Trusted by +2 million users,
assist thousands of students everyday
assist thousands of students everyday
Showing pages 1 to 3 of 7 pages
Table of ContentsIntroduction2Part 1: Vulnerabilities Assessment3Bibliography7
IntroductionThe growth of internet is rapidly increasing in the real world. Every one shares theirinformation via internet. The information should be shared accurately without any error. Patchmanagement is the part of system which management which involves in testing and installingpatches in the administered system. The error occurs only in this process. When the system getsan update, it will not accept the patch to test or install. So that OS will not start. The time takento restart the OS will be the downtime of the server. The system should hold live migration.Since the data loss may occur due to the error of patch process, the back up of the data should betaken. The backup data should be moved to secured location. Two different types of data areavailable in the datacenter. One is passive data and active data in the datacenter. So the datacenter with the both the container with active and passive datacenter should not save same thedata which is affected. It should hold only the value data from the successful update or it shouldbe able to rollback the data from the server if there is any flaw in the data or any operation failurethat occurs in the network.Infrastructure Requirements:The network system holds the infrastructure that it can handle error in change of thenetwork. If the system is affected by the patch management process then the whole networkshould be passed and it should recover the data from the server automatically. The networkshould be able to adopt the available network and manage the change if the server has no activerequest and response. It can be managed with the backup of data which is available in the server.If the active user of the servers is active by the more number of users they can make lot oftransaction on the website. The network must able to take snapshot of the database and shouldenter the log of the server so that any changes made in the network would be traceable.The solution for this patch management process is locking the data in the server. When thenetwork change happens in the network the system, save the data and won’t let the server tochange the data. Now the local copy of the data is created and it can be compared with the datasaved in the server which is the original data. The changes are measured and the data can beupdated. When the patch management gets updated and the network is running normal they canupdate the data with the compared value of the active data with recent transaction of data. Onlysome changes might be needed but this will be secured. Because there will not be any conflict inthe data because the pervious data is been locked which is transacted recently. We will have towait for the data to get update. There is no threat in conflict error because everything is checkedafter the conformation. The changed data in the recent data are changed in the lock data so noredundancy will come and data will be secured.The security policy:The security policy include if network system is accessible. The system should have hierarchy ofaccess in the network. Not all the people can fix the fault that occurs in the system only some of
the people are able to do the operation process. The security is needed in the environment wherethe security of the physical infrastructure will be low. So the system should be secured in everyregion. For example, a bank will have many branches based on their type of region. In urban arethe number of visitors in the bank will be more so that the security in the bank will be morewhile in sub urban areas in the same branch the security of the system might not be tight becauseof the less people visiting the bank. So like that the threat can be occur. If there number of accessto the system is more, threats may occur. If the hacker exploits these things the system could becompromised.Problem Solution:People who need to access these networks should follow necessary protocol in order to increasethe security in the network. For example person should not take any electronic items to the bankand the clearance ID card should be checked all the time. Person other than an employee shouldnot use other system without proper permission. Changes done by the employee should be notedin the log every time. So that if something happens due to changes in the system could be easilyrectified.Risk management Requirements:The risk management can be approx prediction in the system. The risk management can’t bedefined accurately. Only we can run test in the risk but we need expert advice to manage the risk.They have the overall function of the project and how the process will occur and what will be thechance for losing the system. It should be controlled only by the experts. Some persons are ableto find out this kind of solution because of the experience gathered by them. The riskmanagement is very much necessary because the risk may occur anytime in the system both atthe starting of the project or the ending of the project the system. It may occur anywhere butexperts should be able to respond to the error automatically or it should be controlled by theexpert who monitors the system.The requirement of the risk is unpredictable because of the how the preparation is done. Theremight be a chance for the error to occur in the system. The risk may arise in the public side orfrom the company side. If the worker doesn’t know what he is doing it might not affect him itmight have affected the public or the other department in the same company. It is like makingerror in the system without knowing the effect. The error caused by human is unpredictable. Wecan figure out the pattern by identifying the error occurrence and type of error occurring shouldbe noted and where the analysis of the data is collected and the solution to the problem will beready before the error occurs. This is how the risk management is reducing the risk but it can beeliminated. Different types of errors are preventable risk and external risk.