Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
65 views
8 pages
Data Security 2
Data Security 2
Uploaded by
David Perez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Data Security 2 For Later
Download
Save
Save Data Security 2 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
65 views
8 pages
Data Security 2
Data Security 2
Uploaded by
David Perez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Data Security 2 For Later
Carousel Previous
Carousel Next
Download
Save
Save Data Security 2 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 8
Search
Fullscreen
UNIT 19 meric Bl Talo Consider these examples of computer disasters. How could {you prevent them or limit their effets? Compare answers within your group, 1. You open an email attachment which contains a very destructive 2. Someone guesses your password (the type of car you drive plus the day and month of your birth) and copies sensitive data 3 Your hard disk crashes and much of your data is lost permanently. 4 Someone walks into your computer lab and steals the memory chips from all the PCs. 5 Your backup tapes fall to restore property. Study this table of security measures to protect hardware and software. Which measures would prevent or limit the effects of the disasters in Task 1? nd quien. scan system Protect against Natural Disasters sal fra © Tes unctopile pratt networks wer suppis and ‘xem dimen Suge protect. acs, * Password protect programs and data with passwords which cracked hangs to pssvonth * Berg deta tall clock sysem, Use signature ‘erifton oe omeueseatiy devices to enue er uaboraton,13 Find words or phrases inthe table which mean: copies of changes to files made to reduce the risk of loss of, data software available fora short time on a free tral basis: if adopted a fee is payable tothe author cannot be disrupted or cut put at risk deciphered, worked out protect data by puttin it in a form only authorised users can Understand 2 combination of hardware and software to protect networks from unauthorised users ‘observe and record systematically ‘measuring physical characteristics such as distance between the eyes, at regular intervals: = + Mate incremental backups, which re copies of just changes136 UNIT39 ata Security 2 HEI atthe verbsin brackets the correct Form n this description of how smart cards work. Smart cards prevent unauthorised users ——." (aces) systems and permit authorised users..." (ave) accesso 0 wide range offecites. Some computers hae rar cardrenders r=? Glow youn (bu) things on the Web easy and Safely wth dial cash A smartcardcan alse send daa toa eedet via an antenna (Ci inside theca When the card comes within range the reader's rai signal. (reat) 2 Sigh carentn the antenna? (nus) the card (broadcast) information to the reader Which consinmn? (allow) the set for examply now" othr) money Wom an ATM or (ge) access toa system.UNIT 19 pata Secuty2 135 TREE vecite onthe relationship between these events. Then ink Them using structures from this and eater units 1 Ant-vitus program a Auser runs anti-virus software. b The software checks files for virus coding, 4 Coding is matched to a known virus in a virus database. ‘A message is displayed to the user that a virus has been found. fe Theser removes the virus or deletes the infected fie. ‘The virus cannot spread or cause further damage. xe recognition You approach a high-security network b Key features of your face are scanned, ¢ The system matches your features to a database record of authorised staff 4 Your identity is verified. e You can log on, f Your identity is not verified. You cannot use the system. Voice recognition Computers without keyboards will become more common These computers are voice-activated. The user wants to log on. She speaks to the computer It matches her voice to a database of voice patterns. The user has a cold or sore throat. She can use the system Stress and intonation patterns remain the same.136 UNIT39 pata Secutty 2 Study these ilstations fortwo forms of security scaning Write your own captions for each ofthe numbered points, Eye scanning Hand scanning. SeaningechaslogyUNIT 19 bats Secuty? 137 Backups Workin pairs, Aand 8. You each have details of one form ofbackip Explain to your partner how your frm of backup works, Make sure you understand the form of backup your partner has. sk for acation iTanythings unclear. Student A Your information is on page 188, Student B Your information ison page 194, Firewalls Stuy this éiagram ofa rewalled network system Welle descrintion of how i operates. You may nee to do some research on firewalls to supplement the diagram. Your description should answer these questions What is its function? What does it consist of How are the firewalls managed? How does it control outgoing communications? How does it prevent external attack?138 UNIT 19 Data Security | SPECIALIST READING | Find the answers to these questions inthe following text. 41 Name 3 areas of computing that companies rely on more and more. 2 What can intimidate even the most experienced network manager? 3. What 3 types of peripheral storage devices ‘do most companies rely on for backing up data and storing information? What typeof data-intensive aplication do companies ely more heavily on? 5 What has kept the SCSI bus from evolving rapidly? {6 What traditional LAN interface is mentioned inthe tex? 7 Name 2 drawbacks of NAS. 8 What type of server can be connected toa SAN? 9 Inhat 2 ways will @SAN lighten your server's workloa What types of cabling can be used with Fire Channel? 10 Pern a {As companies rely more and more on ecommerce, ‘online transaction processing and databases, the Smount of information that needs tae managed nd stored on network can intimidate even the most experienced of network managers While servers do a good job of storing data, their ‘capacity Is limited and they can become a bottleneck if too many users try to acess the same information intend, mast companies tly ‘on peripheral storage devices, such a tape bares, RAID disks and even opti storage systems. These devices are effective for backing {Up data online and storing large amounts of Information ua Sever farms increase in size and companies rely more heavy on data intensive applcauons Sch as multimedia the traditional storage mode Isnt qulte as useful. This s because acess to these peripheral devices can be slow, an might ‘ot always be possible for every use to easly and transparently access each storage device “The most basi way of expanding storage capacity ‘onthe network ito hang disk arays oF other Storage devices of servers, using the SCSI Interface or bus. ‘While Ss has been a workhorse over the years {or connecting peripherals ats relatively fast speed, distance limitations have kept this, Baricular bus Interface from evolving rapidly. ‘The SCSt standards puto bus length lint of| bout Gm on devices, While tis distance Timitation doesnt realy affect connecting storage devices directly toa sever, does Scverely restric placing RAID and tape bares A oer potats on the network. Enter the NAS ‘This s where the concept of Network Attached Storage (NAS) comes in, NAS Is simple In concept nd execution dik rays and eter storage desis onnect othe network through a traditional LAN Interface, such as Ethernet. Storage devices would thus atte to network hubs, mich the However, NAS does havea few drawbacks Furst, network bandweth places throughout limitations on the storage devices. Another dowside to NAS isthe lack of cohesion among Storage devices, While diskarays nd tape drives are on the LAN, managing the devices can Drove challenging, since they ae separate Entities and not Tegel hed togetner NAS has Its place asa viable storage arcnecture, but large companies need something more.and manage large amounts of information In = Hah performance envtronment now have another option the Sorage Area Network SAN) In SAN, storage devies such a Digital Linear Tapes (DLT) and RAID arrays ae connected 0 int Hibs Serves vine alee Interconnection, suchas Fibe Channel. “This Biatvepeed lnk creates separate external network, thas connected (0 the LAN, but as 35 an Independent entity This setup allows fr any tay communication ternative paths fram server wostorge device, Im other words Ifa particular server Is slow ot Completely unavalable, another seuvr on the Saivcam provide access the storage device, A SAW also makes i possible to mirar dat, Ss offer several advantages. Fist, they allow for the addition of bandwidth iio! bordening ‘he main LAN, SANS also ake It esler fo ona online Backups without uses fling te buanawiath pinch. When more storage Hs needed ditional drves do not nee tobe connected to A speti server: rater, they can simply be ade {ote slorge rework and accessed fam any point Anoser reason for the interest in SANS that a fe devices can be centrally managed. Instead of ‘managing the network ona per-deviee bass. Storage can be managed a singe ent ‘aking i ealer to deal with storage networks ‘hat could potently coasist of dozens or even hundreds of rervers and devices. ‘You can connect almost any modern server to 3 SAN, because SAN support hardare ad toltvare spans most PC mdrage and ‘maaframe platforms. cally 2 SAN wil lighten Your servers workload by offlaating many orage related server tasks to the SAN and by beter allocating storage resources to servers, “The most important piece of any SAW architecture Is the underlying network technology that dives Channel is emerging asthe technology of choice for SAN implementations Fibre Channel wa feveloped by ANSI in the early 1990s a8 means to transfer large amounts of dat very utcly Fre Channel's compatible wth SCS) IE and Link Encapsulation. and ican be used over [Upsate ana adapted om Doing te SAN thing by Roger Gann, Persosl Computer Wels, Oto" 3000 UNIT 19 oats Secnty2 139 Re-read the texto find the answers to these questions. 1 Note the advantages ofa SAN. 2 Matehthe items in Table Ath the satementsin Table 8, aS Fibre Channel © SAN 6 Miror Server farm £iskarray T” Storage area network |i Wiite copies of data to two disks atthe sametime i A large collection of computers that work together to provide services on a network Iv Network attached storage ¥ Aséetf interconnected disks vi_Atype of high speed interconnection ‘3 Using information from the text, mark the feliowing s Tue or False: 4 Inthe tracitional storage model, it is always possible for every user to access each storage device. Hanging storage devices off servers isthe most basic way of expanding storage capacity. The distance limitation of SCS ffets the direct connection of storage devices toa server 4 ASAN isnot usually connected toa LAN. fe All devices can be centrally managed ina SAN. Fast Etheret is becoming the most popular typeof interconnection for SANs.
You might also like
SAN Interview Questions and Answers
PDF
No ratings yet
SAN Interview Questions and Answers
12 pages
Nas / San: NAS - Network Attached Storage (Filer) SAN - Storage Area Network What Differentiates The Two?
PDF
No ratings yet
Nas / San: NAS - Network Attached Storage (Filer) SAN - Storage Area Network What Differentiates The Two?
63 pages
Unit V
PDF
No ratings yet
Unit V
13 pages
Difference Between Storage Area Network 2
PDF
No ratings yet
Difference Between Storage Area Network 2
11 pages
El Chin_Gon
PDF
No ratings yet
El Chin_Gon
133 pages
San Seminar
PDF
No ratings yet
San Seminar
13 pages
Storage Area Network (SAN)
PDF
No ratings yet
Storage Area Network (SAN)
81 pages
Storage Area Network (SAN)
PDF
No ratings yet
Storage Area Network (SAN)
81 pages
PROBLEM
PDF
No ratings yet
PROBLEM
3 pages
SAN VS NAS: What The HECK You Talking About???
PDF
No ratings yet
SAN VS NAS: What The HECK You Talking About???
9 pages
Storage Area Network (SAN)
PDF
No ratings yet
Storage Area Network (SAN)
81 pages
SAN
PDF
100% (1)
SAN
81 pages
Chapter 1 - San School
PDF
No ratings yet
Chapter 1 - San School
17 pages
Storage Basics: Storage Area Networks: Drew Bird Send Email More Articles
PDF
No ratings yet
Storage Basics: Storage Area Networks: Drew Bird Send Email More Articles
2 pages
Storage - NAS Vs SAN
PDF
No ratings yet
Storage - NAS Vs SAN
8 pages
SAN Vs NAS What Is The Difference
PDF
No ratings yet
SAN Vs NAS What Is The Difference
4 pages
SAN Fundamentals Study Guide
PDF
No ratings yet
SAN Fundamentals Study Guide
27 pages
I S A N: Mplementation OF Torage REA Etworks
PDF
No ratings yet
I S A N: Mplementation OF Torage REA Etworks
17 pages
Cat
PDF
No ratings yet
Cat
17 pages
Module - 1 (2)
PDF
No ratings yet
Module - 1 (2)
60 pages
White Paper: Storage Networking: Back To Basics
PDF
No ratings yet
White Paper: Storage Networking: Back To Basics
17 pages
NAVEDTRA 14224 Information Systems Technician Training Series, Module 03 - Network Communications
PDF
No ratings yet
NAVEDTRA 14224 Information Systems Technician Training Series, Module 03 - Network Communications
64 pages
Lo 2
PDF
No ratings yet
Lo 2
74 pages
San Nas
PDF
100% (1)
San Nas
44 pages
Data Communication &network: 2.2. Data Topologies 2.3. Data Switching 2.4. Types of Networking
PDF
No ratings yet
Data Communication &network: 2.2. Data Topologies 2.3. Data Switching 2.4. Types of Networking
13 pages
Guide To and Protoco/s Storage Area Networks Java - Rmi The Remote Method Invocation Guide
PDF
No ratings yet
Guide To and Protoco/s Storage Area Networks Java - Rmi The Remote Method Invocation Guide
2 pages
CS Notes FInal Term
PDF
No ratings yet
CS Notes FInal Term
16 pages
CHP 1
PDF
No ratings yet
CHP 1
10 pages
Lesson 3 - Secure Enterprise Architecture and Component
PDF
No ratings yet
Lesson 3 - Secure Enterprise Architecture and Component
82 pages
Module 3
PDF
No ratings yet
Module 3
42 pages
SAN Basic
PDF
No ratings yet
SAN Basic
44 pages
CH 2. Networking
PDF
No ratings yet
CH 2. Networking
14 pages
Teal Futuristic Technology Facebook Cover
PDF
No ratings yet
Teal Futuristic Technology Facebook Cover
24 pages
Computer Architecture Part 1
PDF
No ratings yet
Computer Architecture Part 1
24 pages
IBMredbooks IPstorageNetworking SG246240
PDF
No ratings yet
IBMredbooks IPstorageNetworking SG246240
320 pages
1110 0667 PDF
PDF
No ratings yet
1110 0667 PDF
5 pages
Introduction of Storage Area Network
PDF
No ratings yet
Introduction of Storage Area Network
14 pages
Security For The SAN Workgroup
PDF
No ratings yet
Security For The SAN Workgroup
11 pages
Network
PDF
No ratings yet
Network
19 pages
Introduction To Storage: Overview of The Storage Subsystem
PDF
No ratings yet
Introduction To Storage: Overview of The Storage Subsystem
33 pages
LO 2 - Install and Configure Peripherals To A Network
PDF
No ratings yet
LO 2 - Install and Configure Peripherals To A Network
49 pages
Enterprise Hardware
PDF
No ratings yet
Enterprise Hardware
2 pages
Computing
PDF
No ratings yet
Computing
12 pages
SAN EMC Clariion Foundations
PDF
No ratings yet
SAN EMC Clariion Foundations
119 pages
Friday Presentation New
PDF
No ratings yet
Friday Presentation New
19 pages
SCSI iSCSI RAID SAN FC
PDF
No ratings yet
SCSI iSCSI RAID SAN FC
74 pages
Storage Basics: The Storage Area Network
PDF
No ratings yet
Storage Basics: The Storage Area Network
8 pages
SAN Fundamentals
PDF
100% (2)
SAN Fundamentals
107 pages
8.1 computing presention
PDF
No ratings yet
8.1 computing presention
12 pages
DCN Discussion#1
PDF
No ratings yet
DCN Discussion#1
30 pages
Assignment Computer
PDF
No ratings yet
Assignment Computer
36 pages
4 - 1 Communicate With Colleagues, Work With Colleagues To Integrate-18!01!2024
PDF
No ratings yet
4 - 1 Communicate With Colleagues, Work With Colleagues To Integrate-18!01!2024
40 pages
Computer Networks: World Wide Web. It Runs On Top of The Internet and Presents A Model in Which Everything Looks
PDF
No ratings yet
Computer Networks: World Wide Web. It Runs On Top of The Internet and Presents A Model in Which Everything Looks
95 pages
Motherboard Manual Ga-P35-Ds3p e
PDF
No ratings yet
Motherboard Manual Ga-P35-Ds3p e
104 pages
SQL Cheat Sheet
PDF
100% (1)
SQL Cheat Sheet
21 pages
XML Schema - Data Types Q U Ick Reference
PDF
No ratings yet
XML Schema - Data Types Q U Ick Reference
2 pages
XSD1-1 0
PDF
No ratings yet
XSD1-1 0
2 pages
José Carlos Roncero Blanco: NAT Nat Estatico
PDF
No ratings yet
José Carlos Roncero Blanco: NAT Nat Estatico
12 pages
Operating Systems Jesus David Perez Delgado
PDF
No ratings yet
Operating Systems Jesus David Perez Delgado
1 page
Computer Architecture Jesus David Perez Delgado
PDF
No ratings yet
Computer Architecture Jesus David Perez Delgado
2 pages
Operating Systems
PDF
No ratings yet
Operating Systems
8 pages
Data Security 1
PDF
No ratings yet
Data Security 1
9 pages
Applications Programs
PDF
No ratings yet
Applications Programs
8 pages