0% found this document useful (0 votes)
45 views

1 Assignments - Data Center

The document discusses security components at different layers of compute, network, and storage. For compute security, it describes 7 layers - from mission-critical assets to the human layer. For network security, it discusses devices like web application firewalls, ACL firewalls, IDS, and IPS. For storage security, it mentions encryption, access controls, and backup/recovery systems.

Uploaded by

Eksha Madan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

1 Assignments - Data Center

The document discusses security components at different layers of compute, network, and storage. For compute security, it describes 7 layers - from mission-critical assets to the human layer. For network security, it discusses devices like web application firewalls, ACL firewalls, IDS, and IPS. For storage security, it mentions encryption, access controls, and backup/recovery systems.

Uploaded by

Eksha Madan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ASSIGNMENT : DATACENTERS

Gagandeep Madan
ASSIGNMENT1  
Explore the RAID Levels and Identify the solution for a better tolerance and improved
performance.

RAID: Redundant Array of Independent Disks

It is a setup consisting of multiple disks for Data Storage. Various techniques can be used to employ
these disks for increasing the performance and reliability of storage. There are 3 main techniques
that are used.

 Data Stripping
 Disk Mirroring
 Parity

RAID Levels: There are 3 types of main RAID Levels

 Standard RAID Level


 Non-Standard RAID Level
 Hybrid RAID Level also known as nested RAID

RAID 0: Data Stripping


Minimum two disks are required for RAID 0. The disks are merged into a volume where data is
stored evening. This process is known as data striping which involves dividing the data into blocks
and same each block sequentially in a multiple disk.

RAID 0 is the most inexpensive type of redundant disk configuration. It is comparatively simple to set
up. However, it does not include any redundancy, fault tolerance, or party in its composition. Hence,
problems on any of the disks in the array can result in complete data loss. Hence RAID 0 should only
be used for non-critical storage.

Raid 0

A1 A2

A3 A4

A5 A6

Disk 1 Disk 2

Advantage: It increases the performance. Read and Write operations are faster
RAID 1: Disk Mirroring

Minimum two disks are required where same data is stored on both/all the disks to ensure
redundancy. Benefit of such configuration is that probability of data loss is reduced and incase of any
failure, mirror image can replace the original disk.

In such a setup, the array volume is as determined by the size of the smallest disk and operates as
long as one drive is operational. Apart from reliability, mirroring enhances read performance as a
request can be handled by any of the drives in the array. On the other hand, the write performance
remains the same as with one disk and is equal to the slowest disk in the configuration

Raid 1

A1 A1

A2 A2

A3 A3

Disk 1 Disk 2

RAID 2:
This is rarely used these days. It combines bit-level striping with error checking and information
correction. This RAID implementation requires two groups of disks – one for writing the data and
another for writing error correction codes. RAID 2 also requires a special controller for the
synchronized spinning of all disks.

RAID 3 :
This is also very rarely used. This type of Raid implementation uses bit level striping and a dedicated
parity disk. Hence it requires minimum three disks. To allow synchronized spinning, RAID 3 also
needs a special controller. Due to its configuration and synchronized disk spinning, it achieves better
performance rates with sequential operations than random read/write operations

RAID 4 :
It is also not very popular. It is similar to Raid 3 in concept but instead of bit level data stripping, it is
done at block level stripping. Write operations are slow but read operations are extremely fast.
Redundancy is lost if the parity disk fails.
RAID 5 : RAID 5 is considered the most secure and most common RAID implementation. It
combines striping and parity to provide a fast and reliable setup. Such a configuration gives the user
storage usability as with RAID 1 and the performance efficiency of RAID 0.
Data is divided into data strips and distributed across different disks in the array. This allows for high
performance rates due to fast read data transactions which can be done simultaneously by different
drives in the array.

RAID 5

A1 A2 Parity A1

B1 Parity B B2
RAID 6:
Parity C C1 C2

Disk 1 Disk 2 Disk 3

Parity bits are distributed evenly on all disks after each sequence of data has been saved. This
feature ensures that you still have access to the data from parity bits in case of a failed drive.
Therefore, RAID 5 provides redundancy through parity bits instead of mirroring.

RAID 6

RAID 6 is an array similar to RAID 5 with an addition of its double parity feature. For this reason, it is
also referred to as the double-parity RAID.

This setup requires a minimum of four drives. The setup resembles RAID 5 but includes two
additional parity blocks distributed across the disk. Therefore, it uses block-level striping to
distribute the data across the array and stores two parity blocks for each data block

Raid 10: Mirroring with Striping

RAID 10 is part of a group called nested or hybrid RAID, which means it is a combination of two
different RAID levels. In the case of RAID 10, the array combines level 1 mirroring and level 0
striping. This RAID array is also known as RAID 1+0.

RAID 10 uses logical mirroring to write the same data on two or more drives to provide redundancy.
If one disk fails, there is a mirrored image of the data stored on another disk. Additionally, the array
uses block-level striping to distribute chunks of data across different drives. This improves
performance and read and write speed as the data is simultaneously accessed from multiple disks.

The solution for a better tolerance and improved performance is : RAID 5


As the same provides:
 High performance and capacity.
 Fast and reliable read speed.
 Tolerates single drive failure.
Explain the security components at each layer of Compute, Network and Storage

Security for information technology (IT) refers to the methods, tools and personnel used to defend
an organization's digital assets. The goal of IT security is to protect these assets, devices and services
from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors.

Compute Security
There are 7 layers of security
1. Mission-Critical Assets
This is data that is absolutely critical to protect.

2. Data Security
Data security is when there are security controls put in place to protect both the transfer and the
storage of data. There has to be a backup security measure in place to prevent the loss of data, This
will also require the use of encryption and archiving.

3. Endpoint Security
This layer of security makes sure that the endpoints of user devices are not exploited by breaches.
This includes the protection of mobile devices, desktops, and laptops.

Endpoint security systems enable protection either on a network or in the cloud depending on the
needs of a business.

4. Application Security
This involves the security features that control access to an application and that application’s access
to your assets. It also includes the internal security of the app itself.

5. Network Security
Security controls are put in place to protect the business’s network. The goal is to prevent
unauthorized access to the network.

6. Perimeter Security
This security layer ensures that both the physical and digital security methods protect a business as a
whole. It includes things like firewalls that protect the business network against external forces.

7. The Human Layer


Despite being known as the weakest link in the security chain, the human layer is a very necessary
layer. It incorporates management controls and phishing simulations as an example.

Security Systems
UTM

Unified threat management (UTM) is an approach to information security where a single hardware
or software installation provides multiple security functions. This contrasts with the traditional
method of having point solutions for each security function. UTM simplifies information-security
management by providing a single management and reporting point for the security administrator
rather than managing multiple products from different vendors.

SIEM
Security information and event management (SIEM) is a field within the field of computer security,
where software products and services combine security information management (SIM) and security
event management (SEM). They provide real-time analysis of security alerts generated by
applications and network hardware.
Network Security
Security Devices

Web Application Firewall

A web application firewall (WAF) is a specific form of application firewall that filters, monitors, and
blocks HTTP traffic to and from a web service. Inspecting HTTP traffic can prevent attacks exploiting a
web application's known vulnerabilities

 SQL injection,
 Cross-site scripting (XSS)
 File inclusion, and
 Incorrect system configuration

ACL Firewalls or Access Control List Firewalls

An ACL is the same as a Stateless Firewall, which only restricts, blocks, or allows the packets that are
flowing from source to destination

IDS

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity
and issues alerts when such activity is discovered. It is a software application that scans a network or
a system for the harmful activity or policy breaching.

IPS or IDPS

Intrusion Prevention System is also known as Intrusion Detection and Prevention System. It is a
network security application that monitors network or system activities for malicious activity. Major
functions of intrusion prevention systems are to identify malicious activity, collect information about
this activity, report it and attempt to block or stop it.

Intrusion Prevention System (IPS) is classified into 4 types:

 Network-based intrusion prevention system (NIPS):

It monitors the entire network for suspicious traffic by analysing protocol activity.

 Wireless intrusion prevention system (WIPS):

It monitors a wireless network for suspicious traffic by analysing wireless networking protocols.

 Network behaviour analysis (NBA):

It examines network traffic to identify threats that generate unusual traffic flows, such as distributed
denial of service attacks, specific forms of malware and policy violations.

 Host-based intrusion prevention system (HIPS):

It is an inbuilt software package which operates a single host for doubtful activity by scanning events
that occur within that host
Storage Security
Storage security is the group of parameters and settings that make storage resources available to
authorized users and trusted networks -- and unavailable to other entities. Storage security can
encompass hardware management, application development, network security controls,
communications protocols, organizational policy, physical security and user behaviour.

Storage security also includes a range of issues, including network security and cyberthreats.
Protection must be provided against online threats such as viruses, worms, Trojans and other
malicious code.

Data Security Principles

 Confidentiality: Keeping data confidential by ensuring that it cannot be accessed either over
a network or locally by unauthorized people is a key storage security principle for preventing
data breaches.
 Integrity: Data integrity in the context of data storage security means ensuring that the data
cannot be tampered with or changed.
 Availability: In the context of data storage security, availability means minimizing the risk
that storage resources are destroyed or made inaccessible either deliberately – say during a
DDoS attack – or accidentally, due to a natural disaster, power failure, or mechanical
breakdown.

Storage is where data resides. It is also where users and applications interact with data either
directly or indirectly. An effective storage security strategy is essential in preventing unauthorized
access to data and underlying storage systems. It is also important in ensuring authorized users have
the access they need for their jobs.

Storage Security is ensured at different levels from different vulnerabilities by performing steps.

 Encrypt sensitive data at rest and in motion and implement a secure key management
system.
 Disable unnecessary services to minimize the number of potential security holes.
 Apply updates and security patches to the OS and other software regularly.
 Deploy network security that prevents unauthorized users from accessing storage systems
and their data.
 Implement storage and data redundancy to prevent data loss in the event of hardware
failure, malicious activity or natural disaster.

You might also like