System Administration and System Administrator's Role in Business Continuity

Author(s):  
Nijaz Bajgoric

Chapter IX focuses on the role of system administration as an IT-profession and system administrator as a person who does the administrative (managerial) activites on servers and server operating systems. If server goes down for any reason or server operating system crashes, in most cases it is up to this person to “recover” the server from the bad situation and make sure that business – critical applications continue to run and provide services to end users. HP-UX as a server operating system platform is selected in order to demonstrate most commonly used techniques and features that may lead to higher levels of system availability.

Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.


Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.


Author(s):  
Andrii Pryimak ◽  
Vasyl Karpinets ◽  
Yana Yaremchuk

It is known that with the growing popularity of blockchain and cryptocurrency technology, many people want to make money on it. As a result, hackers who use other people's resources for easy profit are becoming more active. There are many different tools available today to protect user’s personal computers from cryptojacking, but effective protection for server operating systems are still actual.This paper investigates the possibility of searching for unauthorized cryptocurrency mining processes by three parameters: search for suspicious processes by name, by binary signature and by connection to the mining pool.Based on the study, a method of automated search for unauthorized cryptocurrency mining in server OS containers was proposed, which consists of 5 main stages:1. Search for unauthorized cryptocurrency generation processes by process name.2. Search by binary signature.3. Search for a connection to a mining pool4. Detection of the process of unauthorized mining and stopping the container in which the mining process was detected.5. Notification of the system administrator about the detection of unauthorized cryptocurrency generation processes.It is worth noting that, unlike existing tools, the developed method searches for containers from the host virtual machine, so that there is no need to run a search in each of the containers, as it can be a large number of them and as a result reduce the load on the system.The block diagram of the application for the implementation of the proposed method was also described, as well as examples of stopping the container in which an unauthorized mining process was found and the corresponding message to the system administrator.In addition, a study of the speed of the proposed method was conducted. The results of the test showed a time of 2,585 seconds, which reflects the fast operation and the absence of additional overload on the system.


2018 ◽  
pp. 468-491
Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Nijaz Bajgoric

Server configurations described in Chapter V are operated by server operating systems. Server-based application software and business-critical applications are installed on these platforms. Taken together, they form what is called “server operating environment,” the hardware-operating system platform responsible for running business applications and keeping “business in business.” Chapter VI explains in more details server operating systems and their role in ensuring continuous computing and hence business continuity.


Author(s):  
Art Taylor ◽  
Lauren Eder

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but it is ultimately the computer operating system that is compromised as a result of these attacks. The computer operating system represents the last line of defense in our security chain. This final layer of defense and its core defense mechanisms of authentication, authorization, and auditing deserve closer scrutiny and review. This chapter will provide an exploratory, descriptive, and evaluative discussion of these security features in the widely used Windows and Linux operating systems.


Author(s):  
Art Taylor ◽  
Lauren Eder

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but it is ultimately the computer operating system that is compromised as a result of these attacks. The computer operating system represents the last line of defense in our security chain. This final layer of defense and its core defense mechanisms of authentication, authorization, and auditing deserve closer scrutiny and review. This chapter will provide an exploratory, descriptive, and evaluative discussion of these security features in the widely used Windows and Linux operating systems.


Owner ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 160
Author(s):  
Victorinus Laoli

One manifestation of the important role of banking in a region, as implemented by PT Bank Sumut, Gunungsitoli Branch, is to distribute loans for investment, consumption and working capital for the people in the area. The purpose of providing credit for banks is the return of credit that earns interest and can increase income to finance activities and business continuity. From the results of research conducted with this data collection technique, it shows that PT Bank Sumut has a number of loans from 2009 to 2014 which each year rises. From this study, it is also known that the rate of credit repayment has a positive influence on the level of profitability.


Sign in / Sign up

Export Citation Format

Share Document