CHAPTER 8

Security

In this chapter, you will learn how to

•   Control access to storage resources

•   Explain how encryption is used to protect the confidentiality of data

•   Manage the visibility of storage used on the network or fabric

Chapter 7 discussed how the widespread availability of networks, infrastructure, and applications has lulled us as consumers into a false sense of security. In fact, these systems are double-edged swords. On one hand, they are marvelous innovations that simplify our lives by allowing us to complete complex transactions from a variety of devices. On the other, they are potentially dangerous portals for cybercrime. Many trust their most personal transactions—prescriptions, medical appointments, banking, dating, ...

Get SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.