0 ratings0% found this document useful (0 votes) 73 views8 pagesData Security 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
UNIT 19
meric Bl Talo
Consider these examples of computer disasters. How could
{you prevent them or limit their effets? Compare answers within
your group,
1. You open an email attachment which contains a very destructive
2. Someone guesses your password (the type of car you drive plus
the day and month of your birth) and copies sensitive data
3 Your hard disk crashes and much of your data is lost
permanently.
4 Someone walks into your computer lab and steals the memory
chips from all the PCs.
5 Your backup tapes fall to restore property.
Study this table of security measures to protect hardware and
software. Which measures would prevent or limit the effects of the
disasters in Task 1?
nd quien.
scan system
Protect against
Natural Disasters
sal fra © Tes unctopile
pratt networks wer suppis and
‘xem dimen Suge protect.
acs,
* Password protect
programs and data with
passwords which
cracked
hangs to pssvonth
* Berg deta
tall clock
sysem,
Use signature
‘erifton oe
omeueseatiy
devices to enue er
uaboraton,13
Find words or phrases inthe table which mean:
copies of changes to files made to reduce the risk of loss of,
data
software available fora short time on a free tral basis: if
adopted a fee is payable tothe author
cannot be disrupted or cut
put at risk
deciphered, worked out
protect data by puttin it in a form only authorised users can
Understand
2 combination of hardware and software to protect networks
from unauthorised users
‘observe and record systematically
‘measuring physical characteristics such as distance between
the eyes,
at regular intervals:
=
+ Mate incremental
backups, which re
copies of just changes136 UNIT39 ata Security 2
HEI atthe verbsin brackets the correct Form n this description
of how smart cards work.
Smart cards prevent unauthorised users ——." (aces) systems
and permit authorised users..." (ave) accesso 0 wide
range offecites. Some computers hae rar cardrenders
r=? Glow youn (bu) things on the Web easy and
Safely wth dial cash A smartcardcan alse send daa toa eedet
via an antenna (Ci inside theca When the card
comes within range the reader's rai signal. (reat) 2
Sigh carentn the antenna? (nus) the card
(broadcast) information to the reader Which consinmn? (allow) the
set for examply now" othr) money Wom an ATM or
(ge) access toa system.UNIT 19 pata Secuty2 135
TREE vecite onthe relationship between these events. Then ink
Them using structures from this and eater units
1
Ant-vitus program
a Auser runs anti-virus software.
b The software checks files for virus coding,
4
Coding is matched to a known virus in a virus database.
‘A message is displayed to the user that a virus has been
found.
fe Theser removes the virus or deletes the infected fie.
‘The virus cannot spread or cause further damage.
xe recognition
You approach a high-security network
b Key features of your face are scanned,
¢ The system matches your features to a database record of
authorised staff
4 Your identity is verified.
e You can log on,
f Your identity is not verified.
You cannot use the system.
Voice recognition
Computers without keyboards will become more common
These computers are voice-activated.
The user wants to log on.
She speaks to the computer
It matches her voice to a database of voice patterns.
The user has a cold or sore throat.
She can use the system
Stress and intonation patterns remain the same.136 UNIT39 pata Secutty 2
Study these ilstations fortwo forms of security scaning
Write your own captions for each ofthe numbered points,
Eye scanning
Hand scanning.
SeaningechaslogyUNIT 19 bats Secuty? 137
Backups Workin pairs, Aand 8. You each have details of one
form ofbackip Explain to your partner how your frm of backup
works, Make sure you understand the form of backup your partner
has. sk for acation iTanythings unclear.
Student A Your information is on page 188,
Student B Your information ison page 194,
Firewalls Stuy this éiagram ofa rewalled network system
Welle descrintion of how i operates. You may nee to do some
research on firewalls to supplement the diagram. Your description
should answer these questions
What is its function?
What does it consist of
How are the firewalls managed?
How does it control outgoing communications?
How does it prevent external attack?138 UNIT 19 Data Security
| SPECIALIST READING |
Find the answers to these questions inthe
following text.
41 Name 3 areas of computing that companies
rely on more and more.
2 What can intimidate even the most
experienced network manager?
3. What 3 types of peripheral storage devices
‘do most companies rely on for backing up
data and storing information?
What typeof data-intensive aplication do
companies ely more heavily on?
5 What has kept the SCSI bus from evolving
rapidly?
{6 What traditional LAN interface is mentioned
inthe tex?
7 Name 2 drawbacks of NAS.
8 What type of server can be connected toa
SAN?
9 Inhat 2 ways will @SAN lighten your
server's workloa
What types of cabling can be used with
Fire Channel?
10
Pern
a
{As companies rely more and more on ecommerce,
‘online transaction processing and databases, the
Smount of information that needs tae managed
nd stored on network can intimidate even the
most experienced of network managers
While servers do a good job of storing data, their
‘capacity Is limited and they can become a
bottleneck if too many users try to acess the
same information intend, mast companies tly
‘on peripheral storage devices, such a tape
bares, RAID disks and even opti storage
systems. These devices are effective for backing
{Up data online and storing large amounts of
Information
ua Sever farms increase in size and companies
rely more heavy on data intensive applcauons
Sch as multimedia the traditional storage mode
Isnt qulte as useful. This s because acess to
these peripheral devices can be slow, an might
‘ot always be possible for every use to easly
and transparently access each storage device
“The most basi way of expanding storage capacity
‘onthe network ito hang disk arays oF other
Storage devices of servers, using the SCSI
Interface or bus.
‘While Ss has been a workhorse over the years
{or connecting peripherals ats relatively fast
speed, distance limitations have kept this,
Baricular bus Interface from evolving rapidly.
‘The SCSt standards puto bus length lint of|
bout Gm on devices, While tis distance
Timitation doesnt realy affect connecting
storage devices directly toa sever, does
Scverely restric placing RAID and tape bares
A oer potats on the network.
Enter the NAS
‘This s where the concept of Network Attached
Storage (NAS) comes in, NAS Is simple In concept
nd execution dik rays and eter storage desis
onnect othe network through a traditional LAN
Interface, such as Ethernet. Storage devices
would thus atte to network hubs, mich the
However, NAS does havea few drawbacks
Furst, network bandweth places throughout
limitations on the storage devices. Another
dowside to NAS isthe lack of cohesion among
Storage devices, While diskarays nd tape
drives are on the LAN, managing the devices can
Drove challenging, since they ae separate
Entities and not Tegel hed togetner NAS has
Its place asa viable storage arcnecture, but
large companies need something more.and manage large amounts of information In =
Hah performance envtronment now have
another option the Sorage Area Network SAN)
In SAN, storage devies such a Digital Linear
Tapes (DLT) and RAID arrays ae connected 0
int Hibs Serves vine alee
Interconnection, suchas Fibe Channel.
“This Biatvepeed lnk creates separate external
network, thas connected (0 the LAN, but as 35
an Independent entity
This setup allows fr any tay communication
ternative paths fram server wostorge device,
Im other words Ifa particular server Is slow ot
Completely unavalable, another seuvr on the
Saivcam provide access the storage device, A
SAW also makes i possible to mirar dat,
Ss offer several advantages. Fist, they allow
for the addition of bandwidth iio! bordening
‘he main LAN, SANS also ake It esler fo
ona online Backups without uses fling te
buanawiath pinch. When more storage Hs needed
ditional drves do not nee tobe connected to
A speti server: rater, they can simply be ade
{ote slorge rework and accessed fam any point
Anoser reason for the interest in SANS that a
fe devices can be centrally managed. Instead of
‘managing the network ona per-deviee bass.
Storage can be managed a singe ent
‘aking i ealer to deal with storage networks
‘hat could potently coasist of dozens or even
hundreds of rervers and devices.
‘You can connect almost any modern server to 3
SAN, because SAN support hardare ad
toltvare spans most PC mdrage and
‘maaframe platforms. cally 2 SAN wil lighten
Your servers workload by offlaating many
orage related server tasks to the SAN and by
beter allocating storage resources to servers,
“The most important piece of any SAW architecture
Is the underlying network technology that dives
Channel is emerging asthe technology of choice
for SAN implementations Fibre Channel wa
feveloped by ANSI in the early 1990s a8 means
to transfer large amounts of dat very utcly
Fre Channel's compatible wth SCS) IE
and Link Encapsulation. and ican be used over
[Upsate ana adapted om Doing te SAN thing by
Roger Gann, Persosl Computer Wels, Oto" 3000
UNIT 19 oats Secnty2 139
Re-read the texto find the answers to
these questions.
1 Note the advantages ofa SAN.
2 Matehthe items in Table Ath the
satementsin Table 8,
aS
Fibre Channel
© SAN
6 Miror
Server farm
£iskarray
T” Storage area network
|i Wiite copies of data to two disks atthe
sametime
i A large collection of computers that work
together to provide services on a network
Iv Network attached storage
¥ Aséetf interconnected disks
vi_Atype of high speed interconnection
‘3 Using information from the text, mark the
feliowing s Tue or False:
4 Inthe tracitional storage model, it
is always possible for every user to
access each storage device.
Hanging storage devices off servers
isthe most basic way of expanding
storage capacity.
The distance limitation of SCS ffets
the direct connection of storage devices
toa server
4 ASAN isnot usually connected toa LAN.
fe All devices can be centrally managed
ina SAN.
Fast Etheret is becoming the most
popular typeof interconnection for
SANs.