Definition of Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

endpoint; Network Admission Control (NAC); host-based intrusion prevention system (HIPS); worm; virus; Trojan horse; denial-of-service attack; elevation of privileges; buffer overflow; heap overflow; authentication, authorization, and accounting (AAA); cryptography

This chapter covers the following topics:

Overview of SAN operations: This section examines the basics of storage-area network (SAN) operation. It looks at the benefits a SAN brings to the enterprise as a whole and explores the underlying technologies that make this an efficient solution for a large number of organizations with growing storage needs. This section also covers how to identify attacks focused on the SAN.

Implementing SAN security techniques:

With ever-increasing data storage needs, organizations also have to face the reality of securing this information both on the hard disk and in transit over the network. This section examines a variety of security mechanisms, such as Logical Unit Number (LUN) masking, SAN zoning, and port authentication, to explore what steps may be taken to safeguard data in a SAN environment.

0 0

Post a comment