Featuring 6 Papers as of May 7, 2010
Online Backup: Worth the Risk?
Steve Strom - May 7, 2010
The sheer quantity of digital data, and the rate at which that data is growing, is almost beyond comprehension. This explosion of all things digital recordings, graphics, documents, video, and other forms has led to a staggering need to manage and account for that data. According to a report issued by EMC, the digital universe in 2007 was an overwhelming 281 exabytes in size (Gantz, et al.). Yet according to that same report, the digital universe is growing at such a phenomenal pace that by the year 2011, it will be 10 times the size it was in 2006 (Gantz, et al.)!
Fibre Channel Storage Area Networks: An Analysis From A Security Perspective
Jose Pico - October 9, 2008
The objective of this work is simple: analyze what can be done to attack a storage area network using the Fibre Channel protocol weaknesses, evaluate what are the real possibilities to perform such attacks and study what should have been done to avoid the associated threats and to mitigate the risks.
Veritas Volume Manager and a Storage Area Network
Joseph Bell - May 5, 2005
This paper will discuss the task of installing, configuring and securing Veritas Volume Manager (VxVM)
Michael Gallagher - October 31, 2003
When considering a complex backup system a company should review all of the backup requirements and choose the package that best suits their needs.
Electronic Data Retention Policy
Brian Wrozek - October 31, 2003
This paper addresses data retention policies.
Security Considerations for Enterprise Level Backups
Scott Parrish - October 31, 2003
This paper addresses the need for backing up data - an essential security measure in today's computing environment.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.