CHAPTER 36
SECURING STORED DATA
David J. Johnson, Nicholas Takacs, and Jennifer Hadley
36.1 INTRODUCTION TO SECURING STORED DATA
36.1.1 Security Basics for Storage Administrators
36.1.4 Out-of-Band and In-Band Storage Management
36.1.5 File System Access Controls
36.1.6 Backup and Restore System Controls
36.1.7 Protecting Management Interfaces
36.2 FIBER CHANNEL WEAKNESS AND EXPLOITS
36.2.1 Man-in-the-Middle Attacks
36.3 NFS WEAKNESS AND EXPLOITS
36.3.1 User and File Permissions
36.4.2 Rogue or Counterfeit Hosts
36.5.3 Volume Encryption and Encrypted File Systems
36.5.5 Vulnerability of Volume, File System, and Full Disk Encryption
36.1 INTRODUCTION TO SECURING STORED DATA.
This chapter reviews methods of securing data stored on nonvolatile media. Nonvolatile media include magnetic disks and their (hard) drives, compact discs (CDs), and digital video disks (DVDs) with their optical drives, and flash drives (also known as USB drives, flash disks, and memory keys). Volatile storage devices, which are not covered in this chapter, include random access memory (RAM) ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.