Latest CSE Seminar Topic on Vulnerabilities in the Technologies of Networked Storage

Introduction to Vulnerabilities in the Technologies of Networked Storage :

The process of implementation of the NAS as well as the SAS is not such easy and this process is considered to be one the difficult aspect. The special type of approach called the DID is being utilized in order to reduce the different types of the risks by means of separating the storage layers of the networks into two different layers which will even specify the different types of vulnerabilities in it. 

By making use of the DID approach the difficult exploitations of the NAS and SAN are being divided into four different types such as:

  • The devices which are upon the storage network
  • The data access
  • The network connectivity
  • The management access 

The vulnerabilities that are present in the NAS and the SAN deployments are explained as follows: 

The vulnerabilities of NAS

Layer 1 the devices on storage networks

The devices which are present in these layers will contain the different types of the filers or else the servers of NAS which are capable of sharing the different file systems within the total network or system. The different vulnerabilities within this layer are surrounded by OS upon the filer or else the server which involves:

  • The access which not authorized because of the presence of the mechanisms which are having delicate authentication as well as the approvals. The best example for this is the utilization of the defaulting usernames as well as the passwords which are being configured upon the applications related to the NAS along with the authentication of weak username and the password.
  • The different types of the security violations which are depended on the vulnerabilities which are published within the OS as well as the different services offered by means of the OS.

The Layer 2 data access

The data which is been stored within the NAS is distributed by making use of the different types of the file systems like the CIFS –common internet file system, the SMB-server message block as well as the NFS-network file system. The actual vulnerability within this process is the unauthorized authentication which is as follows: 

  • The CIFS share level authentication will utilize the single password for each and every share as well as the different passwords are being shared within the form of plain text that are more exposed to the vulnerabilities.
  • The user level authentication of the CIFS which is depended on the LanMan is not secured in a proper way.
  • The data loss because of the reliability as well as the presence of the different types of viruses, worms as well as the DoS –denial of service attacks

 Layer 3 Network connectivity

As the entire applications of the NAS are totally based on IP which are more exposed to the different attacks such as the Denial of Service attacks and session hijacking and the IP spoofing which are even addicted towards the vulnerabilities that are based on IP. 

 Layer 4 management access:

The device administration, file systems as well as the stored data are happened to be the applications that belong to the management of NAS. There are different types of vulnerabilities such as:

  • The unauthorized access to the systems by making use of the different types of the sniffing passwords because of the utilization of the protocols of clear text communication such as the telnet as well as the HTTP protocols for the access.
  • The other types of the unauthorized access because of the presence of the mechanisms of weak authentication as well as authorization and the lack of the managing the authentication factors. 

The vulnerabilities of SAN

Layer 1devices on the storage network

Even though the servers are been connected towards the SAN are capable of accessing the data which is stored on the devices of SAN there are some vulnerabilities that are as follows:

  • The unauthorized access because of the presence of the weak authentication and the authorization of the schemes that belongs to the OS that are connected upon the servers.
  • There are different types of security violations that are published within the OS along with its services offered based on the servers as well as the hosts. 

 Layer 2 data access

The significant data could be easily stored and secured in the SAN by making use of the different servers that are configured which are similar to that of the NAS applications. By this process the data can be easily accessed by the mail servers as well as the servers of the database. The unauthorized access because of the weakness within the CIFS shared levels along with the establishments of the user authentication levels. The data losses are happened because of the presence of the tolerant access towards the storage devices by making use of several types of hosts upon the SAM.

Layer 3 network connectivity

The different types of the devices related to the SAN are being associated by making use of the HBAs, the hubs, switches as well as the different fibre channel protocols. The SANs are happened to be more protective when they are having the network characteristics which are isolated. The unauthorized access because of the vulnerability of the fibre channel protocol. The vulnerability is because of the security violations which are not configured in a proper way and will utilize the different types of the default configurations. 

Layer 4 – management access

Reducing vulnerabilities is the process of management of the different devices which belongs to the SAN. The main vulnerability is because of unauthorized access because of using the sniffing passwords and the access protocols that are not secured. This process is because of the lack of access control as well as the different types of auditing measures.

Seminar Topic on Information Security

Introduction to Seminar Topic on Information Security:

The overview of the security

One of the significant tasks of the information security is securing the secrecy, the reliability as well as the presence of the different types of the assets related to the information along with the different activities which will show the affect on the aspects of information called threats.

There is a strong reason for the existence of the threats it is because of the presence of the more number of weaknesses or vulnerabilities within the information. A special type of framework called DID- the defense in depth is the framework used to overcome the attacks and threats and there are two specific reasons for considering these approach such as : 

  • In general there is not even a single device which can be utilized for the purpose of the networked storage which are capable of securing the networked storage
  • By associating the different types of the functions related to the security will offer the flexible security for the devices of the NAS as well as the SAN and it implemented by considering the different types of the vulnerabilities included in them

SAN Network Seminar Topics for CSE on Latest Technology 2012

Introduction to SAN Network Seminar Topics:

The SAN- storage area network

The SNIA- storage networking industry association specifies that the SAN is the type of network and its major task is to transmit the data among the two different types of the computers as well as the storage elements that are diagonally opposite towards the storage elements.

The storage area network is made up of the communication architecture that offers the different types of the material associations as well as the management layers that will arrange the connections of the storage elements as well as the computer system which will transmit the data in a secured manner.

The SAN a storage area network is considered to be one of the best and high speed network that can be utilized for the purpose of the storage devices as well as the hosts which will allow and perform the data that is being hosted by the different types of the storage devices. The different varieties of the block based access is being offered by the SAN it involves the several types of the devices like the HBA- host bus adapters, the hub switches, the servers as well as the disk storage.

F-2-The SAN environment 

Now a day’s the there are several numbers of the existing SANs and the entire SANS are totally based on the fibre channel. The data which is been stored by the SANs will be able to accessed through the different number of hosts which are associated with the SAN and it can be easily distributed by making use of the different file sharing protocols that are managed by the underlying host OS. The different types of the fault tolerance features such as the RADI are been supported by the storage devices which belongs to the SAN and these are even capable of carrying out the data reproduction process.

Latest CSE Seminar Topics 2012 on NAS Security

The security policies for the networked storage

The security policies and the different solutions for the NAS as well as SAN solutions are as follows:

NAS – the network attached storage

According to SNIA- storage networking industry association is the word that is being utilized for the purpose of storing the different aspects which are connected to the networks and will offer the services related to access the files towards the computer system.

The different types of the services related to the files which are established by making use of the aspects that includes the engine and the other different types of the devices by which the data is being secured by storing it in a specific way. The storage aspects are considered as the NAS filers that offer the different access to the data that is based on files.

The NAS filers that are specified belongs to the type of the IP based systems or else the applications which are distributed towards the network. The different types of the protocols such as the CIFS or SMB, the NFS as well as the HTTP are been utilized in order to distribute the file systems to the host.

The NAS filters are carried out up on the surrounded OS hardened which is diagonally opposite towards the attacks and they are having the capability of supporting the fault tolerance aspects like the RAID as well as the data reproduction process.

The Necessity of Storage Security PPT

The necessity of storage security

It is being proved that the storage networks are having more number of advantages and it is even facing many challenges related to the security and for this reason the networked storage is facing different types of risks. There are different types of key aspects that are related to the networked storage which are as follows:

  • The strategies which are secured outside will protect the networked storage from different types of the external threats and attacks, only implementing the strategies will not be sufficient to protect data and if the security violations are reduced then the data can be protected.
  • The different types of the internal attacks are making the data storage process more violated and if the different types of the servers are being used according to storage requirements then the data can be easily secured. 

 The overview of networked storage technologies and security

SNIA the storage networking industry association argued that the issues of the storage security are facing many failures because the aspects of the security as well as the storage are not such easy to understand. There is a necessity of establishing the networked storage security which is based on the technologies related to the networked storage that gives the proper solution to the security risks.

Latest Seminar Topics for CSE Students 2012 on DAS NAS and SAN Technologies

Overview of DAS, NAS and SAN

Each and every project will have the confidential data which is to be stored in their computer by using different types of storage devices. There is a necessity of assuring the security for the data stored which is more important to the organizations and companies.

The DAS-direct attached storage will store the data on the servers which is considered to be one of the significant devices for the purpose of the storage of the enterprise data. There are different types of the restrictions like preservation, the provisioning as well as the scalability within the process of storing the information on the servers. 

The main reason for having these types of limitations is because the storage is always vulnerable to the different restrictions of the DAS solutions. Now a day’s because of the significance of securing the confidential data the security of stored data is happened to be one of the biggest challenge. Because of the different types of limitations and restrictions in the DAS the new storage systems which are cost effective are being established such as NAS- the network attached storage as well as the SAN- storage area network solutions. 

There are more extra benefits by using the NAS as well as SAN such as the leveraging network administrative resources that can be utilized in order to support and manage the different types of the distributed storage devices in an efficient manner. There is a rapid decrease within the equipment costs as well as the production because of the usage of the networked storage. It is strongly specified by IDC that in the coming years nearly 70% of the companies will use the network storage devices. The NAS and SAN solutions are more vulnerable towards the network layer attacks and for this reason they are facing many challenges. 

Research Methodology in Computer Science

Methodology definition

Methodology is considered as the process of giving the appropriate solution to the problems that takes place in the research process by specifying the different type of the principles and approaches.

Research Methodology types

In general the quantitative and the qualitative are the two different types of the research methodologies that are used in the methodology process.

 Quantitative research method

The articles, case studies, books, journals, reviews and the web documents are different types of the data sources that are included in the quantitative research method. It is totally a theory based approach and the specific data related to the research is been gathered based on the research requirements.

Qualitative research method

The surveys, interview reports and questionnaires are the data sources included in the qualitative research method. The participants are included in the process and are asked with some questions related to the research process and the answers specified by the respondents are considered as the major data for the research process (Trochim. 2000).

Research method used

Within this research process the quantitative research method is utilized to collect the information required to complete the research in an reliable manner and the different articles and web documents related to the similar topic are taken into consideration from the internet sources and are analyzed according to the research requirements. 

Ethical issues

This research process is carried out by following all the ethics and morals and the information gathered from the previous scholars is analyzed according to the requirements without violating it. This research process is completed in an honest way by following the entire authentication processes and I wish to provide my valuable views and ideas for the future work.

Differences between RAM and ROM Literature Review

Differences between RAM and ROM

RAM and ROM are used to perform operations of computer with high speed and in user PC stored data is accessed easily. RAM is used hardware to store programs of applications, and processes are randomly accessed. On the other hand, RAM is used to perform rebooting the PC, RAM is considered as computer backbone and it is erasable completely.

 Speed

ROM speed is lower when compared to speed of RAM. Because of this reason, most PC has ROM with greater capacity. In terms, ROM is engraved software. While hard drive is presented in ROM, in chips RAM is presented. So, sufficient ROM amount is needed by computer system of user to run applications and programs in computer operating system.

 Convenience

Speed is considered as major difference which is presented between ROM and RAM because applications must be loaded with high speed via ROM to run applications and software. This memory remains when computer is shut down though updating ROM when user PC is on. User may need to buy RAM when PC of user is slow.

 Storage capacity

RAM is referred as volatile storage. When switch off the PC, all stored information is completely cleared out. For storage purpose, all computers own nonvolatile storage capacity and when switch off PC, instructions are passed. When system is in on state then ROM is updated.

If user wants to boost speed of user computer, additional memory adding is needed by him that perform rectangle cards resemble. Additional thing is, ROM is referred as unchangeable memory which runs applications and software. Because of its useful functions, without ROM the system will not perform its operations in effective manner.

Seminar Topic on Computer Hardware

Introduction to Seminar Topic on Computer Hardware:

Random Access Memory (RAM)
RAM is referred as random access memory. RAM is a place within the system or the computer and it is having responsibility of data staking away on basis of temporary, so it can be accessed promptly by processor. In RAM information is stored and typically loaded it from hard disk of computer, data which is related to certain applications and the operating system. When switch off the system, all stored information is lost by RAM. The information remains saved and when system is in running mode then only data can be retrieved.

When memory of RAM is full, the system is likely more to perform operations at low speed. In any random order data can be retrieved. Normally, RAM is two types, one is named as Dynamic RAM (DRAM) and other one named as Static RAM (SRAM). When on the computer many programs are running simultaneously, the computer is allowed by virtual memory to perform search operation in RAM for portions of memory which is not accessed from long time and those are copied onto computer hard drive. RAM space is freed by this action and system is enabled to load various programs.

 Read Only Memory (ROM)

This memory type is active, apart from the system is switched off or is turned on. It is considered as non-volatile storage memory which is permanent kind. The name which is specified as ‘read only’ suggests included content in it which is not modified or changed. It is considered as pre programmed integrated circuit with needed data which is necessary for computer to perform its internal functionality.

Cache

Cache is other type of RAM which is accessed by computer system more responsively than in regular RAM. In memory of cache central processing unit appears before searching is performed in area of central storage to recognize needed information. System needs are ruled out by this for system to perform information search in bigger and larger areas of memory storage, which leads to data faster extraction.

 Computer Hard Drive

These are considered as important components of data storage which is installed in computer CPU. Their ranges of memory widely, and memory is chosen by user depending upon needed data which can be accessed and stored. In today’s environment, hard drives have 120 gigabytes to 500 GB memory capacity are normally utilized.

 Flash Memory

This is non-volatile memory which is contributed to storage that is portable and convenient data transfer from one system to another. Data which is presented in it can be programmed or erased as per the requirements of user. Only specific erases are owned by it and write withstand cycles after creation of tendency on stored information to lose out. USB flash drives and memory cards are memory storage some modes.

These are just main and common memory types of main computer which facilitate data and memory storage. But, many sub types are presented according to related functionalities of memory they are sorted out and requirements are performed and served by them.

Literature Review on CPU Memory

The major component   in the C P U is memory which stores the data .the C P U works based on this memory. Data storage in the memory is done in the form of bits using binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be transformed into a series of bits, or binary digits, which contains a value 1 or 0.

The most common unit of storage is the byte, equal to 8 bits.  It acts as a memory for CPU  i.e. remains all things  for C P U  since the CPU needs information while it is processing it takes the data from this memory i.e.

Random access memory  it also advice’s c p u what to do or not to do  with the data  and they immediate results calculated by C P U is also stored in this memory  since it is random access memory it is stored temporarily when the system is switched of  the information is lost   this is one of the disadvantage  making C PU work useless  this can be  solved by  hard disc 

There are three types of memories available which is used by C P U they are

  • Primary storage (or main memory or internal memory)
  • Secondary storage
  • Tertiary storage

Primary storage (or main memory or internal memory)

It is also known as main memory, is the only one directly reachable to the CPU. The CPU constantly reads instructions saved there and executes them as required. Any data actively operated on is also stored there in uniform manner.

Secondary storage (also known as external memory or auxiliary storage),

It varies from primary storage in that it is not directly accessible by the CPU. The computer frequently uses its I/O channels to contact secondary storage and transfers the desired data using   primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. it is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage and data is kept for a longer time there.

Tertiary storage or tertiary memory,

This storage is different from other two storages and the third level storage is being offered by this storage. This storage includes the robotic mechanism and it is capable of including as well as removing the different types of the mass storage media to the devices of storage that is entirely based on the authorities and powers of the system rather than using it. This storage takes more time than that of the secondary storage and it is being used to archive the information that is already accessed. This storage process can be carried out without the support of the human and it can be utilized for the purpose of storing the huge quantity of data.

Hard disk

The computer‘s one of the major component is hard disc which stores all the data eternally and it is similar to that of the gramophone that is having the different types of the spindles and the different types of the circular disks are being maintained by this that is capable of managing and storing the data which is recorded. In order to reduce the magnetization which belong to the material the read and write will be utilized that is processed randomly.

One can save the data standard or you can erase it permanently or temporarily. This data is saved even after the computer is switched off and can get back the data once it switched on this have other disadvantages like the performance i.e. speed  and space more  the storing space less the performance since it needs to recollect all the data once it computer is switched on .after that also the  burden on C P U is more since it needs to process all the data therefore e every computer goes for temporary storage  to grow fast .based on the data importance  system  goes for  permanent storage i.e. hard disc.

Memory is specified as one important aspect and it is integrated with computer. Normally, various types are presented in existing memory and based on system particulars necessity they are installed. The computer is not anything but it is specified as box which won’t have any dependable memory type within it. Two different storage types are being owned by the memory of computer. One is named as volatile memory and other one is named as static memory. The first one, volatile memory is specified as RAM which is always maintained and to be refreshed. Static memory is considered as constant storage and this is to be maintained even computer or system is switched off.