Reading Room

Backup Strategies

Featuring 6 Papers as of May 7, 2010

  • Online Backup: Worth the Risk? Steve Strom - May 7, 2010

    The sheer quantity of digital data, and the rate at which that data is growing, is almost beyond comprehension. This explosion of all things digital recordings, graphics, documents, video, and other forms has led to a staggering need to manage and account for that data. According to a report issued by EMC, the digital universe in 2007 was an overwhelming 281 exabytes in size (Gantz, et al.). Yet according to that same report, the digital universe is growing at such a phenomenal pace that by the year 2011, it will be 10 times the size it was in 2006 (Gantz, et al.)!

  • Fibre Channel Storage Area Networks: An Analysis From A Security Perspective Jose Pico - October 9, 2008

    The objective of this work is simple: analyze what can be done to attack a storage area network using the Fibre Channel protocol weaknesses, evaluate what are the real possibilities to perform such attacks and study what should have been done to avoid the associated threats and to mitigate the risks.

  • Veritas Volume Manager and a Storage Area Network Joseph Bell - May 5, 2005

    This paper will discuss the task of installing, configuring and securing Veritas Volume Manager (VxVM)

  • Centralized Backups Michael Gallagher - October 31, 2003

    When considering a complex backup system a company should review all of the backup requirements and choose the package that best suits their needs.

  • Electronic Data Retention Policy Brian Wrozek - October 31, 2003

    This paper addresses data retention policies.

  • Security Considerations for Enterprise Level Backups Scott Parrish - October 31, 2003

    This paper addresses the need for backing up data - an essential security measure in today's computing environment.

Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact

All papers are copyrighted. No re-posting or distribution of papers is permitted.

Masters This paper was created by a SANS Technology Institute student as part of their Master's curriculum.