Page 726 - StudyBook.pdf
P. 726

710    Chapter 12 • Operational and Organizational Security: Policies and Disaster Recovery

             connect to the servers over a slow connection. Even if a fast connection is used
             between sites, accessing data may be slower than if they had their own server at that
             location. In such cases, a decentralized approach is useful. Placing a server at
             external locations allows users to login faster and access specific data from the local
             server.
                 Another advantage of decentralization is fault tolerance. If all servers are in one
             room and that room is destroyed by fire or flood, everything is lost.When the
             servers are spread out across different locations, it is less likely that a catastrophe will
             befall all of them at the same time. If less serious problems occur, such as the link
             between branch offices and the main facility where servers are located, users will
             still be able to logon and access resources using the server at their branch office.
                 A problem with decentralized servers occurs when you have to perform certain
             tasks necessary to the security and maintenance of the system. For example, data on
             a server needs to be backed up, requiring tapes to be put in the backup’s tape drive.
             In other cases, a server may freeze and need to be rebooted. If the server is far
             enough away, this can leave users cut off from the network for great lengths of
             time.To deal with these issues, terminal services or remote control programs can be
             used to administer the server from across the network.Administrative authority can
             also be delegated to certain individuals in remote locations, so they have the ability
             to take care of such issues, and the necessary security clearance to physically access
             the servers.The person can be a contact person, serving as the eyes and ears at that
             location, informing the administrator of what is appearing on the server’s monitor
             when they cannot see it themselves.When incidents arise, the administrator can tell
             this person to remove connections to the server, reboot the machine, or other tasks
             that would otherwise require the administrator’s physical presence.
                 Physical security is another issue to consider when deciding on centralized or
             decentralized servers. Placing all servers in one location allows the administrator to
             better manage security for those machines. One large server room with locks pre-
             venting access to unauthorized persons is optimal. Unfortunately, the facilities avail-
             able at different locations may not provide the physical space for a secure server
             room. In such cases, servers should be locked in cabinets or closets.
                 In other situations, even closets may not be an option, leaving a less than secure
             environment for the machine(s).While this issue was discussed previously in
             Chapter 11, it is important to take such concerns into account when deciding
             whether to use a centralized or decentralized approach.
                 Centralized versus decentralized security can also apply to the management of a
             network.As mentioned above, some network OSes allow administrators to manage
             users across the network through a single interface. By making changes from one



          www.syngress.com
   721   722   723   724   725   726   727   728   729   730   731