1.2 Enterprise Storage

Description

Explain the security implementations associated with enterprise storage.
DJ Perrone
Flashcards by DJ Perrone, updated more than 1 year ago
DJ Perrone
Created by DJ Perrone about 7 years ago
13
1

Resource summary

Question Answer
What are some different storage types? - Virtual Storage - Cloud Storage - Data Warehousing - Data Archiving - SAN - NAS/FAS -VSAN
What are the different types of cloud storage? - Private Cloud - Public Cloud - Hybrid - Community
What is a private cloud? Owned and managed by one company for that company's use. - More control and security - More investment
What is a public cloud? Provided by a third party. Gives up control and some security. You share space with others.
What is a hybrid cloud? A combination of public and private.
What is a community cloud? Owned and managed by a group of organizations for a common purpose.
What are 3 service categories of cloud storage? - Infrastructure as a Service (IaaS) - Platform as a Service (PaaS) - Software as a Service (SaaS)
What is IaaS? Infrastructure as a Service - Vendor provides hardware or data center. - The company owns the software (operating systems / applications)
What is PaaS? Platform as a Service - Vendor provides hardware, operating system and infrastructure software - Company still manages system
What is SaaS? Software as a Service - Vendor provides entire solution. - Includes OS, software and applications
What is data warehousing? - Combining data from multiple databases or courses into a central location. - Data is processed into an understandable way
What are some security controls for data warehousing? - Implement: - when extracting data from its source. - for data when it rests in staging area. - when moving data from staging to warehouse - when moving data from warehouse to data mart.
What measures should be taken when using data warehousing applications? - Control metadata from being used interactively. - Monitor the data purging plan. - Reconcile data moved between the operations environment and the data warehousing.
What are the tiers of data archiving? - Tier 1: Production Data, HA - Tier 2: Disaster Recovers, Short-Term Retention, Dev/Test - Tier 3: Tape backups for long-term retention
What is a SAN? Storage Area Network. High capacity storage devices connected by high speed LAN using storage switch.
What are some advantages of SAN's? - Scalable - Available. Perform maintenance without taking servers offline. - Sharing is easier, isolated network. - Easier physical security.
What are some security issues with SAN's? - Fiber Channel provides no securiry against spoofing attacks. - Data is only as secure as OS
What is a NAS? Network Attached Storage
What are some protocols used by NAS' - NFS - CIFS - HTTP
What is a VSAN? Virtual Storage Area Network - Logical division of a SAN.
What are some common storage protocols? - iSCSI - Fiber Channel over Ethernet (FCoE) - NFS - CIFS
What is iSCSI? Internet Small Computer System Interface - IP networking storage standard. - Encapsulated SCSI commands in IP packet.
What is FCoE? Fiber Channel over Ethernet - Encapsulates Fiber Channel traffic within Ethernet frames. - Works at Layer 2
What is NFS/CIFS? Network Files System Common Internet File System
Which OS was NFS designed for? Unix/Linux
Which OS was CIFS designed for? Windows. - CIFS is a public version of Server Message Block (SMB)
What is multipathing? The use of multiple physical or virtual network paths to storage device. - Meets CIA triad while providing fault tolerance.
What is a snapshot A backup of data from point in time.
What is a full snapshot? A full backup.
What is a read only snapshot and when is it used? - Allows read write operations to continue - Used in mission critical environments.
What is a read-write/branching snapshot? Creates a point in time version of data.
What is deduplication? Removing redundant copies of same files.
What are 2 main methods of deduplication? - Post Process: Deduplication is performed after data is written to storage device. Doesn't degrade I/O. - In-Line: Performed as data enters disk in real time. Takes longer but reduces initial disk footprint.
What is a DDP? Dynamic Disk Pool - Distributes data across multiple disks. - A minimum of 11 drives must be used.
What are 2 elements of DDP? - D-Piece: Contiguous 512MB block on physical disk. - D-Stripe: Each D-Stripe is made up of 10 D-Pieces. 8 D-Pieces are used for data, 1 for parity and 1 for algorithm called Q-Value.
What is LUN Masking/Mapping Controlling asses to a LUN by hiding existence.
Where can you implement LUN Masking/Mapping? - Host Bus Adapter (HBA) - Storage Controller Level - There is greater security at the Storage Controller
What is Host Bus Adapter (HBA) Allocation? - Connects a computer to SAN - Have World Wide Names (WWN) that ID them like MAC addresses - Confining certain ports on the HBA to a certain zone.
What are different types of offside or multisite storage replication? - Asynchronous - Synchronous - Point-in-time
What is asynchronous replication? - Delayed replication - Less bandwidth that can handle high latency. - Used across longer distances.
What is synchronous replication? - Provides near real-time replication - More bandwidth - Cannot handle much latency
What is point-in-time replication? - Snapshot - Periodic replication but uses least bandwidth - Replicates only changes.
Show full summary Hide full summary

Similar

Private Storage Solution
lydia_ward
Input, output and storage devices
Mr A Esch
GCSE Computing: Hardware
Yasmin F
Memory & Storage
Ben Fellows
Business Unit 1 - Starting A Business
Dina Hamed
storage flashcards
Brodie McMeowface
Aseptically Packaged Food (ASP)
Nor Azmaria
PaaS Cloud Services
Liam-Beckwith
Leaving Certificate Business- Unit 2- Chapter 4- Enterprise
Ms. Foley
Applied Business Studies
10evansowe
Secondary Storage
rooke.j18