Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

MoDULE-5

1 Risk Triod
detines risk in terms ol threa d,ossets, and vulnerabilics
0Y
eg Senst hve document s trans-mitted without any
Protetion Over an
inseure channel,
attaker micht g
an

Onuthori zeo access to the dourmen t and


moy violote itS
Corjdenhialit ond ntegy
tomanage risk
,orgonizahon fou9 on
Vuirerabilihes
Assets

Tnormaion is one mos t


orgond sahon imortant ossetsr on
opoEect these assets,
oroont sahans must
porometers to ensure the deudoPa ser
outhorized availobilih o the resoureS
usersand trusted
nekworks
Threcds
ThreaS ore potenhal attacs that on be corricol ouJt
on TT
inrostruure. These attatkS con be clossyed
Possiv e attock- are
attempbs to
a ccess into system qoununaluthorlSect
Activc attock Incude
dato mocu
cah on den ial o
Service CooS),and repu-diation attocks
,

Julnerabiliy
This poth S
provrde attess fo
inlormaon ore oten
vulnerable to
potential att ocks
-T+ 1S importont to
tmplement odequote Scuity
Contrds to afl oacLess polnts ocess
n
poth. Ttis
Krown os
delenge in depth
2Setarty hreats tn
opplrcaHon access domain

Syona host/user deniky

peVISOr

eroy

HostA
volume S
Storage
Nehwork
Nehwork
ArraY

Host B3.

VolumeS

spoo hauthonized
idehty Has
etevatHon oh poxsible Threats
privileclae X Unauthori2ed Actes

3 kerberas
KDC
WindouuS
clrent
Tp Prooku)-
TuTCa)
T Server-name(3)-
kerbCCkerbS TkT)cS)-
kerbs TkT(6)
Session ToC8
NA S
Device Key taba
Ative
Di rectord
Kerber oS authorj2.ahon
h i t h ts
NerberoS is a network outhen i caHon prooco
Clestgned to proufde srong outheniiahon or diet/seruer
epplrcations by using secret-Ke crypogroph

ora qe oTray basecl loCal repltcabioo

Aead Read
cun+e wrte

Sourte Replica
Produuhon.
Hogt Storoge Bc Hes
Array

o des oh Rerno te
Replrcobon
Synchronous repli caHon

Host Sourte Targct at


Rernote sitc
1 Host writes dato bo Source
2 dOato
romsource is replr cated o targe at remote site.
3 The
torge acknousledges boek to sourCe
4 Sourte
aukhouwledgeS nte comelete to hoSt
Hax Pequired ondwtdt
write Typical Wrife wor klocd
S

Time BondwicHh requrement or ssychronous


reeicat6n
Asynchronous replrcaion

Source Targetat
Hast Renote Sitc

The hos+ wrtBe s data o Sourte


he wri'hes is imme dt alely
S
auknowle dgcoto hosb
Doka ttonsmitted to target ot remote site
ic

1
layer
he
torget acknowledqeS backto
hesOurce
write MB Typreawrite workload

Averoge
AA Req red bondwidth.

Tme
Bondwtdh requirement or asue hronous replrcaon

You might also like