Get an iPad with Online Courses Now!

Reading Room

Backup Strategies

Featuring 6 Papers as of May 7, 2010

Click Here

  • Online Backup: Worth the Risk? by Steve Strom - May 7, 2010 

    The sheer quantity of digital data, and the rate at which that data is growing, is almost beyond comprehension. This explosion of all things digital recordings, graphics, documents, video, and other forms has led to a staggering need to manage and account for that data. According to a report issued by EMC, the digital universe in 2007 was an overwhelming 281 exabytes in size (Gantz, et al.). Yet according to that same report, the digital universe is growing at such a phenomenal pace that by the year 2011, it will be 10 times the size it was in 2006 (Gantz, et al.)!

  • Fibre Channel Storage Area Networks: An Analysis From A Security Perspective by Jose Pico - October 9, 2008 

    The objective of this work is simple: analyze what can be done to attack a storage area network using the Fibre Channel protocol weaknesses, evaluate what are the real possibilities to perform such attacks and study what should have been done to avoid the associated threats and to mitigate the risks.

  • Veritas Volume Manager and a Storage Area Network by Joseph Bell - May 5, 2005 

    This paper will discuss the task of installing, configuring and securing Veritas Volume Manager (VxVM)

  • Security Considerations for Enterprise Level Backups by Scott Parrish - August 30, 2001 

    This paper addresses the need for backing up data - an essential security measure in today's computing environment.

  • Electronic Data Retention Policy by Brian Wrozek - August 15, 2001 

    This paper addresses data retention policies.

  • Centralized Backups by Michael Gallagher - August 11, 2001 

    When considering a complex backup system a company should review all of the backup requirements and choose the package that best suits their needs.

Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.

All papers are copyrighted. No re-posting or distribution of papers is permitted.

Masters - This paper was created by a SANS Technology Institute student as part of their Master's curriculum.