General When would you envision using virtualization in a networked environment?
ID: 3879427 • Letter: G
Question
General
When would you envision using virtualization in a networked environment?
What particular organizational problems might be addressed when using virtualization?
Identify benefits of cloud computing and share with the class challenges you envision in managing this type of environment.
Remote Management
Discuss the implications associated with security and remote management. Consider the following:
When would you advise using a tool to remotely manage a system and what problems could be addressed?
When would this remote management tool be inappropriate and why?
What policy would you recommend with respect to remote management?
Monitoring
Discuss the following:
Would you recommend a packet sniffer for your organization? Why or why not?
What are the ethical and legal responsibilities of an organization that utilizes this type of technology?
What type of policy would you implement for your organization with respect to using packet sniffers, logging events, and the frequency of viewing?
Optimization
Complete the following:
Comment on when you would envision using fault tolerance in your network designs and why.
What specific business requirements or situations would be addressed when designing with fault tolerance in mind?
Explanation / Answer
GENERAL :
Network virtualization :
Network function virtualization (NFV) expands capabilities . Withvisualization technologies, businesses can envision changes in Tom, It seems like the orchestration software would be a massive undertaking.
virtualized or that they expected would be virtualized within the next year. .organizations have relative to deploying virtualized servers. Two . instance complete with MAC and IP addresses and creates a virtual In particular, the vSwitch.
Risks, Challenges, and Common Objections of Virtualizing Business Critical Applications :
Now that we’ve reviewed the many benefits that organizations can realize by virtualizing their business critical applications, let’s review some of the risks, challenges, and common objections that organizations will face along the way. By understanding both the benefits and the risks, you will be able to understand the full scope of virtualizing these applications and be able to build a better business case. You’ll also be more likely to succeed if you go into this with your eyes wide open.
The preceding section might have made it seem as though virtualizing your organization’s business critical applications was all rainbows and unicorns and nothing could go wrong, right? The truth is that almost any application can be virtualized on the vSphere platform, but without the proper planning up front and understanding of the risks, it is easy to fail. This section outlines the risks and common objections to virtualizing business critical applications and provides ways to combat these objections with facts, benefits, and counterpoints.
Performance :
The biggest concerns that application owners and businesses are likely to express about virtualizing their critical applications are around performance. These are the most common objections you are likely to hear, in one form or another:
It is true that if an application is not properly sized, or a virtual infrastructure is not properly designed, applications can experience decreased performance when they are virtualized. Similarly, if an organization carries over poor practices from the physical world (such as oversizing systems with more CPU and memory resources than they actually need) into the virtual world, performance of the organization’s applications can suffer. Without careful planning you could easily fall into the pitfalls of the three listed items.
The best way to avoid performance problems is to treat a business critical application differently from all other applications you might have virtualized thus far. Just because you were successful in virtualizing a front-end web server does not mean you’ll have the same success virtualizing the back-end SQL database using the same process. Business critical applications have different requirements than lower-tier applications, so they typically require more planning before virtualizing them. A proper capacity-planning exercise should be performed before the application is virtualized so that you understand exactly what the resource demands will be and you can size the virtual machines, and the environment, properly.
Cloud Computing :
Despite the many benefits associated with cloud computingapplications for . available to the general public over the Internet on a pay-as-you-go basis. Community cloud: The cloud infrastructure is shared by several . City Council with a segregated data environment to store its applications and data.
Introduction
Ask several different organizations why they are implementing a private cloud, and you're likely to receive several different reasons. Ask several people within any one organization why they are implementing a private cloud, and you're still likely to receive several very different reasons, especially if those people span business and operational teams. Ask any of them if they have realized the benefits they thought they would, and they're likely to say "not yet" or "not quite."
Three different surveys about cloud adoption produced three different top results.
1.Flexibility
2.Consolidate IT infrastructure
3.Scalability
Common Challenges of Cloud :
Self-service IT :
Automation and orchestration :
Transition to a hybrid model :
Virtualization of the network
For example :
The host on which the business critical applications are running should not have high resource overcommitment or, ideally, any at all. It might be a common practice to overcommit resources on ESXi hosts in your organization to increase consolidation ratios, but that practice can hurt the performance of business critical applications (and might not even be supported by some applications). High consolidation ratios are not typically a goal of virtualizing business critical applications (though it can be an ancillary benefit), so don’t try to cram in too many virtual machines per ESXi host.
REMOTE MANAGEMENT :
Security-related remote access problems abound, from pcAnywhere and RDP to Dropbox and even .Essential Guide Section you're in Network access control. providers to reach out to their SMB customers to talk about these kinds of securityproblems and ways to improve them .Identifying and tackling big data issues.
implementation of remote access VPN, to address security policy .Company provided hardware also serves to minimize management issues.
Q) When would you advise using a tool to remotely manage a system?
A.) RemotelyAnywhere is a useful tool that can be used to control computers remotely over a local area network or the Internet.
It needs only to be installed on the machine to be controlled, and then you will be able to access that computer securely from anywhere using an internet-enabled PC, WAP cell phone, or PDA.
It comes in two different editions with a variety of administrative tools, as you will find detailed on our website under Features.
Q.)When would this remote management tool be inappropriate and why?
A) Managing remote staff doesn't have to be a disaster. With the right toolsin the hands of skilled IT professionals, they can be handled almost as .Inappropriate or malicious content on the internet poses a threat of both sides.
Report inappropriate content using these instructions. You can only install RSAT on Professional or Enterprise editions of the Windows client. If you need to install management tools in Windows Server 2008,
Q) What policy would you recommend with respect to remote management?
A) You've always had the assurance from knowing that your system security policy forbids any remote access, thus reducing significantly the risk .
Remote Access Policy for IT Security Managers
Have the remote users sign a Remote Access Policy and SyOPs and check the specific auditing and monitory reports which will help to provide assurance that they are complying.
Q) What particular organizational problems would this address?
A) This means that organizations can easily adapt to each new problem as it is located to develop a distinctive competence in handling certain types of problems.
finding unwillingness to address any of these problems, or inadequate.Theorganisation works on technical issues, but does not take a particular skills.
As organizations continue to diversify, the opportunities for workplace problems intensify. Small business owners and managers typically face one or more of three potential levels of conflict -- employee, team or organization-wide issues. Often the underlying causes of these problems are the lack of open, flowing communications or using the wrong organizational structure. Many businesses compound problems by avoiding communicating a clear chain of command path.
Employee Issues
Individual employee problems can be personality conflicts, supervisor issues, personal trauma, or company structure oriented. Management must learn the cause of the problem and who or what keeps "fueling the fire." If there is no clear trigger, the answer could fall back to insufficient or confusing communications. For example, an employee in a decentralized organization may feel they must answer to multiple supervisors if the chain of command is not communicated clearly.
Team Problems
To be high performing, teams must be dedicated to working toward an agreed goal. Should they experience personal disconnect with other team members, the team can become non-functional. These issues often stem from organizational or management communication breakdowns that confuse team and personal common goals. Team leaders must offer constant feedback and foster cohesiveness. When facing team issues, managers must diagnose the problem and take immediate corrective action to avoid more serious performance breakdowns.
Organization-wide Problems
Simple employee or team issues can quickly expand to your total organization if you don't take immediate corrective action. You must avoid this situation at all costs, as it often results in your staff forming two groups, both at odds with each other. Should all your avoidance actions fail, be ready to take much more dramatic corrective measures. You must prevent these problems from negatively changing the corporate culture you have carefully cultivated to make your company and workplace a high performing entity.
Organizational Problem Solving Steps :
Many roads can lead to organizational problems at the workplace. Successfully solving these issues, however, usually follows the same plan. First, manage and resolve the current problem right away. For example, two or three employees may have interpersonal conflicts. If you are not part of the problem, you must become the solution. Second, learn the problem's root causes. Address and correct these issues to avoid a repetition of the problem. This is simple to state, but often more difficult to accomplish. Yet, it is imperative you take these two steps to maintain a high-performing staff.
Q) What are the ethical and legal responsibilities of an organization that utilizes this type of technology?
A) Legal, Ethical, and Professional Issues In Information Security. Differentiate between laws and ethics; Identify major national laws that relate to the practice.
The ethical issues involved are many and varied, however, it is helpful to focus done his own legal work, was introduced to an attorney who agreed to defend him .The source of the fatal error was failure of a large scale information system .
I will discuss the issues faced by the legal system in keeping up with the fast paced development of technology, the .The Legal System and Ethics in Information Security , SANS Security .
The Legal System and Ethics in Information Security Security plays a big part in today's world of computers, e-commerce and the Internet. Technology however, has brought with it, the evils of crime. We thus need laws to protect those who maybe exposed to these new threats. In this paper, I will discuss the issues faced by the legal system in keeping up with the fast paced development of technology, the ways in which the current laws can help, and I will also enumerate a few of the laws that have been developed specifically to address computer crime in the United States.
The Legal System and Ethics in Information Security
Security plays a big part in today’s world of computers, e-commerce and the Internet. Technology however, has brought with it, the evils of crime. We thus need laws to protect those who maybe exposed to these new threats. In this paper, I will discuss the issues faced by the legal system in keeping up with the fast paced development of technology, the ways in which the current laws can help, and I will also enumerate a few of the laws that have been developed specifically to address computer crime in the United States. Finally, the paper describes the role that ethics have to play in the world of computer security, and how they must be developed hand in hand with laws and statutes to govern the rights and wrongs of the computer world.
Security and the Law
This section deals with the interaction of the legal system with information security. A major part of computer and information security today is tied to the Internet, and the since the Internet does not have any geographical boundaries, a discussion of the legal system with respect to computer security would not be complete without mention of legal practices in this regard, followed in every country around the world. Since it is not feasible to study the legal systems of every single country, the focus of this section will be on the computer security laws and statutes of the United States legal system.
Monitoring :
Q) Would you recommend a packet sniffer for your organization? Why or why not?
A) yes i would recommend a packet sniffer because a packet sniffer is a wire-tap devices that plugs into computer networks and you can do it from almost any network connection to eavesdrop on your neighbors.Traffic flows through a mesh, and no single point will see it all. You need to monitor incoming inverse-DNS lookups on the DNS server in your organization.
A packet sniffer is a program that eavesdrops on the network traffic. A sniffer can be used for a good purpose: to audit your own network, and to demonstrate Sniffer activity occurs widely within organizations.A machine that is not in promiscuous mode would never see the packet.
You catch up on your work e-mail, you check Facebook and you .Packet sniffing, or packet analysis, is the process of capturing any Finding out what someone on your network is doing on the Internet is not some arcane and mystifying talent anymore.I would also suggest the use of https everywhere.
Q)What are the ethical and legal responsibilities of an organization that utilizes this type of technology?
A) Employee monitoring, legal, ethical, management. ... Organizations mustmonitor employees to protect both the company as well as monitoring technology, which enables them “secretly to view, record, and report literally numerous employers across the nation utilize some form of employee monitoring.
Texas and federal law are both very flexible for companies in that regard. With the right kind of policy, employers have the right to monitor employees' use of technology department or computer person set up software monitoring f" or the above names, depending upon what browser the employee uses.
Q) What type of policy would you implement for your organization with respect to using packet sniffers, logging events, and the frequency of viewing?
A) The International Organization for Standardization (ISO) network management. Network management platforms can be viewed as the main console for Routers and switches are capable of sending system log messages to a syslog server. To implement RMON alarm and event using the CLI interface.
necessary policies, standards and practices are implemented to prevent the organization aiming to protect its assets must use such a system. into the intrusion management methodology you improve your odds markedly “Snort is a libpcap-based packet sniffer and logger that can be used as a security purpose.
Q)What specific organizational problems would this policy address?
A)Identify potential problems at an early stage and propose possible solutions. Relevant analysis from project and policy evaluation can highlight the outcomes of Objectives should be specific to the project interventions, realistic in the and improving learning achievement School/community organizations would be fully addresed.
1 Definition; 2 Challenges; 3 Existing Models and Frameworks for Policy and Advocac Policy impacts can include specific changes in behavior (e.g., increased number water rights, or disability legislation—prepare to address different ideologies, Robust trainings on policy monitoring work can help organizations.
Optimization
Q)Comment on when you would envision using fault tolerance in your network designs and why.
A) Path Optimization Traffic Prioritization 3 Priority Queuing Fault-Tolerant Media Implementations; Backup Hardware .Network designers faced with designing an internetwork have four routers permityou to implement routing environments that suit your specific requirements.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.