12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security Modelshave enacted such legislation. “Chapter 9: Compliance and Storage”starting on page 155, discusses compliance and breach disclosurelaws in greater detail.Confidentiality of electronic information is usually accomplished usingcryptographic methods such as encryption of data-at-rest or data-inflight(see “Chapter 5: Elementary Cryptography” starting on page 73).Authentication methods and access controls are other methods usedto address the confidentiality issue.IntegrityData integrity ensures the accuracy and consistency of electronic informationto provide an assurance that the information has not beenmodified, deleted, destroyed, or tampered with in any way. For example,it is important to ensure data integrity to prevent attackers frommodifying data by inserting unwanted code into an application, or todelete pieces of information before they are stored on a disk.Integrity verification is generally achieved using methods such ashashing algorithms and check sums. These methods are describedextensively in Chapter 5.AvailabilityOrganizations have become highly dependent on their computer systemsand any loss of availability of critical applications can have farreachingand direct repercussions on the company's livelihood. Maintainingavailability of applications, and particularly to the data used bythese applications, has become essential. High availability (HA), clustering,and fault-tolerant systems are examples of technology used tomaintain application availability. Disk mirroring, RAID (redundant arrayof independent disks), and remote data replication are used to maintainavailability of data stored on disks. Software and specializedappliances such as anti-virus, anti-malware, anti-spam, and intrusiondetection systems, can prevent attackers from creating a denial-of-service(DoS) attack.CIANAThis model expands the basic CIA model by adding two more securityelements: non-repudiation and authentication. It is most often used inInformation Assurance, which is primarily used by the military. Thismodel is taught as part of a course to reach the NSTISS (NationalSecurity Telecommunications and Information System Security) 4011Certification in the US.Securing Fibre Channel Fabrics 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!