23-01-2010, 08:31 PM
storage area network full report.doc (Size: 212 KB / Downloads: 638)
INTRODUCTION
The recent explosion in e-business activity and internet commerce has provided organization with unlimited opportunities for developing new information delivery channel. Data is today perceived to be the key asset for many organizations such as banking, stock exchange, government record etc. This has generated an explosive demand for data storage and this demand can be addressed by deploying SAN. The activity to share a single large storage device across many server or application has made SAN an attractive option in today’s market place.
As organization continue to broaden there reach to business partners and customers around the globe, they expose key IT system to a wider range of potential security threats. Today data theft, fraud, hacker attempts, and human error increasingly threaten security of information exchange within the enterprise and across the public networks, such as the internet. In order to protect the key data stored, storage networking venders are rapidly deploying and developing security frameworks that help ensure safe reliable data processing throughout a storage area networks(SAN).
The most common thing to remember about SAN security is that SAN is a network and is vulnerable to the same sorts of vulnerabilities and attacks that more conventional computers are. SAN resources can be protected by physical security and the hosts on the SAN should be expected to meet stringent security requirements. As SAN continue to grow, it will become a bigger target for malicious attackers. In this section we will examine the emergence and evolution of the fiber channel protocol in the context of storage network technology.
As organization continue to broaden there reach to business partners and customers around the globe, they expose key IT system to a wider range of potential security threats. Today data theft, fraud, hacker attempts, and human error increasingly threaten security of information exchange within the enterprise and across the public networks, such as the internet. In order to protect the key data stored, storage networking venders are rapidly deploying and developing security frameworks that help ensure safe reliable data processing throughout a storage area networks(SAN).
The most common thing to remember about SAN security is that SAN is a network and is vulnerable to the same sorts of vulnerabilities and attacks that more conventional computers are. SAN resources can be protected by physical security and the hosts on the SAN should be expected to meet stringent security requirements. As SAN continue to grow, it will become a bigger target for malicious attackers. In this section we will examine the emergence and evolution of the fiber channel protocol in the context of storage network technology.