...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from machine...
Words: 337 - Pages: 2
...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. The three basic elements of the VServer are: The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses, to change the ownership of a file...
Words: 291 - Pages: 2
...through the Linux Security Modules in the Linux kernel. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating system kernels, such as Linux and that of BSD. SELinux was developed by the United States National Security Agency, it was released to the open source development community under the GNU GPL on December 22, 2000. SELinux users and roles are not related to the actual system users and roles. For every current user or process, SELinux assigns a three string context consisting of a role, user name, and domain. This system is more flexible than normally required: as a rule, most of the real users share the same SELinux username, and all access control is managed through the third tag, the domain. Circumstance for when the user is allowed to get into a certain domain must be configured in the policies. The command runcon allows for the launching of a process into an explicitly specified context, but SELinux may deny the transition if it is not approved by the policy configuration. The security of an unmodified Linux system depends on the correctness of the kernel, all the privileged applications, and each of their configurations. A problem in any one of these areas may allow the compromise of the entire system. In contrast, the security of a modified system based on an SELinux...
Words: 907 - Pages: 4
...Introduction: Global Positioning System, GPS Summary of key findings: Google, ALZ.org, Wikipedia, In a nutshell describing GPS - A navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver. Today, it is widely used by the civilian public for both commercial and recreational use. In addition to GPS, other systems are in use or under development. The Russian Global Navigation Satellite System (GLONASS) was in use by only the Russian military, until it was made fully available to civilians in 2007. The navigational signals transmitted by GPS satellites encode a variety of information including satellite positions, the state of the internal clocks, and the health of the network. These signals are transmitted on two separate carrier frequencies that are common to all satellites in the network. Two different encodings are used: a public encoding that enables lower resolution navigation, and an encrypted encoding used by the U.S. military. So in 20 years you can just imagine where this will lead… As of December 2013, there are 32 satellites in the GPS constellation. The additional satellites improve the precision of GPS receiver calculations by providing redundant measurements. With the increased number of satellites, the constellation was changed to a non-uniform...
Words: 358 - Pages: 2
...an alternative to cable and DSL. HSPA+, enhances the widely used WCDMA (UMTS) based 3G network with higher speeds for the end user. 7.1 Review 1) UTP and Coaxial cables can be used if signal enhancers are placed at correct distances. 2) WLAN’s are limited to shorter distances due to signal interference from attenuation and objects between the AP and devices. 7.2.1 Dedicated lease lines are very effective in transmission, but can be costly. 7.2.2 Full mesh topologies are good for no fault networking. Creating it can be difficult to maintain and assemble. Partial mesh is good when every computer is not important in the network. 7.2.3 Star topologies are great for small LAN’s. But, they have a high level of fault error in the system. 7.2.4 T1 uses 24 DSO channels, E1 has a speed of 2048 Mbps, E3 has 16 E1 channels, T3 has 43,736 Mbps and 28 DS1 channels. 7.2 Review 1) PPP allows their frames to flow from the customer router to the ISP router. A control protocol is used to set a standard everyone can understand. 2) LAN’s tend to have more immediate clients, WAN technology tends to be affected by distance. 7.3.1 The shipping sites could form a partial mesh topology, the Foundry can connect directly to Manufacturing, Head -quarters should also have direct contact to Manufacturing. 7.3.2 Satellite and Virtual 7.3 Review 1) The cost is effective because of the lease lines. Leased lines are needed for connectivity. 2) Hub and spoke....
Words: 341 - Pages: 2
...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses...
Words: 423 - Pages: 2
...This course introduces basic programming concepts, logic, and scripting language tools used to automate basic system administrator processes. Critical thinking, logic, and troubleshooting are emphasized. Database applications are also introduced, helping students develop basic skills in using a typical database. Security topics are discussed. I am looking for someone on a weekly basis to login in to my online class and work on assignments, and discussion posts. Also a ilab, and short quizes multiple choice. There is also a course project: Your company is currently planning to automate many different system administration tasks. Your manager has asked you to research a system administration task and implement it using VBScript. In addition, your manager would like to see both a proposal that describes the system administration task and a complete VBScript solution with sample output runs. During the first 6 weeks of this course, you will be introduced to a variety of topics in VBScript. These topics include the following. VBScript Introduction: Variables, Constants, and Data Types VBScript Output Methods, VBScript Input Methods VBScript Decision-Making Statements VBScript Loop Structures and Arrays VBScript Procedures and Functions VBScript File Input/Output Methods The Course Project is worth 170 points and is comprised of the following deliverables. Week 3: Outline (30 points) Week 6: Complete proposal (140 points) The following...
Words: 343 - Pages: 2
...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage servers...
Words: 1099 - Pages: 5
...NT2580 Introduction to Information Security STUDENT COPY: FINAL EXAM 30. What does risk management directly affect? a. Company investments b. Security policy framework c. Security controls d. Number of employees 31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of? Positions, with Z wrapping back to A? a. Transposition b. Vigenere c. Caesar d. Vernam 32. Identify a security objective that adds value to a business. a. Revocation b. Authorization c. Anonymity d. Message authentication 33. Which of the following is an asymmetric encryption algorithm? a. AES b. 3DES c. RSA d. RC4 34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. a. Nonrepudiation b. Integrity c. Authorization d. Access control 35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and Nonrepudiation a. Cipher text b. Cryptography c. Access control d. Hashing 36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with? a. Application b. Network c. Physical d. Data Link 37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives. a. Multilayered firewall b. Screened subnet firewall c. Border firewall d. Ordinary firewall 38...
Words: 606 - Pages: 3
...Everyone loves pizza and beer and I am certainly no exception so it would have surprised no one to find me at Frank’s Pizza on an otherwise unremarkable evening in 1987, what did surprise many was what happened less than a year after this particular night. In a small town in Northern California more famous for its rich gold rush era history than any culinary notoriety in a downtown still dominated by structures from the late 1800’s is a pizza joint named Frank’s, no one remembers who gave it that name, the owner for the vast majority of my life is named William Jackson Davis and if he ever knew the titular namesake he never told me or anyone I know, but history or name aside no one I ever heard of had anything but praise for the pies that were produced there, 4 hour waits on a Friday or Saturday were not uncommon. So it was there I was headed on that portentous evening nearly thirty years ago after a back breaking week of working in construction putting drywall on houses, with a great hunger and thirst only such demanding and dusty work can produce and looking forward to nothing more than the filling and delicious pizza and ice cold refreshing beer when I noticed that the owners had hired a new waitress, a striking Green eyed beauty with a bust that would cause babies for miles around to begin salivating, now as a young single man not many years out of the Marine Corps my reaction was somewhat predictable, I hit on her like a Miner Forty-niner on a rich vein in the Mother...
Words: 821 - Pages: 4
...The System of Public Administration in Poland In a general sense, the ‘administrative system’ may be defined as the totality of the principles of organization and operation of public administration. In a narrow sense, the administrative system is usually taken to mean an organizational system or structure based on law, within the framework of which public administration functions, and also the operational mechanism of the entire structure and its parts. In addition, it includes functional connections, rules and methods of proceeding designed to guarantee flawless operation of the entire system and its segments. A. Central Administration Central administration constitutes an important segment of the administrative apparatus situated on the highest level of its organizational structure. It includes a fairly complex organizational and functional mechanism composed of various organs, offices, agencies and institutions {e.g., governmental agencies or special funds) set up to fulfill the respective tasks of public administration throughout the entire country. The shape of this mechanism is outlined in general terms by the Constitution and specified in more detail by ordinary legislation and executive orders issued on a statutory basis. Central administration is internally diversified. It is divided into two basic segments, the political-governmental and the administrative-executive. To distinguish these two principal components of the central apparatus, they are traditionally...
Words: 5129 - Pages: 21
...Plan and implement administration system Submission details |Candidate’s Name | |Phone No. | | |Assessor’s Name | |Phone No. | | |Assessment Site | | |Assessment Date/s | |Time/s | | The assessment task is due on the date specified by your assessor. Any variations to this arrangement must be approved in writing by your assessor. Submit this document with any required evidence attached. See specifications below for details. Performance objective In this assessment task you will demonstrate skills and knowledge required to plan or review administration systems and implement new or modified administration systems. Assessment description Within a real or simulated business context, you will plan a new administration system or review an existing system. You will need to: ● consult with users or stakeholders to develop a detailed specification for the new or revised system, which must meet both organisational needs and external requirements such as codes of practice or legislation ● follow organisational procurement policies to select an appropriate developer or supplier ●...
Words: 1683 - Pages: 7
...AIPE ASSESSMENT COVER SHEET Please ensure this form is fully completed (including signature) prior to submitting. This page should be on the front of your assignment and needs to be easily accessible. Student ID Number: | 15015810/14000793 | Class Batch: | B07 | Student Name: | Tiansun Li/Alejandro Herrera | Unit code & Title | BSBADM504B Olan or review administrative systems | Course: | BSB50207 Diploma of Business | Due Date: | 27/22/2015 | Module: | BS07 Business Administration Systems | Trainer’s name: | Abdullah | Assessment Task Title: | Role-play | Assessment Part No: | Assessment part 2 | PLAGIARISM Plagiarism is the act of representing as one’s own original work the creative works of another, without appropriate acknowledgement of the author or source. COLLUSION Collusion is the presentation by a student of an assignment as his or her own which is in fact the result in whole or in part of unauthorised collaboration with another person or persons. Collusion involves the cooperation of two or more students in plagiarism or other forms of academic misconduct and as such both parties are subject to disciplinary action. Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in the school’s policies. See ‘Student Discipline/Misconduct Policy’ and ‘Assessment Policy' Assignments must be typed using document software such as MS Word; no handwritten...
Words: 1097 - Pages: 5
...Candidate 1 a. Strengths – 1. Bachelor’s degree in Health Administration 2. 3 years on the job 3. Increased reimbursements 4. Well with technology with innovation and entrepreneurial 5. Directive management style 6. Goal oriented b. Weakness 1. Pompous and opinionated 2. Feels no one know as much about technology like she does 3. Pushes employee to hard Candidate 2 1. Strengths – 1. Bachelor’s Degree in Health Administration 2. Master’s in Business administration 3. 5 years on the job 4. Talented negotiator 5. Good with people Wants to lead, direct and manage employees 6. Participative management style 7. Professional demeanor 8. High integrity 9. Willing to work overtime b. Weakness – 1. Not at the center on a daily bases 2. Rumors about attend on the clock without permission Candidate 3 A. Strengths – 1. Bachelor’s degree in Health administration 2. Confident and professional 3. Positive and motivated 4. Can oversee large groups of employees 5. Increased reimbursements 6. Good at teaching and training instrumental in the purchases and installation of billing system 7. Liked by the employees 8. Good coaching and praising...
Words: 576 - Pages: 3
...the efforts for an organization that will provide a platform for the exploration and realization of my potential to the maximum QUALIFICATIONS Organizational skills: Self and student organization. Ability to schedule and coordinate internal and external meetings, events, interviews, various department meetings and appointments. Knowledge on Disability and Rehabilitation laws Excellent written and verbal communication skills. Administration of distributed computing and storage systems Familiar with C, C++,Java, Matlab 8.0, Linux(Open source RHEL, Fedora) Computer savvy – proficient in Excel and Word, experienced in digital data input, Microsoft Project and Adobe products. PROFESSIONAL EXPERIENCE Sindhura College of Engineering, INDIA Designation: Assistant Administrative Officer Prepare schedule for different courses, guide students complete final project by providing enough research resources(Ubuntu) Suggested and successfully implemented TRIM electronic filing system, leading to an almost entirely paperless office Manages daily activities of office as well as company-wide projects and activities. Suggest in developing and implementing the company's strategic plan, implementing budgets Assist in Reviewing administrative policy, Preparing financial reports Represents agency administrative personnel at meetings, conferences, and institutes for which the agency has primary responsibility Mother Teresa Institute of...
Words: 487 - Pages: 2