SAN Security
Abstract
One thing to consider is that the most probable avenue of attack in a storage area network (SAN) is through the hosts connected to the SAN. There are potentially thousands of host, application, and operating system–specific security considerations that are beyond the scope of this chapter but should be followed as your systems and application administrators properly configure their owned devices.
Information security is an aspect of security that seeks to protect data confidentiality, data integrity, and access to the data, is an established commercial sector with a wide ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.