You are on page 1of 8
UNIT 19 meric Bl Talo Consider these examples of computer disasters. How could {you prevent them or limit their effets? Compare answers within your group, 1. You open an email attachment which contains a very destructive 2. Someone guesses your password (the type of car you drive plus the day and month of your birth) and copies sensitive data 3 Your hard disk crashes and much of your data is lost permanently. 4 Someone walks into your computer lab and steals the memory chips from all the PCs. 5 Your backup tapes fall to restore property. Study this table of security measures to protect hardware and software. Which measures would prevent or limit the effects of the disasters in Task 1? nd quien. scan system Protect against Natural Disasters sal fra © Tes unctopile pratt networks wer suppis and ‘xem dimen Suge protect. acs, * Password protect programs and data with passwords which cracked hangs to pssvonth * Berg deta tall clock sysem, Use signature ‘erifton oe omeueseatiy devices to enue er uaboraton, 13 Find words or phrases inthe table which mean: copies of changes to files made to reduce the risk of loss of, data software available fora short time on a free tral basis: if adopted a fee is payable tothe author cannot be disrupted or cut put at risk deciphered, worked out protect data by puttin it in a form only authorised users can Understand 2 combination of hardware and software to protect networks from unauthorised users ‘observe and record systematically ‘measuring physical characteristics such as distance between the eyes, at regular intervals: = + Mate incremental backups, which re copies of just changes 136 UNIT39 ata Security 2 HEI atthe verbsin brackets the correct Form n this description of how smart cards work. Smart cards prevent unauthorised users ——." (aces) systems and permit authorised users..." (ave) accesso 0 wide range offecites. Some computers hae rar cardrenders r=? Glow youn (bu) things on the Web easy and Safely wth dial cash A smartcardcan alse send daa toa eedet via an antenna (Ci inside theca When the card comes within range the reader's rai signal. (reat) 2 Sigh carentn the antenna? (nus) the card (broadcast) information to the reader Which consinmn? (allow) the set for examply now" othr) money Wom an ATM or (ge) access toa system. UNIT 19 pata Secuty2 135 TREE vecite onthe relationship between these events. Then ink Them using structures from this and eater units 1 Ant-vitus program a Auser runs anti-virus software. b The software checks files for virus coding, 4 Coding is matched to a known virus in a virus database. ‘A message is displayed to the user that a virus has been found. fe Theser removes the virus or deletes the infected fie. ‘The virus cannot spread or cause further damage. xe recognition You approach a high-security network b Key features of your face are scanned, ¢ The system matches your features to a database record of authorised staff 4 Your identity is verified. e You can log on, f Your identity is not verified. You cannot use the system. Voice recognition Computers without keyboards will become more common These computers are voice-activated. The user wants to log on. She speaks to the computer It matches her voice to a database of voice patterns. The user has a cold or sore throat. She can use the system Stress and intonation patterns remain the same. 136 UNIT39 pata Secutty 2 Study these ilstations fortwo forms of security scaning Write your own captions for each ofthe numbered points, Eye scanning Hand scanning. Seaningechaslogy UNIT 19 bats Secuty? 137 Backups Workin pairs, Aand 8. You each have details of one form ofbackip Explain to your partner how your frm of backup works, Make sure you understand the form of backup your partner has. sk for acation iTanythings unclear. Student A Your information is on page 188, Student B Your information ison page 194, Firewalls Stuy this éiagram ofa rewalled network system Welle descrintion of how i operates. You may nee to do some research on firewalls to supplement the diagram. Your description should answer these questions What is its function? What does it consist of How are the firewalls managed? How does it control outgoing communications? How does it prevent external attack? 138 UNIT 19 Data Security | SPECIALIST READING | Find the answers to these questions inthe following text. 41 Name 3 areas of computing that companies rely on more and more. 2 What can intimidate even the most experienced network manager? 3. What 3 types of peripheral storage devices ‘do most companies rely on for backing up data and storing information? What typeof data-intensive aplication do companies ely more heavily on? 5 What has kept the SCSI bus from evolving rapidly? {6 What traditional LAN interface is mentioned inthe tex? 7 Name 2 drawbacks of NAS. 8 What type of server can be connected toa SAN? 9 Inhat 2 ways will @SAN lighten your server's workloa What types of cabling can be used with Fire Channel? 10 Pern a {As companies rely more and more on ecommerce, ‘online transaction processing and databases, the Smount of information that needs tae managed nd stored on network can intimidate even the most experienced of network managers While servers do a good job of storing data, their ‘capacity Is limited and they can become a bottleneck if too many users try to acess the same information intend, mast companies tly ‘on peripheral storage devices, such a tape bares, RAID disks and even opti storage systems. These devices are effective for backing {Up data online and storing large amounts of Information ua Sever farms increase in size and companies rely more heavy on data intensive applcauons Sch as multimedia the traditional storage mode Isnt qulte as useful. This s because acess to these peripheral devices can be slow, an might ‘ot always be possible for every use to easly and transparently access each storage device “The most basi way of expanding storage capacity ‘onthe network ito hang disk arays oF other Storage devices of servers, using the SCSI Interface or bus. ‘While Ss has been a workhorse over the years {or connecting peripherals ats relatively fast speed, distance limitations have kept this, Baricular bus Interface from evolving rapidly. ‘The SCSt standards puto bus length lint of| bout Gm on devices, While tis distance Timitation doesnt realy affect connecting storage devices directly toa sever, does Scverely restric placing RAID and tape bares A oer potats on the network. Enter the NAS ‘This s where the concept of Network Attached Storage (NAS) comes in, NAS Is simple In concept nd execution dik rays and eter storage desis onnect othe network through a traditional LAN Interface, such as Ethernet. Storage devices would thus atte to network hubs, mich the However, NAS does havea few drawbacks Furst, network bandweth places throughout limitations on the storage devices. Another dowside to NAS isthe lack of cohesion among Storage devices, While diskarays nd tape drives are on the LAN, managing the devices can Drove challenging, since they ae separate Entities and not Tegel hed togetner NAS has Its place asa viable storage arcnecture, but large companies need something more. and manage large amounts of information In = Hah performance envtronment now have another option the Sorage Area Network SAN) In SAN, storage devies such a Digital Linear Tapes (DLT) and RAID arrays ae connected 0 int Hibs Serves vine alee Interconnection, suchas Fibe Channel. “This Biatvepeed lnk creates separate external network, thas connected (0 the LAN, but as 35 an Independent entity This setup allows fr any tay communication ternative paths fram server wostorge device, Im other words Ifa particular server Is slow ot Completely unavalable, another seuvr on the Saivcam provide access the storage device, A SAW also makes i possible to mirar dat, Ss offer several advantages. Fist, they allow for the addition of bandwidth iio! bordening ‘he main LAN, SANS also ake It esler fo ona online Backups without uses fling te buanawiath pinch. When more storage Hs needed ditional drves do not nee tobe connected to A speti server: rater, they can simply be ade {ote slorge rework and accessed fam any point Anoser reason for the interest in SANS that a fe devices can be centrally managed. Instead of ‘managing the network ona per-deviee bass. Storage can be managed a singe ent ‘aking i ealer to deal with storage networks ‘hat could potently coasist of dozens or even hundreds of rervers and devices. ‘You can connect almost any modern server to 3 SAN, because SAN support hardare ad toltvare spans most PC mdrage and ‘maaframe platforms. cally 2 SAN wil lighten Your servers workload by offlaating many orage related server tasks to the SAN and by beter allocating storage resources to servers, “The most important piece of any SAW architecture Is the underlying network technology that dives Channel is emerging asthe technology of choice for SAN implementations Fibre Channel wa feveloped by ANSI in the early 1990s a8 means to transfer large amounts of dat very utcly Fre Channel's compatible wth SCS) IE and Link Encapsulation. and ican be used over [Upsate ana adapted om Doing te SAN thing by Roger Gann, Persosl Computer Wels, Oto" 3000 UNIT 19 oats Secnty2 139 Re-read the texto find the answers to these questions. 1 Note the advantages ofa SAN. 2 Matehthe items in Table Ath the satementsin Table 8, aS Fibre Channel © SAN 6 Miror Server farm £iskarray T” Storage area network |i Wiite copies of data to two disks atthe sametime i A large collection of computers that work together to provide services on a network Iv Network attached storage ¥ Aséetf interconnected disks vi_Atype of high speed interconnection ‘3 Using information from the text, mark the feliowing s Tue or False: 4 Inthe tracitional storage model, it is always possible for every user to access each storage device. Hanging storage devices off servers isthe most basic way of expanding storage capacity. The distance limitation of SCS ffets the direct connection of storage devices toa server 4 ASAN isnot usually connected toa LAN. fe All devices can be centrally managed ina SAN. Fast Etheret is becoming the most popular typeof interconnection for SANs.

You might also like