12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IndexDdata cleaning algorithms 26data disposal 24Data Encryption Standard (DES) 4,11data purging 26data sanitization 24data-at-rest 18DataFort compatibility mode 14data-in-flight 18decryption 3Defense Information SystemsAgency (DISA) 13DEK cluster 11denial-of-service (DoS) attack 3, 16device access control 5Device Connection Control (DCC)policy 6, 3DH-CHAP (Diffie Hellman-ChallengeHandshake AuthenticationProtocol) 5, 12digital certificate 13digital signature 9direct-attached storage (DAS) 1Disaster Recovery (DR) 15Disaster Recovery (DR) plan 8disposal, data 24distributed DoS (DDoS) attack 16DMZ (demilitarized zone) 4, 1DoS attack 3dual-fabric architecture 17Dynamic Load Sharing (DLS) 15Dynamic Path Selection (DPS) 15EE_Port 8encryptionappliance-based 22application-based 21fabric-based 22host-based 23storage-based 23enterprise-class platforms 7evaluation assurance level (EAL) 12exploit 6extended port 8external threat 10FF_Port 8fabric configuration server (FCS)policy 18fabric management 18fabric port 8Fabric Shortest Path First (FSPF) 13fabric-based encryption 22false negative (biometrics, type IIerror) 19false positive (biometrics, type Ierror) 19FC backbone 7FC director 7FC protocolarbitrated loop 2FCS policy 3FC-SP (Fibre Channel-SecurityProtocol) 12Federal Information SecurityManagement Act (FISMA) 14Fibre Channel over Ethernet (FCoE)1, 2Fibre Channel over IP (FCIP) 1Fibre Channel ports 8Fibre Channel Routing (FCR) 16FIPS 140-2 9FIPS 140-2 Level 2 20FIPS-mode 20first-time encryption (FTE) 8flow control 10credit based 10full-mesh topology 19Ggigabit interface converter (GBIC) 4Gramm-Leach-Bliley Act (GLBA) 7gzip 2Hhackers 2, 14High Availability (HA) cluster 10HIPAA (Health Insurance Portabilityand Accountability Act) 6Host Bus Adapter (HBA) 3host-based encryption 23HTTPS 20208 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!