12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IndexNumerics3DES 4Aaccess control list (ACL) 5, 13Advanced Encryption Standard(AES) 4, 12ANSI T11 6appliance-based encryption 22application-based encryption 21assessment 28, 9asymmetric cryptography 4attacksback door 16denial-of-service 16distributed DoS 16man-in-the-middle 16sniffing 16spoofing 17audit 28, 9audit trail 6AUTH policy 15authentication 18multi-factor 18Bback door attack 16biometrics 19false negative 19false positive 19block cipher 7<strong>Brocade</strong> 7500/7500E ExtensionSwitch 16<strong>Brocade</strong> Encryption Solution 7<strong>Brocade</strong> Encryption Switch 2<strong>Brocade</strong> FS8-18 Encryption Blade 4<strong>Brocade</strong> roles 11<strong>Brocade</strong> SAN Health Pro 9<strong>Brocade</strong> SAN Security Model 1buffer credits (BB credits) 10Business Continuity (BC) 15Business Continuity (BC) plan 8CCalifornia Senate Bill (SB) 1386 2CIA triad 2CIANA 3cipherblock 7cryptographic 3stream 8substitution 3transposition 3ciphertext 3cleartext 3Common Criteria (CC) 11Common Criteria evaluation levels13Converged Enhanced Ethernet (CEE)2core-edge topology 21countermeasure 6credit-based flow control 10cryptographic algorithm 3cryptographic cipher 3cryptosystem 3CSIR team (CSIRT) 27CTC (Crypto Target Container) 7Cyclic Redundancy Check (CRC) 4Securing Fibre Channel Fabrics 207

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!