Malware, Backup, Windo Server
Malware, Backup, Windo Server
Malware, short for malicious software, refers to any software intentionally designed to cause
damage to a computer, server, client, or computer network. Here are some common types of
malware:
1. Virus: A type of malware that attaches itself to legitimate programs or files and spreads to
other programs and files when the infected program is executed. It can corrupt or delete data.
2. Worm: Similar to a virus, a worm can replicate itself and spread independently across
networks without needing to attach to a host file. Worms often exploit vulnerabilities in
operating systems or applications.
3. Trojan Horse: This type of malware disguises itself as legitimate software or is hidden within
legitimate software that has been tampered with. Once activated, it can give attackers access
to the infected system.
4. Ransomware: A type of malware that encrypts a victim's files and demands payment
(ransom) for the decryption key. It can cause significant disruption and financial loss.
5. Spyware: Software that secretly monitors user activity on a device and collects personal
information, such as login credentials and credit card numbers, without the user's consent.
7. Rootkit: A set of tools that allows an attacker to maintain access to a system while hiding
their presence. Rootkits can be used to control a computer remotely and can be very difficult to
detect.
8. Keylogger: A type of surveillance software that records keystrokes made by a user, often
used to capture sensitive information like passwords and credit card numbers.
10. Fileless Malware: This type of malware operates in memory rather than being installed on a
hard drive, making it harder to detect. It often exploits legitimate tools and processes.
Maintenance
Maintenance refers to the activities and processes involved in keeping equipment, systems, or
facilities in good working condition. It includes routine checks, repairs, and improvements to
ensure that assets operate efficiently and effectively, minimizing downtime and extending their
lifespan.
▎Types of Maintenance
1. Preventive Maintenance:
• Examples: Regular oil changes in vehicles, routine HVAC system checks, software updates,
and replacing worn-out parts based on a predetermined schedule.
2. Operational Maintenance:
• Definition: Operational maintenance includes routine tasks necessary for the daily
functioning of equipment or systems. It focuses on ensuring that operations run smoothly and
efficiently without significant downtime. This type of maintenance is often performed by the
operators or users of the equipment.
3. Corrective Maintenance:
• Definition: Corrective maintenance refers to the repairs and actions taken to fix equipment
or systems after a failure has occurred. This type of maintenance is reactive and aims to restore
functionality as quickly as possible.
▎Summary
• Corrective Maintenance: Reactive repairs made after a failure has occurred (fixing issues post-
failure).
Backup Operations
A backup operation refers to the process of creating copies of data to ensure that it can be
restored in the event of data loss, corruption, or disaster. Backups are essential for data
protection and recovery strategies in both personal and organizational contexts.
2. Incremental Backup:
• Only the data that has changed since the last backup (either full or incremental) is backed
up. This is more efficient in terms of time and storage.
• Advantages: Faster to perform and requires less storage space compared to full backups.
• Disadvantages: Restoration can be slower because it requires the last full backup plus all
incremental backups.
3. Differential Backup:
• Backs up all data that has changed since the last full backup. Unlike incremental backups,
differential backups do not reset after each backup.
• Advantages: Faster restoration than incremental backups because only the last full backup
and the most recent differential backup are needed.
• Disadvantages: Takes longer and requires more storage than incremental backups as time
goes on.
4. Mirror Backup:
• Creates an exact copy (or mirror) of the source data. It typically does not keep historical
versions of files; if a file is deleted from the source, it is also deleted from the backup.
• Advantages: Provides a real-time replica of data.
• Disadvantages: No versioning; once data is deleted from the source, it’s also gone from the
backup.
5. Continuous Data Protection (CDP):
• Data is backed up continuously in real-time or near-real-time, capturing every change as it
occurs.
• Advantages: Provides the most recent version of data at any point in time.
6. Cloud Backup:
• Data is backed up to a remote server or cloud storage service over the internet. This can
include any of the above types of backups.
• Advantages: Offsite storage provides protection against local disasters and facilitates easy
access from multiple locations.
7. Local Backup:
• Data is backed up to local storage devices such as external hard drives, USB drives, or
network-attached storage (NAS).
Each type of backup operation serves different needs and scenarios, and often a combination of
these methods is used to create a robust data protection strategy.
1. Active Directory (AD) – Manages users, computers, and security policies in a network.
2. File and Storage Services – Provides centralized file sharing and storage management.
3. Hyper-V – Supports virtualization to run multiple operating systems on one physical
machine.
4. Remote Desktop Services (RDS) – Allows remote access to applications and desktops.
5. Windows Defender and Security – Protects against malware, unauthorized access, and
cyber threats.
6. Failover Clustering – Ensures high availability and disaster recovery for critical
applications.
7. Internet Information Services (IIS) – A web server for hosting websites and
applications.
8. DNS & DHCP Services – Manages domain names and IP addresses in a network.