0% found this document useful (0 votes)
50 views30 pages

SecurityClassNotes 5241 4761210968

Network security notes

Uploaded by

Aditya Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
50 views30 pages

SecurityClassNotes 5241 4761210968

Network security notes

Uploaded by

Aditya Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 30
e ae by anjay, sty 4 Compuker Gecuscity Y d If —_—_———*. set wouspor lel spy otis paivies eed re (ee ype "pte = a se ie aa on Syste (oo A fuosization (puteost 4 Hackve Intranet Man in middle Crosken, (Trtuder) isstelenn B matuare s Malfcfous Softusse Malu js a Computer Softusare, urhich 1s used to flow avatlable Resources ofa Computer. ancl gain accese of Com puter oie urkthout user's permiccton « @ steal Infrrmafir 5 | @ +o Provide beneftt tele “xe (executable ftle) TPM redhat p. w VIRUS 3( cckaye Management) viol peu. Resources undo i) BA Vinus jc Malicvous executable goftusare Code wth 1s attaches te oo propnin ov file and Prfect tem When exe cubed - 4 virus Cam vepdtcate or Teproduce Hem colvers Yovigue can be Harmful , ov Hedi ty the content of ttle wr delete a Fite + 2 worm: WORM weplicaber themselves om a System y and atfadh them 49 anothes file or executable p gram +o Haron BS Independent Program « . > Shared rari Netwost , 3 Spyusou ¢- Spuuae is used to seyty Cease tenn: Computer Aystem: and Stealfig in formatfon from a (Private Computer to avatlaWle a Hacks» 4+ Trojan Horse :- Ty face a Pe OF Malusane ushith act Like a afmple Program 5 pup wie Once Installed fy the Compuderc they, ® Provide” aecess to Remote attecker . CEOS a aenaahatr 5 Logte Bomb +- eee bomb fs a Malusate program that usts tn to activate — Maliefous code « A system condition or date/ time on usbleh specific Pagfecd U Is executed « eneryt Ts used 40 convert Meantn and demand Foe Ransom, agalnk 6 Ransomware ¢- This m Sansontiadaaees Informedhom fnto a Code demand of the the Infermadtons 3 [Petce} T) Adueae 1 - C Adverts tay Luppost ed off ui) (4 Tt toyed to Publish advertisement on web. g Keplepates ss oat wecords iy that [¢ entered an user fate computer System and tt i¢ used to ae Sensitive. information (ike Passoremt) , e e @ © e e e e e e e e e e e e e e e e e e e e e@ e e e 1PoCOSCHOHOHECSCHSCOSEHOSOOSC OSLO SEEEO 9+ Backdoor t- A Backdoor aster the ysual Authantteatlor to Access a Com puter Gat: Criminal Activitia Ae Rootkit i- 4 foot kit mods Readdect operat toy syste te Make Backdoor and tt &, Maint e pad - useol for Remote { Access a Computer. steal Hake alo x Complete VERVE: Comput -virargle "a Program code that’ fs Loaded fn computor ulthout user's knowledge and replicates Hhemeclves a attashlng ty otyror eles» H Phaset of corn, ‘i Phases oF Computer views :- ( Life Gide of vrRUs) ti : 1 ) Dormant pase t- 7, wee phate, @ Compuber virus gust Accessed Computer slur or Computer sae (Wieting) « (ii) f hs be duodog Hole phew, vERUE Cheals . ™ Copies and Stag to attach them to ofan fitter» (i) Exe cud fen Phase - Dut ieee Worku Pree, VIRUS starte waned 2 Se the ureus p End Starts foc eg Tie 8 ’ @ 4 Ty pes et VIRUS ¢- ws e 4, BootSector VIRUS : These type GF viRUs foFecls Boot cecfer@ of a Puepys disk by Master Boot Resa (mB) of © Hand - dick | # Thee virus Replace Gacbig tere with tnfectef fey: FOr of Bookseclor vies : Form , dick Killer , stone VIRUS efe- 2s Fla fo fecter VIRUS + The most traditfonol formYol a — x Computer vrRus fs File infector vagus whfeh Hides themselves 45 anottun Program code 7 The main objective of tate vz exeuttable fox aus Is ty Ham SEX2\ 5 “Comm; bbws hat ele fn the een na Cascade .efe+ Madeipoditleta ngialss => pe\-44°74 Vaca ; - oF Boot gedor 4 Program: Prfedor VIRUS* saboh that tnfecls See In Feat is executed - & Pip 4 Invader ~epe- Gatup frocess ——> [RAM : _2_Jowrite alec Thana pu. jae vigut 4+ Macro ViRve + RUPEE el a 5, type oF computer. vigus, usldleh gesseen that uses Macro ‘ifself. F Sword Procescer , s preached rogram Infects thoce HoOCORSSSOSSOSSHSOSRSSSOSEOHOSSCOEEE EO | J jipt 4 * ‘ 5 script TRUS Sevipt Viruh Tone based on) anaes Scart tanga tat urch web applieelfow er Anolud application * Ke aes gs ee wrttten tn Joveseripk , Vas (viguel cg : : cvipt 5 Activex and yee Applet that rune —- ws fst 9 wee pat g 3 Joshi eke: 2° Fores de HA vin thet is walter tn ves :- S$ Stealth virgue ; Thee: to avold detechin . 4 Avatlble om Read |ustte pea ex ex Whale types of VIRuSA utr a Contala techie of dtcky Frodo s whale , Toshi ole. Eas Ase PORIRUA com alls Gia st Encrypt Hake lodes in diferent ways: v B ditttalt to lubed - ex. & VIRUS 401 , Cascades 3ffmulate s evil ete. 8 Network y. ce ws RUS 2 Th ase yee OF virus ue ape durfinel: fev CUE APread eth coh cee a (Sharect ek ox foldsx ) x Bes SEu.slemmm aie: (8) E-mafl vERus $- Email virus Is Spreeds fimath email Mtachent © waa ex Melissoa 5 TloveYou ote: (#09 Chet are Fostant Messaytny VERVE :- 7p. apes DP gids, one & preosl Hrvough Instant meal application (Like Whats thet Makas époef ait yee A your Friend. E* Titux 5 Bizex ete. & Preventing agabrsh (infection of Computer virus ;- Ci Resbict gaan Fils from unknown gounce "7) Download Attachment from emefls whom we are never a fered “ (41) Run software wlth cantfon » (iv) use upeto- date pntivirut eoftware - & Aviva, avast , Nortan, QuickHeal , Pande , Ava, Mactee, K7, noda2, iespentte ee (Y) gcaw Removeable Media before use. Wi) Alusatt Active Firewall | windows debender + Wil) Dont Access mod eeeub 6 ee ee a Webtlte tobe caudal malictoud in reeoeaeoeoeeeoeaeeoeeeveeeeeooeeeoens e 2 wo 5 228 . irk vf Internal [H/u0, SoFtware) Fe secusel Peace 5° Th Wl components ore Mmlevelated to each ofhst , Hurefore Network Aecudly is Selated wily fober- seelated treats can o aspects, By. Santee th Altedug Message ( Mom) pala Mess aye) na private Network , Secu mes From fnfernal Malictout Program, ow Hrrough tnternad, oy External ¢ourcel. ind (Sondra) 2 Information Security services 1 pee ec ti wissa.’ ARB ote aes Presented fm Electoriic formed ae valley of From Must be defined: J taal (a) Loledty 1 : (ereafatear ) “ Ptapraphtc Algositomns This Assured tat onl auth eriged Persons exe fan transmit or changs information - (Legal or Finantial Yssass ) (B) Authentication ;- TheeGounce ox. axfpin- Saale (Pulte kage] Private Keys) - Tokens © (aigthas ae (0) Privy, es This sezvice avotdes the discloser of transmitted data to unauthorized panties + aoa, ac iver Neon - repudation + - uger Should vot be faltelyy deny tafer ote. tramsmitigs a message or Perferminff a pfaHeule eee O° ie . (d) (€ : ) Access Conol ¢- Network security Administrator mutt be ae authenticeted ane in a Network ?n Can access a Contr! Manner, (Sowzced) o ay Permitted Past of nleluerk » ~ Password Firewall Access : Biometsic gchenus . Coyesgantite Methads fa e ‘ (F) Availability :- Information 2 Resources in a Nebwsrtt mutt be avatlable” whenever th are required + ° tae | e 4-0-5 ( denial of Services) ° Cattock on avatlabil?Hy of uf & sj] e |b (operabfonal s[u) @ Date. ott H Seowd threats $= Tofrematien System have multiple components e wbich are avallabl tl : jc available at different placet » e {epee e # acctdental - Erevrs/ dicastes é # Intenttymal - Virut, malusahe a Attacks 9 [ae ° Ge aap e eeminals os i : e Threats - Envi aad nvireonme Com, @ rome Urveat ee | © Baecign vealed fous Eat Quakers ® Computer abure © Y sectiny peated iesus 4 Ploeds B exceudtow of cremitants ox H storm bealsic: | Access control . eo Tsunamt % Powiede Falun | e % alien feoblem Y Electronfe 2 , ee te Hateusay | Router | franemiesion Metta] Communieabtn chasinel | alstup connectton , Isp ( rajernet sowice provider) Men tn idole} ° b By stem —— — Hardusare BM soffurare K secwelp toole — phone Snumber B Tiypes of Intruder :- sc 4) Hocker t= Tt fs Person whieh access an wsed Account & Compulle System fn unguthortzed tn manner to Gpealth Informattonts [criminals] ~shesl, tnfeamition 43 Haem Computer Resources - (leg tat } [ tugal] > Access an account tn umasethortzed manner but are authorized far i) Legal Hacker HE Purpose + 2+ Crackdt t- Thece type of People, mates yeal gam Haxm Computer Resources by domaging dat. 0° tango fo data. 'Peeoeoeoeeoeeeoeeeeeeeeeeeoeeeeeee G) Freaker :- 45, wu gpectalfst fn Bg telephone P bi eleghs (BED hak, “T # SSL secure socket ° as - 4B gecuseity too YoSsH t secune shell Eis Secures tvonspera. stocks tp, qa ee eqetenv of [reP ITED a communi catfon protocols. and the main Profocol useal on Poferneh fe cabled at Ter] IP » gee dale Tronspet fash Foe 4 aes gouct to PT Oe cathe ial communication blo a Web browser anal Web server 4, https and gsi + a # osst et L Ja eee socksh 5 Lapen) o- he Encrypt High Level. Communication, Uke bite. WNTP and “FTP: Data Enery plten > RSA Algorithm (40 lit fo 1024 Lek ) > 1h tnewpl date fas Masiarmeleee fant. & Coprteginphte techrigus. ¥ suitp (gecane Hypertext ronefin Patocd ) # teats. an cEnempiteo alger'thm shied seauttiemmemman tibia. bw Web server “ang Web browser * 01 4 OTP (one 4%me Passulord) ¢- ey user! hoettes Mobile no. 6 E-mail Address or beth + cy chat i Captcha Captcha js q ae Code or Plehinw that is used to vartfy that fn, put fs provided |, a Human bilw yuther thon ha. ee tia ‘. is bleed ity. a Smal “dice. Wihtch Teoel tila Voladktle Meno ancl Microprocessor. pe 2. Kerboess- Th te og Hind a Seavdly tools whl te used os Authentteattn? protocols PTE NS on Bric piion Based secur Process whieh “SH secrete aa a engebryerlar: aC 3. Password gchemes ¢- Qu: Which of the falloustig fg a Herp (eta (a) helawiedd — Minimum ¢ chararter (o) 4234567 ~ Alphanumeric characte er Hello @ snsus 7 letter cone (0) hello 423 7 Spedial charaeks ute fasswod Schemes ¢ - Pascweod fs the simplest mefhad +0 gecwu a System. [ two = Leven - secuntty ) ae ue oy sed to providus utah soewdl Oe code. Ute tent 4,5 BA smart cond te Used to Computem Password or & Enc: yh ioe elie: > “Used Berend cabioe: Punmce « 3 5 é = Quit Which of the Methods P A) biomerie - Fingenpatnt | Face/votce Reco risakin aystems (8) tokent — mat Plo Hijet Ue Fleste ans emat an! de (0 fasciumrds, wa Ao oF gpectal char aahens. ° Paloare fs] axe ured for Aecese Conbo| B cRveTompae un x 1 Kryptos : te ide reek Word fain tent fa text ‘ te Dp Sen dor ee Receiver. Monin middle ( Intruder ) oo : Eeamnlicn Cyelegrehy a nk pete te Me. glen de... Art of A Messepe to Sorby: ctl Platnenees to ciple Jext) Ye Called gx agg # Plain text t A Mess i omnia se on in simplest frm thet tan to bo (orignal Mescaor ¥ debater v A converted ov Modifled fext (tronsformed’ Meesaye) # Enetphan. | Pe £> procese of convestog fidin beet ts phn text. % Deiphar | [ Dec pte - Process of — pie diphuw text +> iste text 1 4 ciphe + pn gga he engl ¥ : process. tonvt Tes pln Plain dont te ° Method Cphor teat Substi tubten Trans posttten Method Method (Gach chanarter ( change He fositlen of characters) ulin ) Tl etaaee pias v 13676 ROE GA Cagptosy-stem Symmetete Asgomdte 4 wea ely Tae te (ccd ky Bren gene p Bam a] syrmelts tay coptegreblae Tn ds type of Eneypfn Method gin lar key hres Puptte up 4 tc utd for psanalten as wel at re ex pes ( Advanced beoryaher Stanaand ) “ SDES ( Tefpple Data Encryptim standard) Rey C Rivest Chr 4) fein feet bere c= ExcP) Fire Receiver Bend a a ae ‘en (Secrete] capher tere} apelin rag C Patt ay evento) ‘ plein tet flcin fot Decay ption ve Sende [Encryption Pleo _ ee eae 7 CJ Ciphur text chp ban tout Th thls Method, Public 4 is used for gi Whireos Prirate en fo Used re —— && RSA Algorithm & ent Alyoctthm DSA algorithm , piffie Melamon / 4a70 yor BSE as: Hate: og]o2|23 Qu Tn a Symmetric key cere aratyd System, if no. of uders ae M, then ube fe the mo, of leu Required (a) (b) M(m-4) (ce) (M~4) On) z Sf no. of wrer ane mM Me2,; No» of Required = mM (m-s) gd ae = (29) 2 z Ely % eee page? 4: pe ‘ : = (Pata. Enexyption Standard ) 1 4970 > eyirindite > developed Py T6M , approved by NSA 5 National Secu & Symmetric Block cpl (National. ge d yor) based on binary. disp i ie C4-by Yor Plate feat Plaie-teet L c Inodt fe * Encraption Pea ® combination cena | deception €y eit data [ 16 Rounds Gu bit 56 ust a EB ae ee Gps tout +h OBS: Rigestihm uzeh Same 48, Fos Encrypt ae Fg Rpt ol Heep aetanael ates 4 56 bit Cy. eee a eee Be 1 oda y i % ves Algorithm uses Sequence of primitive 0 peratfont » eat H Which To eatled ar “ Rout!” and boot dete Block 46 Rounds wu used 2 Aes ( Advanced aarti Standard ) f= 2001 Symmebvic BT 1s W utocke etphoe witch te adopted as Eneeyptten Standard os veenment + and tt fe Used f LOY ; ¥# In this rithm, fixed size bbockt te in this s2¢ oft fo gymmetaic 428 bit, and 192btt or os¢ ufts hey fs Used Tt operate on Ux yg on won of byte and tt fs called 3 RSA Byrcattter See eheAy 5 te a Asymmetet Crypte arapl Algertinm fo infeh tuo, affternnt gh, on ears t ber pubbfe and Privode ve IS used for Ese tion and pega pap Web Server (‘a i Cent's public w cs ie lampuded (tert) decrypt data CPrfracke kg) Maolgiiat of - 4 Plain tex} Plain ext : ve Decryption) ( Private ke) feria eat" A Ciphia tect + Hash functlen Cipher tet pa a Etecbonte Record idly Chatty) Sop [ Pevate fay) (bared) $ Digttal signature Is a Mabhematleal, tecimique wuntch Ps to valtttde Suet and ss of an Flectronle Read. (message) 4A ofsttal Signature ts based gn Asymmetric -Rsa La in fr which a private ity 48 used to Sign an document \hereat — ounite ie fs uted to Validate 9 document + IRSA “Rivest — pamty~ Adlemas] Note i= digg; 2 Mathe medical function Which 1s called as Hash Punction + and when wis @ AsSochabed with a jess then te final iessaye Te e Known os mess di TRELEEEE EEE EO Ap Firewall :- Finwall fs used a a bareter iin a NetWork Ulich moniter: and ftiters tocapaliys and Sabet tratffe , +H Fivewall Uses a secud. pally —- whlch a nie Level ect Ts appited 4 CAL Rrlwall anes “Mibetiasie. pe i Software ythich %s main sel to authorized in a He Network » ts [ane used Firew. What sevice Caw be aecessed on tnternet # Flow of pte a Control Access +0 particular Appiication Behaviour. Contre! # How a paxtioilan. “pa ved is ; LAT of tere i 2 > Quei- Which of the Faves fei ch, Cpa Beta [ Pittock (0) Sexvice conf] ; (b) direction control ¢ () user Conta! = Q & thie of te Fatloul Js[ou Limitations of Pireusolla 7 (a) cannot Protect usher ratte assch the Firewall. attack thet (8) does not protect againct Internal threads: (c) Anes not protect piail, transfer of infected filu+ AU of thate - B Type oF Firewall :- ere] tant Intesnet zt a% ‘ nw Os Pivewatl (Applicabton Level gakeway7 Pirrewatl) ae seven) | 4. fap Firewall ( Ap pticattro sy firewall ) @ . e H Proxy Firewall ot ob o for Anthea Network « Eg yr"g e A faoxy7 Firewall deals with Netwovk fraffic ty paaeliys e Abe to an appti cation +o Examines: data at applicationg Level + ; + Proxy? ptrewall oor not allow +o Communicate stth ° is teusted Network (Host) wlth untrusted Host- e 2 Packeh filtering Pirewell 3 . eS (nehunts Layer) ° 3 e u ivele 4 e (rie U F conf ’ . irae <5 ¥ @ 4 Ih in = aa ; Filveniy Prreuath, a Rout. applies cet of Kus ® agent at TP Packelt and based on thie © IP Pa Packelt “are ato ov discarded fn a Network. e 3+ Clneult Level Fre wall 3. Ccinoult age, u i ° ner Nee te sani tate Soludfon belween @ : Flltent Firewall and Oppricattorn, e Whi orks. y tran spost eae aet ey for Arpticatfons » * a 7 O* Eiernet seal Standards y ed. and Applicoctfont 2 - 4: Communicattfonal 4 -brangastin a Applicstiow :- SSL/TLS, ; J ; J ss, (Private communicetfeo) —[ Financtab transachfen) Tpcec: & faded, # Sse (secur sockat ayn) [TEs ( Trane port Lepr ap SSLITLS ts a geaudly standand whith Ts used tn E- commence for Amfidentlal operation. {+ Sat ond Tee hag Security, standard Protocol usldch Provides re atten Gard Authentfeatten sexvice- when (Sp travels io” Unsecuxe Nebwork s ( Internet) Which of the falleuly Te (ane Appliadions of ssi P sonnet (4) Authenticatirn : pupstc ee (esa) Bio (8) Privacy” (data Encryption ) Stmmeric Encryptisn (DES) CO ‘Non - Repudet lon + + dlpttal late cuits (dD) Oaka ‘nf SAIL ee e pe 4f Tesec ( Ip sceusefy, protocol ) 1 ; e C a # SSL provids pric, sewwtily, 0 tat for Network © lager[Lowsr boy) Securtty a prbtocel fe used wluich fs Called as rately protoce! - + To sche Tp opesstion Rhee > a cob of paotrcel Which 's . Called ay Ip see Bee % Ip mety is developeal Tomei cocank, (Toten enganedtliy {ask force) - fate oF Toformatfon Packelg) eh ae creel ino wyption , pidthentl Catip> and ky e en urtch are travlt fom a © VENA (virtual pytvate Network ) He PULTE Nituleckeroe @ fag fetta; bere and | authentiel im ¥ Ip security det ines Ene Man, MENT + ho that e e Mt The Bacto Maher eae esos, $8t_and Ipsec (Ipsecurity) © Tie tet Mle Ste pty) © Sst/ Tus (ee Sy e % Appticatfon Level coud 4 Network Level Secu e YF wabicevens” Sey cltent se. 1 Bat sce tuo different network: @ 4B Short transadton # Buk dite, hander : % sSeewu the gessten H secre the connection +0 the Host. e B works ot upper sagen works af Lower e [Appticatton layer | @ Presentation yaa Tp @ ssi{TLS] oariee ayn e “Frans port by I Que: Which of the fol Fsfan functinn’ and serviced of Ip err is (A) Data origin Authentitatron (8) Connetimnless data. te (0) Data tenfidentialel (0) Repl protect (©) eg Haare 8) Silipcuce 8 (b) ALB, ond c UG bolhcncandee “(CoA Gtaaihith Ip area Berntion Modes oe ~ Transport Tannel Malis Mode 7 Ipsecurtty Header eo heli Wd Ip added wlth Ip Header. Secu Header fe oolded to am eXisty op Ht ‘ Tranepord layeo Sep Go P Head Netwirk Lain Peake Tp Heads H scy (Secure socket hell ) (Sesure shell) - Tb te 2 Secud in 1995 ¥ Prtreal Hat 5 developed Tatu yonten, Finland Y used gecapue Remote Jogin and Provides to an unsecure Network, FE proves gerusce, eared termPral gessten for khfch Pubefe by eorae 2 SSH Fs moth Secure ont heme EE a. deck] tearmvfiaten. [ yyyg yfowere Aent , Hest Authentatim Encryption gohemet- (e441 / pascused) 7 ae # Erall geansty t- # pop ( Pretty good a + sjoime ( Secare| multi purrpate Internek mall Extensfon ) # Pov (p fame 8 puoi aes pry @ ee fe pal fm) @ Which provida cayptogmphle pera (pupite neue and pn erel he ¢ ‘t > Pup. Ges eieesie 3 > Ene Provide to Ae® the security of €-matl Communi cat) oo gery > er serviced & email frat tner, developed fn ¢ 1905 3 Philip Zieomenman . 7 pPeeeaea@e@nen000e00e2000800088008080808088080 Que which of the Fodloast fs/ ow \ Provided ” pune? (1) Audhent eatin (ii) Compression (ii) Corte eae (iv) denfldnaele (v) agents @) Lug it by (7,0, aed Tr goa of jae ® simrmet- non Acett wode —=* Agerz E-matl wer | MenavAzent 15a user [owe] (Won -aserr) T-bit Aserr Bae a Telt Asetr TSR atl Femail. prot ' to send Fiche) Video, Protoco Mime hihiCh allouss peapte tet. and qoreae ee ae oe # wifi eylig | WLAN (wireless Locel Avea Network ) vl (oarretea all) (IEEE - ¢o2.44) F wWift Te a WLAN (wireless Local prea Nebwets) and +o Secu thie four Hee of wifi gecunth Protocol, ured 2 Fhese protocelt axe developed | wi-fi jance* Inttlal three Grotecol fourth Poctoce| (4990's) (2008) 4 wer (weed Eq ubvalent friveny) te > Tt ts Hod “to (onfi 7 > based on simple gy Ve bit cacy Hf WRANUITPI ploticlel access) 1 ads ee ee NCCE > 128 bt oy 256 bit ete cng > TKIP (Temporal ay Tak ny Peotocol ) » ¥ WPA? (wifi (WIFI Protected Access - 2) # 2004 @ based on ALS Encryptlon- 129 bY Eneyption « (advanced tery ptlee ¢tandand) > Used “y dndivicial User4 anol Enterpsiser » +4 wens Naa Witt WIT Protected p Access-3) OPP + S92 /as¢ / sey wi Sige (device ee rain Petoco! ) sonal 8 ot Lome qnothor ae database Whose content (a) user brrov LT AL of thaw ¥ Methods of ae a—— fa H Backup t Detabase hae database information and data fs proskep & Aone ie wane ake (Bak) data | fits > Anothore computer ees > AnoHur « Medfa devices > deel pee, ji ¢ wv fa Syle chow , dbrfve (Ardid) “a a | Ee Scxosoft one dbcve (windows) idoud (ios) dnspbox, AWS, | eon Mant a duplicate cop Safe Stood ot Place Uke ayer, transaction ae Pnfermatton Pnfrematfon fe ie ares : Ques whieh of the fopousl Caw be yeasom fy database Latlour (b) Hondware foPlune (€) Carfeophte Evert Backup @ fu Bac kup ® Trangactien © Diffesential loy Backup Peete @ + Full Backup $- Thic Method tater Lot of Lime i whheh e Full Backup of database ate i data and transaction: @ eels + Frome enna In {hie Method only transaction Log @ fe Mose as Bask « ae Bockiyp Hux aed e tran, ro transaction \nformatin. @ defete v 8: “DiffecenttetNBesleip = Ty +, sesntat gs data and transasHon Recon Boll. ? In this Backup * that frformakion te cored that Ps Last chamged fn tata base. fil backup > transaction Loy > different fel time takw for Backup (More to Legs) \ full Backup that cloves © 4 feeanig cr The process of Regaotigy detabare from Bockanp ffl on database feilue %s known at ro hooray tec was based Reco Shadow "te KG ben Bl teansactfons loys are APO a transaction ts success? ae Execute MH wilt be sterol ct Vm Place. Sofe place. z 4 Suet Tn wabdch of Hou Lobia eee Multfple Hard-dfek ame Connected to" eae J our for Backup Purpose ? (0) RFID (Resto ae TdentiFieatfon) g (6) NTFS ( New techni File system) e (Micsosoft tasporetivo) () FAT [File Attocation Table) CLOT Bard ( Redundant Aakay of Independent tsk ) . (Inexpensive) Foutt tolerance A gary confiquradfe = a eet 4s, af Ligh Performance (42) >(440) my H dato eer: Spbit up of data tnt Multiple pacts « Ber level’ Gye Level Block. Level shippn? “ey “oe _A0D contlgartion © techni quis . RA wena a ID Level o ! Strip pin (Block evel stelpotng. ) (ne ie att J 2. fi RAID tovel 4 : Mein | shadows: | chemating [ Block Lever Merort ng ] e ¢ RATD Level 10 Nectty RAID 40 and RAID of WHand afk 6 Hand dick uw BATON ht Levee steipeig + Ecce ( exrvs Correction code) ba vss RALO level 3 3 byle level Stepping t eile petty RAID ‘Level 4: Bock Level ete { shyle pay RAID Level 5 + Block Level stlepn ingle dis}ributed eye e RAID Level % + Glock Level i double dicts butted 20

You might also like