SAN Security
John McGowan, EMC Corporation
Jeffrey Bardin, Independent consultant
John McDonald, EMC Corporation
Note: This chapter is available in its entirety online at store.elsevier.com/product.jsp?isbn=9780123943972 (click the Resources tab at the bottom of the page).
1 Abstract
One thing to consider is that the most probable avenue of attack in a SAN is through the hosts connected to the SAN. There are potentially thousands of host, application, and operating system-specific security considerations that are beyond the scope of this chapter but should be followed as your systems and application administrators properly configure their owned devices. Information security, that aspect of security that seeks to protect data ...
Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.