12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security Modelssures must be taken according to company or industry guidelines, orregulations. Customers must be advised, and credit cards must be reissued,to prevent unauthorized use of the credit card information.AuthenticityThe origin or source of information can be spoofed or forged. Authenticityrefers to validating that information does in fact come from thesource claimed. Someone can forge an e-mail header to appear like itwas sent from someone else. Fields in a database can have incorrectinformation inserted into them.UtilityInformation has value only if it can be used. If a database file is corrupted,then it is no longer useful and fails the utility test. Dataencryption is a very useful method of protecting confidentiality, but ifthe key is lost the encrypted data is no longer useful since it will no longerbe readable. Utility is not the same as availability, but a breach inutility may result in a loss of availability.Securing Fibre Channel Fabrics 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!