0% found this document useful (0 votes)
3 views

Malware, Backup, Windo Server

The document provides an overview of malware, detailing various types such as viruses, worms, ransomware, and spyware, each with distinct characteristics and impacts. It also discusses maintenance types including preventive, operational, and corrective maintenance, highlighting their roles in equipment upkeep. Additionally, it outlines backup operations, explaining different methods like full, incremental, and cloud backups, and concludes with a brief description of Windows Server and its key features.

Uploaded by

Moy Boon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Malware, Backup, Windo Server

The document provides an overview of malware, detailing various types such as viruses, worms, ransomware, and spyware, each with distinct characteristics and impacts. It also discusses maintenance types including preventive, operational, and corrective maintenance, highlighting their roles in equipment upkeep. Additionally, it outlines backup operations, explaining different methods like full, incremental, and cloud backups, and concludes with a brief description of Windows Server and its key features.

Uploaded by

Moy Boon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Malware

Malware, short for malicious software, refers to any software intentionally designed to cause
damage to a computer, server, client, or computer network. Here are some common types of
malware:

1. Virus: A type of malware that attaches itself to legitimate programs or files and spreads to
other programs and files when the infected program is executed. It can corrupt or delete data.

2. Worm: Similar to a virus, a worm can replicate itself and spread independently across
networks without needing to attach to a host file. Worms often exploit vulnerabilities in
operating systems or applications.

3. Trojan Horse: This type of malware disguises itself as legitimate software or is hidden within
legitimate software that has been tampered with. Once activated, it can give attackers access
to the infected system.

4. Ransomware: A type of malware that encrypts a victim's files and demands payment
(ransom) for the decryption key. It can cause significant disruption and financial loss.

5. Spyware: Software that secretly monitors user activity on a device and collects personal
information, such as login credentials and credit card numbers, without the user's consent.

6. Adware: Although sometimes considered less harmful, adware displays unwanted


advertisements on your device. It can also track user behavior for targeted advertising.

7. Rootkit: A set of tools that allows an attacker to maintain access to a system while hiding
their presence. Rootkits can be used to control a computer remotely and can be very difficult to
detect.

8. Keylogger: A type of surveillance software that records keystrokes made by a user, often
used to capture sensitive information like passwords and credit card numbers.

9. Botnet: A network of infected computers (bots) controlled by an attacker, often used to


perform coordinated attacks such as Distributed Denial of Service (DDoS) attacks.

10. Fileless Malware: This type of malware operates in memory rather than being installed on a
hard drive, making it harder to detect. It often exploits legitimate tools and processes.

Maintenance
Maintenance refers to the activities and processes involved in keeping equipment, systems, or
facilities in good working condition. It includes routine checks, repairs, and improvements to
ensure that assets operate efficiently and effectively, minimizing downtime and extending their
lifespan.

▎Types of Maintenance

1. Preventive Maintenance:

• Definition: Preventive maintenance involves scheduled inspections, servicing, and repairs


performed on equipment or systems to prevent unexpected failures and extend their
operational life. This type of maintenance is proactive, focusing on preventing issues before
they occur.

• Examples: Regular oil changes in vehicles, routine HVAC system checks, software updates,
and replacing worn-out parts based on a predetermined schedule.

2. Operational Maintenance:

• Definition: Operational maintenance includes routine tasks necessary for the daily
functioning of equipment or systems. It focuses on ensuring that operations run smoothly and
efficiently without significant downtime. This type of maintenance is often performed by the
operators or users of the equipment.

• Examples: Cleaning machinery, monitoring system performance, adjusting settings for


optimal operation, and conducting daily inspections.

3. Corrective Maintenance:

• Definition: Corrective maintenance refers to the repairs and actions taken to fix equipment
or systems after a failure has occurred. This type of maintenance is reactive and aims to restore
functionality as quickly as possible.

• Examples: Repairing a broken conveyor belt, fixing a malfunctioning piece of machinery, or


addressing software bugs after they have been identified.

▎Summary

• Preventive Maintenance: Proactive measures taken to prevent breakdowns (scheduled and


planned).

• Operational Maintenance: Daily tasks performed to ensure smooth operations (routine


checks and adjustments).

• Corrective Maintenance: Reactive repairs made after a failure has occurred (fixing issues post-
failure).
Backup Operations
A backup operation refers to the process of creating copies of data to ensure that it can be
restored in the event of data loss, corruption, or disaster. Backups are essential for data
protection and recovery strategies in both personal and organizational contexts.

Types of Backup Operations


1. Full Backup:
• A complete copy of all selected data is made. This type of backup is comprehensive but can
be time-consuming and requires significant storage space.
• Advantages: Simplifies the restore process since all data is contained in one backup.

• Disadvantages: Takes longer to perform and uses more storage.

2. Incremental Backup:
• Only the data that has changed since the last backup (either full or incremental) is backed
up. This is more efficient in terms of time and storage.
• Advantages: Faster to perform and requires less storage space compared to full backups.

• Disadvantages: Restoration can be slower because it requires the last full backup plus all
incremental backups.

3. Differential Backup:
• Backs up all data that has changed since the last full backup. Unlike incremental backups,
differential backups do not reset after each backup.
• Advantages: Faster restoration than incremental backups because only the last full backup
and the most recent differential backup are needed.
• Disadvantages: Takes longer and requires more storage than incremental backups as time
goes on.

4. Mirror Backup:
• Creates an exact copy (or mirror) of the source data. It typically does not keep historical
versions of files; if a file is deleted from the source, it is also deleted from the backup.
• Advantages: Provides a real-time replica of data.

• Disadvantages: No versioning; once data is deleted from the source, it’s also gone from the
backup.
5. Continuous Data Protection (CDP):
• Data is backed up continuously in real-time or near-real-time, capturing every change as it
occurs.
• Advantages: Provides the most recent version of data at any point in time.

• Disadvantages: Requires significant storage and can be resource-intensive.

6. Cloud Backup:
• Data is backed up to a remote server or cloud storage service over the internet. This can
include any of the above types of backups.

• Advantages: Offsite storage provides protection against local disasters and facilitates easy
access from multiple locations.

• Disadvantages: Dependent on internet connectivity and can incur ongoing costs.

7. Local Backup:

• Data is backed up to local storage devices such as external hard drives, USB drives, or
network-attached storage (NAS).

• Advantages: Fast access and recovery times.

• Disadvantages: Vulnerable to physical damage or theft.

Each type of backup operation serves different needs and scenarios, and often a combination of
these methods is used to create a robust data protection strategy.

What is Windows Server?


Windows Server is a server operating system (OS) developed by Microsoft, designed
specifically for managing and supporting enterprise-level IT environments, such as networks,
applications, databases, and security services.

Key Features of Windows Server:

1. Active Directory (AD) – Manages users, computers, and security policies in a network.
2. File and Storage Services – Provides centralized file sharing and storage management.
3. Hyper-V – Supports virtualization to run multiple operating systems on one physical
machine.
4. Remote Desktop Services (RDS) – Allows remote access to applications and desktops.
5. Windows Defender and Security – Protects against malware, unauthorized access, and
cyber threats.
6. Failover Clustering – Ensures high availability and disaster recovery for critical
applications.
7. Internet Information Services (IIS) – A web server for hosting websites and
applications.
8. DNS & DHCP Services – Manages domain names and IP addresses in a network.

Popular Versions of Windows Server:

 Windows Server 2012 / 2012 R2


 Windows Server 2016
 Windows Server 2019
 Windows Server 2022 (Latest version)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy