß


Publisher
Apress
Year
2024
Tongue
English
Leaves
309
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components of modern IT infrastructure―compute, storage, backup, and beyond. As technology continues to surge forward, cyber threats evolve in tandem, prompting a dire need for reinforced data center security and resilience.

This book provides readers with a holistic, layered understanding of IT operations in our interconnected age. You will dive deep into the heart of technological advancements, appreciating the symbiotic relationship between evolving hardware capabilities and the progressive nature of cloud services. You will understand the intricacies of data center design, management, and the strategic role they play amid the growing reliance on both private and public clouds. Asindustries pivot towards a more digital-first approach, this book serves as a guiding star, illuminating the pathways, challenges, and opportunities of the vast IT infrastructure landscape.

What You Will Learn

Trace the rich history and evolution of data centers over the last 60 years

Get comprehensive insights into cloud services architecture, from IaaS to SaaS

Gain in-depth knowledge of data center facilities, infrastructure, and security

Know best practices in storage provisioning, administration, and cost management

Develop strategies and tools for ensuring data center security and resilience

Understand the multi-faceted world of IT support service in modern digital environments

✦ Table of Contents


Table of Contents
About the Authors
Introduction
How Did It All Begin?
Today’s IT Infrastructures
Chapter 1: The Architecture of IT Cloud Services
1.1 Cloud Services
1.2 IT Services Provided by CSP
1.2.1. Data as a Service (DaaS)
1.2.2. Communications as a Service (CaaS)
1.2.3. Infrastructure as a Service (IaaS)
1.2.4. Platform as a Service (PaaS)
1.2.5. Software as a Service (SaaS)
1.2.6. Business Process as a Service (BaaS)
1.2.7. X as a Service (XaaS)
1.3 Deployment Models of Cloud Services
1.3.1. Deployment Models
1.3.2. Public Model
1.3.3. Private Model
1.3.4. Community Model
1.3.5. Hybrid Model
1.4 Summary
Chapter 2: Data Center Facilities
2.1 Data Center Facility Design
2.2 Established Standards for Data Centers
Uptime Institute Tier Standard
EN 50600 Series
ASHRAE
Other Examples
2.3 Space
Physical Space
Lighting
Noise
Weight
2.4 Facility Management
2.5 Infrastructure
Racks
2.6 Cooling
Temperature
Cooling
2.7 Power
Power Demands of DC
Uninterruptible Power Supply (UPS)
2.8 Security
Access Control
2.9 Summary
Chapter 3: Compute and Virtualization
3.1 Hardware
3.2 Software
3.3 Types of Computer Systems
3.4 Purpose of Computer Systems
General-Purpose Computer
Specialized Computer Systems
3.5 Data Centers
3.6 Compute Resources
Compute Building Blocks
Rackmount Server
Benefits of a Rack Server
Blade Server
Benefits of a Blade Server
High-Performance Computer or Supercomputer
3.7 Computer Operating Systems
Key Functions of an Operating System
History of Operating Systems
Operating System Functions
Operating System Types
Embedded Operating Systems
Real-Time Operating Systems
Server Operating Systems
Distributed Operating Systems
Cloud Operating Systems
Operating Systems for Client Systems
3.8 Compute Virtualization
Hardware Virtualization
Types of Hardware Virtualization
Autonomic Computing
Container
Benefits of Containers
Kubernetes
Control Plane
Key Value Store
Nodes
Pods
API Server
Kubernetes Scheduler
Kubernetes Controller Manager
Types of Kubernetes Controllers
Cloud Controller Manager
Controllers with Cloud Provider Dependencies
Kubernetes Node Components
3.9 Edge Computing
3.10 Compute Resiliency
Definition
Fault-Tolerant Computing
Resilient Computing
Federated Architecture
3.11 Provisioning and Administration of Compute Resources
Computer Workload
Types of Computer Workloads
Workload Deployment
Benefits and Challenges of Private and Public Clouds
CSP
Benefits
Risks
Private Clouds
Benefits
Challenges
Kubernetes Workload Management
3.12 Charging for Compute Resources
Terminology
Pricing Variables
Dashboards
Charging Structure
3.13 Summary
Chapter 4: Storage and Virtualization
4.1 Storage Resources
Primary Storage
Secondary Storage
HDD
SSD
Tertiary Storage
Offline Storage
4.2 External Storage Systems
Direct Attached Storage (DAS)
Network-Attached Storage (NAS)
Storage Area Network (SAN)
4.3 External Disk Configurations
JBOD
Disk Arrays
RAID
RAID Levels
RAID 0
RAID 1
RAID 2
RAID 3
RAID 4
RAID 5
RAID 6
Nested RAID Levels
RAID 01
RAID 10
RAID 50
4.4 Storage Virtualization
Access Modes for Virtualized Storage
Types of Storage Virtualization
Symmetric and Asymmetric Virtualization
Virtualization Methods
Storage Virtualization Benefits
4.5 Storage Security and Resilience
Data Resiliency
Key Methods to Ensure Storage Data Security
Data Protection
Data Security
Threats to Data Security
External
Internal
Areas of Vulnerabilities of Storage System
Cloud Storage
Physical Security
Data Encryption
Deletion of Data
Data Storage Security Principles
Availability
Integrity
Confidentiality
Best Practices for Data Resiliency
Storage Security Implementation
4.6 Storage Provisioning and Administration
Classic SAN Provisioning
Storage Provisioning in Modern DCs
Thick Provisioning
Thin Provisioning
Storage Pools
Storage Allocation Tiering
Comparison of Public and Private Storage Infrastructure
4.7 Charging for Storage Resources
Cost-Saving Options for Cloud Storage
4.8 Summary
Chapter 5: Network
5.1 DC Network Components
Cables
Cables for Power Distribution
Cables for Data Connection
Structured Cabling
Switches and Router
DC Switches
Functions
Capacities
Connection Speed
Ports
Network Management
Router
DC Gateway
5.2 DC Network Topology
Centralized Topology
Zoned Network Topology
Top-of-Rack Topology
Mesh Network Topology
Multi-tier Network Topology
Software-Defined Networks
SDN Architecture
SDN Application
SDN Control Plane
SDN Data Plane
5.3 Network Resiliency
Network Fault Management
5.4 Network Provisioning and Administration
Network Provisioning
Network Administration
Monitoring
Network Administration Areas
Security Management
Account Management
Fault Management
Configuration Management
Performance Management
5.5 Resilient Network for IT Data Center
Security Threats
Physical Network Security
Technical Network Security
Administrative Network Security
5.6 Resilient Network Architecture for IT Data Centers
5.7 Summary
Chapter 6: Backup
6.1 Evolution of Backup Systems
6.2 Today’s Backup Systems
Backup in Private Data Centers or Private Clouds
Cloud-Based Backup Systems
6.3 Types of Backup Methods
6.4 Disaster Recovery Planning
Understanding Disaster Recovery
The Disaster Recovery Process
Key Considerations in Disaster Recovery Planning
The Role of Technology in Disaster Recovery
6.5 Summary
Chapter 7: Data Center Security and Resiliency
7.1 Vulnerabilities of Computer Systems
Denial-of-Service Attack
Phishing
Spoofing Attack
Eavesdropping
Backdoor
Direct-Access Attacks
Privilege Escalation
Reverse Engineering
Multivector and Polymorphic Attacks
Social Engineering
Malware
7.2 Motivations and Impact of Attacks
Impact of Security Breaches
Attacker Motivation
7.3 Security by Design
Security Architecture
Security Infrastructure
Vulnerability Assessment and Management
Reducing Vulnerabilities
Hardware Protection
Access Control Lists
Security Tools
Security Training
Cyber Hygiene
Incident Response
Cybersecurity Planning
7.4 DC Resilience
DC Security
Critical Services
Achieving Data Center Resiliency
Improving Resilience
7.5 Summary
Chapter 8: IT Support Services
8.1 IT Help Desk
Options to Contact a Help Desk
Call the Help Desk
IVR Systems
Several Functions Offered by IVR Systems
Benefits of Using an IVR System for a Call Center
Drawbacks of the IVR System
Help Desk
Pros
Cons
Email
Pros
Cons
Online Chat
Pros
Cons
Chatbots
Benefits of Chatbots
Summary – Options to Communicate with a Help Desk
Trouble Ticketing Systems
Trouble Ticketing Dashboard
8.2 IT Service Desk
8.3 Remote DC and Edge Computing Support
Remote DC Support
Edge Computing Support
8.4 Summary
Chapter 9: Summary
9.1 Resilient IT Infrastructure
9.2 IT Services Provided by Cloud Service Providers
9.3 Data Center
9.4 Compute
9.5 Storage
9.6 Network
9.7 Backup
Backup System
9.8 Resiliency
9.9 IT Services
Help Desk
Service Desk
References
Index


📜 SIMILAR VOLUMES


IT Infrastructure: Security and Resilien
✍ Ralf Süß, Yannik Süß 📂 Library 📅 2024 🏛 Apress 🌐 English

Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components

Critical Infrastructure System Security
✍ Betty E Biringer 📂 Library 📅 2013 🏛 Taylor & Francis, CRC Press 🌐 English

''Part l: Security risk assessment. Chapter 1. Introduction to Security Risk Assessment As our nation moves forward in the age of information and global economy, our dependencies on national infrastructure is greater than ever. Compromise of our critical infrastructures could disrupt the functions o

The Security of Critical Infrastructures
✍ Marcus Matthias Keupp (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation’s society and economy, and assesses the resilience of these networks to intentional attacks. The book combines the analytical capabilities of experts in

Critical Infrastructure Security and Res
✍ Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos (editors) 📂 Library 📅 2019 🏛 Springer 🌐 English

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors,

Cyber security and IT infrastructure pro
✍ Vacca, John R 📂 Library 📅 2014 🏛 Syngress 🌐 English

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a

Cyber Security and IT Infrastructure Pro
✍ John R. Vacca 📂 Library 📅 2013 🏛 Syngress 🌐 English

<p>This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to