12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: Security Basics for Storage ProfessionalsCommon Security TermsAsset. Any item having value such as an IT system, data, personnel,or hardware.Attack. The act of compromising or breaching the security of anasset.Security threat. A person or event that has the potential to causeharm, including an employee, malware (software used to harm ITsystems), or a natural disaster.Security vulnerability. A flaw or defect in an asset that can allow anattacker to appropriate, gain control, or otherwise prevent the systems'owner from using the system as intended.Risk. The likelihood or probability that an asset will be compromised,lost, or destroyed. A risk can be accepted, mitigated,transferred, or ignored. If the value of the asset is of little value orthe probability of it being attacked is low, then the risk can beaccepted or tolerated. Risks can be mitigated by implementing controlsand countermeasures to reduce the risk. The risk can betransferred to another entity such as an insurance company or anoutsourcing firm. Finally, a risk can simply be ignored which cancause a new risk in itself-remember security through obscurity?Exploit. Methods and techniques used to take advantage of securityvulnerability to perform an attack on an asset. For example, acomputer virus exploits flaws in an operating system to attack thecomputer system.Countermeasure. Techniques and tools implemented to protectassets or mitigate risks associated with an attack.Controls. Measures taken to avoid, counteract, and protect againstsecurity risks against an asset.Preventive measure. Similar to a countermeasure but usually nontechnicalsuch as policies, procedures, training, and awareness.Audit trail. Logging mechanism that tracks user and event activityon a system.50 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!