12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ContentsChapter 4: Security Basics for Storage Professionals ..........................1Security Models ....................................................................................................2The CIA Triad .................................................................................................2CIANA .............................................................................................................3The Parkerian Hexad ....................................................................................4Types of Threats ....................................................................................................7Threats from Disasters .................................................................................7Technological Threats ...................................................................................8Threats from the Human Element ...............................................................9Protecting from External Threats ...............................................................10Protecting from Internal Threats ................................................................11Attacks .................................................................................................................15Preparing for an Attack ..............................................................................15Types of Attacks ..........................................................................................15Identification and Authentication ......................................................................18Authentication .............................................................................................18Biometrics ...................................................................................................19User Accounts and Passwords ...................................................................20Physical Security .................................................................................................21Information Disposal and Sanitization ..............................................................24Data Sanitization ........................................................................................24Electronic Data Shredding Methods .........................................................26Chapter Summary ...............................................................................................27Chapter 5: Elementary Cryptography .....................................................1Symmetric vs. Asymmetric Cryptography ............................................................4Symmetric Keys ............................................................................................4Asymmetric Keys ...........................................................................................4Hybrid Systems .............................................................................................5Cryptographic Algorithms .....................................................................................6Block Ciphers ................................................................................................7Stream Ciphers .............................................................................................8Hashing Algorithms ......................................................................................8Digital Signatures .........................................................................................9Modes of Operation ............................................................................................10DES/3DES ...................................................................................................11AES ..............................................................................................................12Diffie-Hellman .............................................................................................12RSA ..............................................................................................................13Digital Certificates ......................................................................................13PKI ...............................................................................................................13SSL ...............................................................................................................14IPSec ............................................................................................................15Key Management ................................................................................................15Trusted Key Exchange ................................................................................16Opaque Key Exchange ................................................................................17Chapter Summary ...............................................................................................18xSecuring Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!