SECURING FIBRE CHANNEL FABRICS - Brocade
SECURING FIBRE CHANNEL FABRICS - Brocade
SECURING FIBRE CHANNEL FABRICS - Brocade
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
ContentsChapter 4: Security Basics for Storage Professionals ..........................1Security Models ....................................................................................................2The CIA Triad .................................................................................................2CIANA .............................................................................................................3The Parkerian Hexad ....................................................................................4Types of Threats ....................................................................................................7Threats from Disasters .................................................................................7Technological Threats ...................................................................................8Threats from the Human Element ...............................................................9Protecting from External Threats ...............................................................10Protecting from Internal Threats ................................................................11Attacks .................................................................................................................15Preparing for an Attack ..............................................................................15Types of Attacks ..........................................................................................15Identification and Authentication ......................................................................18Authentication .............................................................................................18Biometrics ...................................................................................................19User Accounts and Passwords ...................................................................20Physical Security .................................................................................................21Information Disposal and Sanitization ..............................................................24Data Sanitization ........................................................................................24Electronic Data Shredding Methods .........................................................26Chapter Summary ...............................................................................................27Chapter 5: Elementary Cryptography .....................................................1Symmetric vs. Asymmetric Cryptography ............................................................4Symmetric Keys ............................................................................................4Asymmetric Keys ...........................................................................................4Hybrid Systems .............................................................................................5Cryptographic Algorithms .....................................................................................6Block Ciphers ................................................................................................7Stream Ciphers .............................................................................................8Hashing Algorithms ......................................................................................8Digital Signatures .........................................................................................9Modes of Operation ............................................................................................10DES/3DES ...................................................................................................11AES ..............................................................................................................12Diffie-Hellman .............................................................................................12RSA ..............................................................................................................13Digital Certificates ......................................................................................13PKI ...............................................................................................................13SSL ...............................................................................................................14IPSec ............................................................................................................15Key Management ................................................................................................15Trusted Key Exchange ................................................................................16Opaque Key Exchange ................................................................................17Chapter Summary ...............................................................................................18xSecuring Fibre Channel Fabrics