Professional Documents
Culture Documents
UNIT -I
• 1. FUNDAMENTALS OF INFORMATI ON 1- 31
STOR AGE AND MANA GEME NT
I. I Information Storage 3
I .2 Data Proliferation 7
1.3 Evolution of Storage Tf'lchnology and Architec ture 8
I .4 Overview of Storage Infrastructure Compon ents 11
1.5 Information Llfecycle Management (ILM) 15
1.6 Data Categorization
J Review Points
Review Question s
24
30
31
I UNIT-II
2. STORAGE SYSTEM ENVIRONMENT ARCHITECTURE 32-8 5
Introduction of Storage System Architec ture
33
2. I Intelligent Disk Subsystem
37
2.2 Contras t of Integrated vs. Modular Arrays
38
2.3 Architec ture of Intelligent Disk Subsystems
39
2.4 Disk Physical Storage
41
2.5 Disk Properti es
2.6 45
Disk Perform ance
2. 7 46
Disk Specifications
2.8 51
RAID
2. 9 Hot Spares 52
2.10 Compon ents of an Intelligent Storage System 72
2. I I Data Mapping 75
Review Points 82
Review Questio ns 83
85
UNIT -III
2 ~ l't½4
l63
FUNDAMENTAL"OF INFORMATIQN , , l
179
182
184
5- 21 9
186
190
203
204
215
219
~ Information Storage
~ Data Proliferation
o- 25 5 ~ Evolution of Storage Technology and
Architecture
221 ~ Overview of Storage Infrastructure Com
223 ponents
~ Information Lifecycle Management (ILM
223 )
224
227
229
233
233
235
240
242
243
245
247
247
252
254
255
M ENT
IN FOR MAT IO N 8TO nAG E AN D MANAGE
D
rma tion tech nolo gy. Hug e am oun t and very
tnfon nf\ti on storage Is a cen tral pilla r of Info l or
g crea ted ever y mom ent by eith er Indiv idua
good qua lity of digit al Info rma tion Is bein
s to be stored, prot ecte d, optimized
by corp orat e cons umers of IT. This Info rma tion need '
und man age d .
on
life , as the time goin g we beco mes Informati
Info rm ation Is also very Imp orta nt In our real net is
Info rma tion from diffe rent re sour ces, inter
depe nde nt. There are man y way s to get sends
to com plet e our goa l like as receives and
one of them . We access the inte rnet dall y
and lot of othe r app licat ions . That means
in our
on e-111.}ils, dow nloa ds vide o and pictu res ii
tion 's and afte r crea ting the information
duily li fe ever y persons are crea ting info rma ur
storage was seen as .only a bunch of disks
needs to store them . Previously, info rma tion stor<.:
r to store data . This type of storage can
tape s attached to the back of the com pute tc
unt of info rma tion is very larg e then it rn~ed
only sma ll amo unt of data . But if the amo ty c.
orga niza tioi,s , whic h can prov ides a varie
man age d and store by a very sensitive izin
g, prot ectin g, secu ring , shar ing, and optim
solu tions for stori ng, man agin g, conn ectin
cycle of info rma tion .
digital info rma tion . Figu re 1.1 desc ribe the
Information
Creator
Uaer Storage
Device
in their own me mory, but If the amount of data is very large , it need to store in big storage
device like as centralized storage device, here the data are stored and processed fo r future
use . If this stored da ta is called for reused, it can be accessed from centralized data storage .
As the criticality of informa tion is increases the challenge to protecting and managi ng these
data also ina ·eases . Th e major question is how to manage these critical data, like as
info rma tion of ra ilway reservation , airline reservation and information for telephone 1 !l ing
etc? The second question is how to secure these data? The solution is a data ce11ter , it
manage and protect these data by making the classification of data and set the rules for th e
h·eatment of these data. With the help of these data centers high level of availability,
security. and manageability can be provided over the data.
M◄ In database managemen t systems, data files are the fil es that: store the database
information, whereas other files, such as index file s and data dictionaries, store
administrative information, known as metadat~. !Figure 1.2. DiJ
M◄ Generally, in science, data is a gathered body of facts.
Types of data
M◄ Data can exist in a variety of forms - as numbers or text on pieces of paper, as bits and
bytes stored in electronic.memory, or as facts stored in a person's mind . Data eon ·
webpage c
I◄◄ Strictly speaking, data is the plural of datum, a single piece of Informati on. In
is applied t
practice, however, people use data as both the singular and plural form of the word.
by compul
M◄ The term data is often used to distinguish binary machine-rea dable ·information human re,
from textual human-read able Information. For example, some applications make a organized
distinction between data files (files that contain binary data) and text files (files that records Is
contain ASCII data).
columns ar
At the time when computers ware not invented, the procedures and methods ado . ted for data Is unc
data creation and storing were limited to fewer forms, such as paper and film . No~ days,
Unstructur,
s~me type of data ~an be converted into different forms such as e-book, bitmapped image, have a pre
video, or an e-mail message. These data can be generated by computer and is stored in
lnformatlo:
strings of Os and ls. This ~orm of data is called digital data and is can be accessible after as well. n
processed by computer. Figure 1.2 shows the different forms of th:, d t
e a a. using tradit
With the presence of computers and communica tion tecI nol · or annotat,
. . . 1 ogIes, th e rnte o f da ta
generation and sharing has mcreased. Because ·· 1::,jority of data a t· fr outside of ,
. •. :· · re crea mg om compu ters,
so we can say that all data a, e belongmg to digital data TL , most cum,
increase the growth of digital data are given below:
c . ne important factors w h'1ch
· governmer
1◄◄ Increase in data processing capabilities because m
and effort I
- FUNDAMENTAL OF INFORMATION STORAGE AND MANAG EMENT
1111
e numbers , · H◄ Lower cost of digital storage
nted
. paper, H◄ Faster communi cation technology
111 example s
that is more
ransmiss ion
Book i/;
:lata is often lmage.png O1 O1
1s to identify
Image
t------- -'----'-_ ;;__---- ---+1 01001110
1 0 1 0 1 0
11001 1
)rmation to 1 0 0 0 0 1
Video
I telephon e (CD) Digital Data
~d continua l
rans mission
1 pieceme al
e-mall
1e database
1aries, store
!Figure 1.2. Digital data Conversion Process
Types of data
r, as bits and Data can he divided into two parts as structured and unstructured. Structured Data is
webpage data for content objects, such as people, reviews, products, and companies that
,rmation. In is applied to a universal format. The benefit of structured data is it is universally understood
of the word. by computers, namely search engines, and can therefore be more efficiently organized for
informat ion · human readers. The term structured data refers to data that is identifiable because it is
ions make a organized in a structure . The most common form of structured dat~ or structured data
;es (files that records is a database where specific information is stored based on a methodology of
columns and rows. Structured data is also searchable by data type within content. Structured
data is understood by computers ~nd is also efficiently organized for ·human readers.
adopted for
. Now days, Unstructured Data (or unstructured information) refers to information that either does not
pped image, have a pre-defined data mode and/or does not fit well into relational tables. Unstructured
l is stored in information is typically text-heavy, but may contain data such as dates, numbers, and facts
:essible after as well. This results in irregularities and ambiguities that make it difficult to understand
using traditional computer programs as compared to data stored in fielded form in databases
or annotate d (semantically tagged) in documents. Unstructured data (information that lies
rate of data
outside of database s where business intelligence is usually stored) represents the largest,
rn computers
most current and fastest growing source of information available to businesses and
=1ctors which
governments worldwide. Businesses are major problems to manage unstructured data
because more than 80 percent of data is unstructured and it required more ctorage space
and effort to maintain them. Figure 1.3 describes the types of the data.
■!■
1111 UIU,MIIIJ II IJ I/J IIN!I /'t/HJ M/>tll/-1/ i l Ml IH
J 11JI 11
fflV()f(JUfl
A1111i11 Vl(l1111
'-.,trm
r1r tt:
V,/, t..v,(
C rn1fr111Jltl - -- - --- Untttruoturod D•td (80'1/it)
f~{(jf,
r, tftfo •
r1 ·ti111·ul.:i:"-
1 '/)1111111 uj' /)11l11 (8 /t'rt llll/l'lld (11//l 1/1111/l'fllilll/'11!1) M
-4<
lnformotlon
,..
l111'nrrni·1llnn, In Ito 11101:1 1· rnAlrlcted t·echnl co l aenne, le a riequence of Rymbols that can be ,..
1nt·, 0rpro t13d LHJ a me1J1111oe. ln formaf'lon ca n be recorded as signs, or transmitted as signals.
,4,
lnl'orrrn, 11<>11 lo f'J llY l<lnd of ev<ml: th1;1t. 1.1 ffo c.: l'i th~ 1:J blt~ of a dynamic system . Conceptually,
lnfornrn llon lfl the n,u~lfl1'0<~ (utl'crn nce or cxrims11fon) being conveyed . M oreover, th e concept ...
nf ll1fnrmatlon IM cloi:wly rn l,,t·ed to notfont1 of con11trufnt, comrnun ic.:utlon , control, dc.1!<1,
form , lnHlru cllon, lmowlu<IQLJ, muurilno, mental Htfmulua, palt·ern, r,erception, rer,rc:sentc.1 tion , 1.2 OAT
1111d t!<ipod.;lly rn1lropy. Oa t,
I ),,l,1 111111 I1, w b<irn1 vc•rlfl<:d lo be ticc.:um l1J ;,n cl lln1 uly, lti qpeclflc and orya nizecl for i:l that
plll'pqn,·, 1·1pr<:ncnt·cd within ,.1 co,Huxl· 1'11 a t fJ IV t:3 It, rnw-mlno ,md relevunc~, (mcJ lhnt· Ci.l n usah
liwl to o111 I 11cre,1u<J ·111, 1ndurnta11cllnu and decre,.HI(~ i11 unc.:erl i.1lnly. The vulue of informati on pert,
;; m,
11, 1 :11,l,·ly 111 ll •J11blllty tn r1ffoct· n beha vi or, dv,ciHlon, or outcome . A r,l ece of informati o n
00
1°1 crn1 Hld tmJd voluc:lcss If, nf'f'cr r<:c.:e lvlnu 11', thlnuH rern,Jln Lrnch,.rnyed. lnforrmi ti on ls Whi l
'iflm,dl lhnt h,,v,~ mcntilno In RnmLJ con toxt· for ll'B rece ivc~r. When in forrnntion Is entered mill r
11110 r1nd t1lornd inn com put er, It lt1 otmf!roll y referred t.o c1s ,fota. AHer proce ssing (such of d,
£10 form,1 ttln 9 rrnd r,rlnt·ln£1), outr,ut. da t. o can llga ln be perce ived as information . facil i
fnfnrrn1J llon 111 vory lln portan t· for bu0lnes8 point of vl <:!w so It hi:l s very important rol e In
our renl llfu. 1.2.1 Prol
The
Storogo avail
1>0111 crnfl l'C,HJ by I:'\ Llll(Jr or bu0lneRocfl need to be stored some ware 80 thcit lo cun easily dum
1:1 ccm1slbl'-l for f1,1rf'hC:J r procrnrn1t10, ll'l a computer, storage Is the place where data Is held In This
t1 n ol"ctrnmr,o nutl c or optl cul form for acccot1 by a computer processor. There are two funcl
oonorfll uoaoco: and
FUNDAMENTAL OF INFORMATION STORAGE AND MANAGEMENT
Storage is frequently used to mean the devices and data connected to the computer
1◄◄
through input/output operations - that is, hard disk and tape systems and other
forms of storage that don't include computer memory and other in-computer
storage. For the enterprise, the options for this kind of storage are of much greater
variety and expense than that related to memory.
1◄◄ In a more formal-usage, storage has been divided into: primary storage, which holds
data in memory (s')metimes called random access memory or RAM) and secondary
storage, which holds data on hard disks, tapes, CD/DVD and other devices requiring
input/output operations.
Storage is a term used to describe any location where information can be held permanently
or temporarily for later use ..A computer commonly has two storage types: internal and
external. For example, an internal storage is a device such as a hard drive and an external
removable storage is a device such as a floppy disk drive. Below are examples of forms of
storage used on a computer.
1◄◄ Floppy diskette
· 1◄◄ CD-ROM disc
unr.,r,
1.2.3 Posslble Solutions ooly;:;
<>tr1r;;~,
Information is power but an abundanc e of data is of little use if it Ls scattered across itl> rr.~:
desktops, schools, campuses, and formats, especially if you can't easily retrieve or consolidat e d~!Vk
it. To improve your business results, you need the ability to analyze di verse information fo%tJ.
sets, regardless of where they originate. ~ r, rJ r/;,1
technology that added considerable value to the HDD. To understan d the evolution of
storage systems, it is importa nt to observe the evolution of the HOD.
ivcN0AMicH'iAl ~ iNrORlll'..ATK>H S 'iOAAGE AHO MM4AGEMEtH
iUR E
~i ~ --: ::z: s:-...:tr~ as
:: ; .J:-"-e- ..,::;;;_.:,-.=!~- .
- . - - .. --lf·
-:-.:: ~:- ~~-:-._-es
E<dl'londSl!craig e
Core Elements
The basic core elements for storage infrastructure are given below:
Applicat ion: An application is the use of a technology, system, or product. The term
application is a shorter form of application program. An application program is a program
designed to perform a specific function directly for the user or, in some cases, for another
application pi:ogram. With the help of an application program we can give an instruction
to storage server to start backup process or storage device to store data.
Network : It is an intermediate device, provides connection between the componen ts of a
storage infrastruc ture. With the help of network any two or more computer s can
communicate to each other. If we talk about storage infrastructure it provides connection
between client and storage server and between storage server and storage devices.
Server and Operati~ g system: It-provides a computing platform and handles to run an
application programs.
Database : A database is a collection of information that is organized so that it can easily
be accessed, managed, and updated: To manage these operations, Database managem ent
System (DBMS) play an important role and provides a structured way to store data in
logical way, so it provides more flexibility to storing and fetching of data.
Storage Anay: It i~ a combination' of rrtany storage devices having different nature, and
is used to store different type of digital data provided by storage server. The main aim of
storage array is to store digital data to protect for future use .
The architecture, which will represent that how all comtx·ne'1ts are working together, is
given below (See Figure l .SJ:
◄
It-I INFORMATION STORAGE
AND · MA NA GE ME NT
•••
)
Cllent
Storage Sever Storage Array
lFi gur e 1.5 . Arc hit ect ure of storage Co mp
one n t
Th e process which will describe
that how all components are wo
rking is given below:
(1) Th e application program
is installed on client side an d wh
information to storage server. en it run it passes the
(2) Type of network i.e. LAN
provides the connection bet we en
server. Client an d the storage
(3) Sto rag e server holds the
dat a in database an d it is ma na
running process is han dle d by an ge d by DBMS, and all
operating _system.
(4) Th e storage network, type
of a network provides the link bet
sto rag e array. we en sto rag e server and
(5) Th e storage array wh en rec
eived all dat a from outside, stored
A customer places an ord er throug her e for future use .
h the application software like as
the client computer. Th e client AUi which is found on
connects to the server over the
lo~ated on the server to update LA N an d access the DBMS
the relevant information such as
pa ym en t me tho d, products ord customer nam e, ·address,
ers an d quality . orders etc. the
op era tin g system to rea d an d wri DBMS use s the server
te this dat a to the dat aba se locate
the sto rag e array. Th e storage d on the physical disk in
networks provides the communic
ser ver an d the storage array an ation link between the
d transport the rea d an d write
Th e sto rag e arr ay after receiving co mm an d bet we en them. ·
the rea d an d write com ma nd fro
the necessary op era tio ns to sto m the server performs
re the dat a on physical disks.
Storage Planning-When, Wh
ere, How?
Th e sto rag e industry has be en
trying har d to move awa-y from
an d creating a single pool of dat the sca tte red environment
a, which could be accessed by
horizontally, effort has be en ma all. Ins tea d of spreading
de to have multiple layers of da
beh avi or an d im po rta nce of dat ta sto rag e bas ed on the
a.
1.4.1 Wh at Is Storage Infrastructu
re?
On e of the key challenges a Sto
rag e Administrator today has is
File systems. Th ese File system managing the Non-Database
s can be located on any nu mb er
of Sto rag e devices such as:
FUNDAM6NTAL OF INFORMATION STORAGE AND MANAGEMENT
Ill
I◄◄ SAN ..Attached Storage (SAN): Is an architecture to attach remote computer
storage devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers
In such a way that the devices appear as locally attached to the operating system.
SAN's used to require connections via Fiber Channel (an expensive short-distance
networking technology), but now major vendors offer connections via iSCSI and
NFS.
1◄◄ Network ..Attached Storage (NAS): Uses file-based protocols such as SMB/NFS/
AFS where It is clear that the storage is remote, and computers request a portion of
an abstract file rather than a disk block.
I◄◄ Direct Attached Storage (DAS): is made of a data storage device (e.g.: a number
of hard disks) connected directly through a computer through a Host bus adapter. A
DAS device can be shared between multiple computers, as long as it provides
multiple interfaces (ports) that allow concurrent and direct access.
l
FUNDAMENTAL OF INFORMATION STORAGE AND MANAGEMENT
Ill
iSCSI commonly appears in small and mid-sized businesses. However, SAN
deployments are more costly to implement (in terms of switches, cabling and host
bus adapters) and demand far more management effort.
Another trend in network storage components is the addition of intelligent features
at the fabric - often implemented at the switch . These features include storage
virtualization, data migration and replication, backup and restoration capability,
better interoperability between storage components, as well as uniform storage
provisioning and management. ·
With so much data being held, data, during its lifetime, the data will be moved to different
physical locations. This is because depending Oi: where it is in its lifecycle; it needs to be
located on the most appropriate storage device.
ILM gives the answer of following question so that enterprises "can understand how data
should be managed and where data should-ideally-reside during its_existence. In
particular, the probability of reuse of data has historically been one of the most meaningful
INRORMATION STORAGE ANQ -~ANAGEMENT
metrics for understanding optimal data placement. Understanding what happen: to ddata
·
throughout its lifetime Is · becoming · · I · rtant aspect of effective ata
an mcreasmg Y 1m_p o
managemen.t "
What happens to data as it ages?
Does usage decline as data ages?
Does the value of data change-increase or decrease-as ·t ages.?
1
L
- FUNDAMENTAL OF IN FORMATION QTOAAQli AN O MANAGlioMlil
N I'
m
and distributes tho dnta to opproprlnto eitorao o, bnsod on pollcl
os thnt nro dorlvud frorn
f-lssoclated usago ond busln oss vnh.10 nttrlbulos, to ro floct: tho chnng
od utw pnttorn11 of lh(l
lnforml:lt\011 When lnfonnollo11 bocOtT\Cti sl:nllc (no lnnoor modlf
lml), II 111 ruclns11lflod a!l
refere nce lnform ntlon . Reforn11cu lnf'ormntlon IRlyplcfllly used
for dnl11 mlnlnn, ro9ulnlory
compliance, legal, ond other purposes. Anothul' c,t:i poct lh11t
ILM 111111-11 comild or Iii tlH' !'net
that lnfon11nt.lon \lsed by different nppllcatlons spend s dlfforn
nl nmounts of tlrno In c:11' ,irn nt
parts of the life cydc . For example, emoll spond s very llttlu tllw.i
In the ''t.:rna t,1phr'ISi'." Aftur
the email Is st?nl, It enters the "manoge" oncl "dlslrll>uto" phnso
~. On th e.: oth er hond, trn
On Linc Transaction Processing {OLJP) dutnbnsc nppllcntlon rnny
sp~nd rnuch of Its ll fo In
the "crea t~" phase, as records ore contlnuE.l lly being crentud
1md 111odll kcl.
Databaso Workflow
rtormllw Reoulotory
ERP Security Compllnn~
Medical lmagln~
Storago
Custom app llcat ~ Leg81 Discovery
'" An a doptive sto rnge infrns trttcllll\' th,1t ~upp0rts diffl'l\.' nl d,,s.--cs of stor,,g,• b.-:iscd 0 11 As rh e amour
how the data is used during its HfL l'.yck . T h~ sto r,"\ gl' lrnrdwaru ,md so ftw,1 rl:cl utllilud application M
.ls !).)rt o f un ov.::rllll lLM so lut ion mu-,t -,~. ~' l ICI \ as , \ V::\ l·1, \ I )I·1I·1v.
SU)) )l orl v •mio \ 1-,• <I" tt·,··,t)ttf l! recovery also I
- '
,.. Enterpri:...• sto ragt! applirn tions th;:-it nr1..' d,·sig1wd to si m plify th , ,t of 1.5.2 Recommend
11 11 1
com plex stor.19 ...• infrns tructurcs. · l )1..' tnCt
" · '- ~
The lllustratlon
,.. Tho? lin k1 1~9 of th e bu~itW $.., -n ltk ,,I npp lk,,tlo ns a nd th u ov1.Yrn ll l)llsit ,1..•&. proc l.'S..'it'S to 011Information
lh l' ada p ll Vt? Slo rng l., 1n f_t'.\ Sll'll Ct\lr\' to 1..l l1SUl'Q th a t thu ri nht d n t \ 1' • O " ii l I I .,,..• path an lndlvld
~ •·• , :.. " " ::l J e n ny w " -' ,,
d
ot ~ny : '_m ~ acco1 ing to its bu si nc:-..-. n·l,•v.11\l'u, tl m t is, i~ us.,g,· .,nd thl..! volu,J thi.t life time from er
bu:,1nc:.:, d'->11\\.'s from it ut ,,n~, po int in r1 11 ,c .
- FiUNDAMENTAL OF INFORMATION STORAGE AND MANAGEMENT
ID
1.5.1 The Problem
The basic concept of ILM has been a standard operating procedure in the mainframe
world for several years, outside the mainframe world ILM is far less mature. In the open
systems world, most IT organizations have some procedures In place (often In the form of
custom scripts and manual administration tasks) to manage the information produced by
applications and users. Unfortunately, these procedures typically suffer from the following
problems:
Lack· of integration
Few IT organizations have a holistic approach to information management; procedures
tend to be application- and operation-specific, using different tools with different
management interfaces for each task. This heterogeneity can rrtake it difficult to document
procedures and ensure that the right procedures are in place for every application.
01-0alt Updlle
Oelltl
Information Ola11lft01tlon
Cr coti on
1\ Int of lnfonnC\tl on Is cruo ted ris part of the ever
ydoy business procnss within organizatio
Upon t t\ •t\tlon, lh~ Ct\.!lllur inu$t consider the content
of the Information they are creati
,ind nm\,~ n ~ll:dslon f\S to wh,athcr or not It rcqu
lrns 'lccess control. If not, then its lifecy
rnn contlnuo without npplylng the ILM Process.
If It Is, the Information Classiflcati<
lmpnct Sonsltlvlty Cotcgorl zatlon nnd Access Con
111ust bo pl•rfurnwd. trol Polley Det1nitlon stages of the proo
Storngo
lnformntlon 1l1ust bo storod appropriately to refle
ct the Information protection requlreme
dvOncd by thu lnforn-u,llon Clas11lflcatlon and Imp
act Sensitivity Cateaorlzatlon stages.
Encryption Is not 1na11dntud but If tho informa
tion Is highly classified or has high Imp
sun11ltlvlty th1.1 n conl1 donllollt y ~ssurl'\nco must
be consldQred. The physical location of I
t> lOm!J" tll,vlnrn 1rnJ tho onn ypll on of Informa
tion am oxl'\n1ple considerations.
Inf ormntlon Sho ring
b
FUNDAMENTAL OF INFORMATION 8TORA<JE ANO MANAGEMENT
ID
Impact Sensitivity Categorization and Access Control Polley Definition stages of the process
must be performed before sharing the Information, even If this has already been performed
on creation of the Information .
Data Transfer
The Information tra, 1sfer protocol between collaborating parties should take account of
the Information protection requirements as defined by the Information Classification and
Impact Categorization stages. Encryption ls not mandated but If the information is highly
classified or has high impact sensitivity then confidentiality assurance must be considered,
Endpoint compliance and the encryption of information in transit are example
considerations.
Update
If the information is updated, the updater must consider the content of the information
they are adding/ updating and make a decision, using the Information Classification Scheme
and Impact Sensitivity Categorization processes, as to whether or not the changes present
additional and/or modified information protection requirements. Changes in Access Control
Policy and data transfer. security are examples of such protection requirements that may
change due to modified information conte.nt.
Deletion
Deletion of the information should reflect its classification and impact sensitivity labels. If
the information is labeled as having to be securely destroyed then just placing it in the
system "Trash" is not acceptable.
Information Classification
Information that is shared in de-parameterized environments must be accurately labeled
with information protection requirements according to the sensitivity of the content within
the information resource in terms of a risk-based asses~ment of the business impact of an
incident or threat.
The information creator or individual intending to share the information in a collaborative,
de-parameterized environment must consider the threat to the business if the information
were accessed and/or modified by individuals with an identity outside of a particular domain.
This could be the internal organization, external business community cir named specific
individuals, details of which must be specified In the Information Classification Scheme for
the organization.
Information handling requirements, legality and temporal llspects must also be considered
at the Information Classification phase. Secure destroying of inrormation; clear ownership
rights; changes In classification after a particular date and time; and corporate governance
constraints are examples of the detail that should be evident from the labeling process. If
the information requires classification according to the Information Classification Scheme,
the Information must be correctly labeled.
m INFOPIMATION STORAGE AND MANAGEME
NT
- FUND
Impact Sensitivity Categorization
Information must be labele d with an Impact Sensi Information
tivity level based on the meas ures of
Confidentiality, Integrity, Authenticity and Availability each catego
requi red to adequ ately prote ct the
information, use and transit. There Is six-level Impac
t sensitivity scale that repre sents the Data cla.5.5ific
impact magn itude should the protection meas ures
not be effectively deplo yed. public or prh
The creato r or individual that Is Intending to share
the inform ation in a collaborative, All members ,
depar amete rized envir onme nt must condu ct an Impa
ct-Sensitivity analy sis to determine and availabil
the controls required to maintain information assur ance that organ iza1
in a de-pa rame terize d envir onme nt
in relation to the Confidentiality, Integrity and Avail into the follO\
ability requi remen ts of the information.
Access Control ~ Publit
Authentication and Authorization should be appli ~ Officic
ed to principles reque sting acces s to
information. ~ Confid
·
Appropriate access control technology should then PUBLIC DATA
be used to enfor ce the authorization ·
response. The de-parameterization issue make s many
of the curre nt techn ologi es that rely Public data is i
on perimeter security to enforce controls inapp ropria
te for use in an organ izatio n. information wi
Acc~ss Controls sho_uld be reflective of and respo usage . Public d
nsive to · the infor matio n security
requirements defined m the Information Classification of the organ iza
and Impa ct Sensitivity Categorization
stages. examples of Pu
·
~ Publicly
1.5.3 ILM Benefits
~ Publicly
The major benefits of an ILM are given below:
OFFI CIAL USE ONLY
~ The improve~ _usage of existing information reduc
emp1oyee eff1c1ency. es proce ss cycles and incre ased Official Use Onl
privacy conside
~ Costs of the IT infrastructure can be reduc ed
. by opt1·mizm
· · g th e storag e . onme nt. transmission , stc
~ Laws and regulations are more easily adher envir
coordinated infrastructure. d t d . be a civil statute
. e O ue to the relev ant polici es and a restricted to mer
~ Improve the utilization of business data. such data. Some
~ Provides variety of options for backup of data. ~ Employm
~ Organizat
1.6 Data Categorization
agreemen
DEFINITION: The categorization of stored data f it ~ Internal te
Data can be classified according to its critical val or hs t .
moS effective and efficient use. Official Use only c
with the most critical or often-used data stored ~eti;
fa::s~ ften it needs to be accessed,
be stored on slower (and less expensive) media0. ~ Must be pr
media while other data can
disclosure.
Why data Categorization?
~ Must be stc
Data classification is the act of placing data ·nt where phyi
. 1 0 ca t
internal controls to protect that data against theft egories that ·11 di Must not b(
c . WI ctate the level of ~
' omprom1se , and Inapp ropria te use .
· Fl:JNDAMENl"AL"tOF--INF0RMATION ST.ORAGE AN0 MANAGEMENT, _ _ _ - ID
Information security is best managed when data is classified and the risks associated with
each category are uniform and understood.
Data classification is an essential part of audit and compliance activities at any organization;
public or private sector.
All members of any organization have a responsibility to protect the confidentiality, integrity,
and availability of data generated, accessed, modified, transmitted and stored or used by
that organization.-Data owned, used, created or maintained by any organization is classified
into the following three categories:
~ Public
~ Official Use Only
~ Confidential
PUBLIC DATA
Public data is information that may or must be open to the general public. It is defined as
information with no existing local, national or international legal restrictions on access or
usage. Public data, while subject to organization disclosure rules, is available to all members
of the organization and to all individuals and entities external to the organization. Some
examples of Public Data include:
~ Publicly posted press releases
1◄◄ Publicly posted interactive organization maps, newsletters, newspapers and magazines
~~
l Dala Elomenl ]
· the individuals,
lFigure 1.8. DRM Structurn
1◄◄ Categorization of Data: The ORM establishes an approach to the categorization
of data through the use of a concept called Buslne n Context. The business context
represents the general business purpose of the data. The business context uses the
lzation FEA Business Reference Model (BRM) as Its categorization taxonomy.
1◄◄ Exchange of Data: The exchange of data Is enabled by the DRM's standard
message structure, called the lreformotlon ExcJaany~ Package. The information
echange package represents an actual set of datPi that :~ i"~quested or produced from
~tion of data one unit of work to another, The Information exch~ t•[.P t-Jackage makes use of the
,ses lmpact~d by DRM's ability to both categorize and structure d~1ta.
11\1
t"M illl t,lll,ltl of l)n
'I I Ii.I Vit i I111
11J1il pol. ',
111i11l1h1 n ll 1
111·11 hnu u 111
qp j111111) 1111
dnt n) 111lu l,!
V• ,11111111 1:1 I ,I
11 >< 1 l irw q,, I
1ltiJ 1111 1 1
i,l 1n1,,,
lt.1
l
\\Al )\ lil.nM'1NI
thc1 h,,~11\~ li~ " ~" l,t n µIVIJI\ "'-'I l,1' dnlC !il'l l \ ,111\l~I. \'h1:2
\ l 111nhc1- 1.1l!I" ,,f tlw S11\,\ol't
hu"l"ct "" l'f'll'\l'e~ I '"P'~""''ti l44 \,Vll ll1l
"' n11 1h4,1 1' d.., ttrdb" 1\w \n1ic\11c1tt!I 1'u11t\lNnrn t uf n u\\ 1" " t 1o1l nf dnt" . ~111 ,1~,
.i\1'\.1n nnd ~ ,pc;1 • 'lypd
1 1 "'""'''
hl~h lt'\'l'I 11" 1 ,,1 \111l'1 l11v 1111 1\
11\l'llu1" nm\ n,~ \lbln \11(! ,\ ·t· "''" "" r~p,~it'1nl A 1~• I,,,,I II
~h"h,I iBHM\ . ~Ill'"' ~11''-'ll 1~ 111\l{ 1\-,,111 the1 \11'1•\' 11 f\u t1 lllct ~ Hctt
liJ III C\I\ f\dd\111,nnl \1:,1, 1..,l :.,,~ nl'~ I 11111\t
'-'°' 11~~1 C\lld ewe \.}c1w1 nlh,1 1\iln 1,f d~llnlll,,n with th1J ht1 t1 144
l1Jd h I Ii\,cdtk li11 11 l1 ll 1~!1 m•tl\'ll\ 1\l(l~~
tho 11u1 ,1"1'I n1~ n, ~)!I n l\1l 1. ,,, pi, 1i'\l!i1i\lli thnl
1111p1x'II
FUNDAMENTAL OF INFORMATION STORAGE AND MANA
GEMENT
El
Exch~nge of Data
mation exchange package
The exchange of data can be enabled through the DRM's infor
the actual message or
concpet. The Info rmat ion Exch ange Pack age represents
The information exchange
combination of data that is exchanged between users of the data.
ribed in the structure of data
package brings the business context and data element (desc
exchange of information and
section) together to define how a common transaction (the
ange package concept. Future
data) might appear. Exhibit D illustrates the information exch
and scope of the information
volumes of the ORM will continue to expand on the definition
exchange package.
transmitted or to data that
Note ~ The information exchange package can apply to data that is
is shared or retrieved.
Structure of Data
data within a given business
The ORM uses the Data Elem ent to describe the stmcture of
adapted from the 1S0/IEC
conte>.i. The structure of data is comprised of three elements
ns, or things that can be
111 79 standard. The Data Obje ct is the set of ideas, abstractio
and behavior follow the same
identified with explicit business meaning and whose properties
nt. for example, the data
business rules . In the conte,xt of population health manageme
t, the DRM 's approach uses a
object could be a vaccination. To further define the data objec
rty desoibes the data element.
Data Property and a Data Representation. The data prope
rty could be name , weight,
In the population health management example, the data prope
type of the data object. For
potency, etc. (of a vaccine) . The data representation is the value
numbers, etc.
example, representations could be plain te,xt, integers, whole
Review ~oints
■ lnfom1atlon storag e is a central pillar of inform ation techn ology
. Huge amou nt and very good qt
of digita l information is be ing create d every mom ent by either
indivi dual or by corpo rate consu
of IT.
• Dn ta proliferation refers to the uniqu e amou nt of data , struct
ured and unstru ctur~ ?• that busin e
~nd gover nmen ts continue to gener ate at an unpre ceden ted
rate and the usability probl ems
result from attem pting to store a nd mana ge that data.
■ DAS descr ibes a serve r or workstation where all the storag e devic es are
direct ly attach ed to the }
system . A fa miliar exam ple of DAS is an IDE drive inside a deskt
op comp uter.
• Stora ge Area Ne twork (SAN) is a network of storag e devic es
that are conne cted to each other anc
a server. or cluste r of servers, which act as access points to the
storag e
■ Intern et Protocol SAN (IP-SAN) is a conve rgenc e
of tee::hnologies used in SAN and NAS. IP-S;
provides block-level comm unica tion across a local or wide area
netwo rk (LAN or WAN) , resulting
greate r consolidat1on a(1d availability ·of data.
■ SAN-Attached Stora ge (SAN ) is an architecture
to attach remot e comp uter storag e devic es (such,
disk arrays, tape libraries, and optical jukeboxes) to servers in
such a way that the devic es appea r i
locally attach ed to the operati11g system
■ Network-Attached Stora ge (NAS) uses file-ba
sed protocols such as SMB/NFS/AFS where it is dee
that the storage is remote, and computers· reque st a portion
of an abstra ct file rathe r than a dis.
block.
■ Direct Attached Storage (DAS) is made of c: data storage devic
e (e.g. a numb er c;:,f hard disks1
connected directly through a comp uter through a Host bus adapte
r.
■ RAID is a technology to comb ine multiple small,
indep enden t disk drives into an array that locks like
a single , big disk drive to the system .
■ RAID systems were devel oped to provide storage with
y arious forms of fault t~lera nce. RAID fault
tolera nce is used for storage inside the PC enclosure and in extern
al storag e enclo sures Network-
attach ed storag e (NAS) is file-level computer- data storag e
conne cted to a comp uter network
providing data access to heterogeneous clients.
■ RAID is a data protection tactics of arranging group
s of discs into arrays.
• RAID -0 is disc striping is used to improve storage perfor
mance, but there is no redun dancy .
■ RAID -I is disc mirroring offers disc-to-disc redun dancy
, but capacity is reduc ed and perfo rmanc e is
only marginally enhan ced.
■ RAID-5 is parity information is spre_ad throug hout
the disc group , improving read perfo rmanc e and
allowing data for a failed drive to be reconstructed once the failed drive
is replaced. _
■ RAiD-6 is multiple parity schem es are sprea d throu
ghout the disc group, allowing data for up to two
simultaneously failed drives to be reconstructed once the failed
drive( s) are replaced.
■ ILM is the process of mana ging the place ment
and move ment of data on storage devices as it is
gener ated, replicated, electronically distributed, p"rotected, archiv
ed, and ultimately retired.
■ ILM is about creating policies that can fit the information
flow into the business environment as part
of a n overall architecture . By its nature, ILM is most effectively
implemented using an application-
specific solution appro ach that includes generalized. ·
·
FUNDAMENTAL OF INFORMATION STORAGE AND MANAGEMENT
ID
■ The major benefits of a n ILM are Improved usage of existing Information, the reduces process cycles
and Increased employee effi ciency. Costs of the IT Infrastructure are reduced, La ws and regulations
are more easily adhered; Improve the utlllzatlon of business data , Provides variety of options for
backup of data.
• Tier O is fast data storage (Flash Memory or Solid State Disk) is used to ensure th at data can be
accessed very quickly.
■ Tier 1 is a Mission critical data (such as revenue data), making up about 15% of all data , venJ fast
response time, FC or SAS disk, FC-SAN , da ta mirroring, local and remote replication , automatic
failover, 99.999% availability, recovery time objective: immediate, retention period: hours
■ Tier 2 is a Vital data, approx. 20% of data, less critical data but fast response time, FC or SAS disk,
FC-SAN or IP-SAN (lSCSl) , point-in-time copies, 99.99 % availability, recovery time objective :
seconds, retention period: days.
■ Tier 3 is a Sensitive data, about 25% of data, moderate response times, SATA disk, lPSAN (iSCSI),
virtual tape libraries, MAID, disk-to-disk-to-tape periodical backups, 99.9% availability, recovery
time objective: minutes, retention period: years.
■ Tier 4 is a Non-critical data, ca. 40% of the data, tape FC-SAN or IP-SAN (iSCSI) , 99 .0%
availability, recovery time objective: hours/days, retention period: unlimited.
■ Data classification is the act of placing data into categories that will dictate the level of internal
controls to protect that data against theft, compromise, and inappropriate use .
111 Data categorization provides a clear picture of categories of data that exist in organization.
■ Without reliable information system and effective IT control activities, public companies would not
be able to gene'rate accurate reports.
□□□