SlideShare a Scribd company logo
1 of 15
Download to read offline
Department of Computer Science & Engineering
Amity School of Information Technology
Amity University Haryana
Mr. Ganesh Gupta
Department of Computer Science & Engineering
Amity School of Information Technology
Amity University Haryana
Seminar Paper
On
Network Attached Storage Security
Under guidance of
Ms. Shivali Dhaka
Presented By:
Said Masihullah Hashimi
MSc. NTM II Sem
Enrollment No: A50500818003
Contents
• Introduction
– Network Attached Storage
– NAS Types
– Work Procedure
– Functions
– Advantage and Disadvantage
• Network Attached Storage Security
– Security Principles
• Future of Network Attached Storage Security
– NAS vs SAN
– Cloud Based File Storage
• Conclusion
Introduction
• Data is critical asset of any company or organization.
• Any big or small businesses data storage needs:
– Lower Cost Options
– Ease of Operations (many small business don’t have IT staff)
– Ease of data backup (always accessible)
– Growth Capability
• Network Attached Storage provides the solution for such problems.
– NAS is device connected to a network that allows storage and retrieval of
data from a central location to authorized network users and clients
Network Attached Storage
• NAS Devices has the following characteristics.
– Simple to operate (A dedicated IT is not often required)
– Lower cost from dedicated File Servers
– Easy data backup (always accessible)
– Good at centralizing data storage in a safe and reliable way.
– Easier remote access like cloud from anywhere in the network.
– Small in size and easy for relocation.
– Flexible and expandable when ever we need more space.
Network Attached Storage Types
NAS Types
Types Usage Benefits Consolidation Advanced Features/Benefits
Low-end NAS Fast, Simple file
storage
Low cost: No special
training
Consolidates
desktop storage
Simplified backup
Midmarket NAS Shared access to large
volumes of files
Low cost: Easily scaled to
multiple terabyte: no
special skills required
Consolidates
multiple file servers
Clustering: Point-in-time snapshot
High-end NAS Shared access to large
volumes of files:
Integrates with SAN
Low cost: scalable:
migration path
Consolidates many
file servers:
potential for NAS-
SAN consolidation
Clustering replication: Gateway to SAN: multiprotocol support
management
Work Procedure
Network Attached Storage Functions
• File Sharing
• Data backup / Disaster Recovery (with some software or windows backup)
• Network Printing
• Multimedia File Sharing
• Media Server
NAS Advantages and Disadvantages
NAS Pros and Cons
Approach Pros Cons Best Fits
NAS gateways  Available SAN Storage can be used
 Easy, Single-vendor migration tool
 Upgrade back end or front end separately
 Capacity and performance are
limited to what is available behind
the gateway.
 Large, enterprise-class user that have a SAN
 Single-vendor consolidation
Integrated NAS  No SAN requirements: Simpler
configuration
 Easy, Single-vendor migration tool
 Compare to gateway, the file system
performance and capacity maybe
limited
 All-or-nothing performance
upgrades
 Small-sized to enterprise-class users without a
SAN
 Single vendor consolidation
Clustered File System  Able to scale out
 Performance of servers can be dilated to
whatever is required
 Some vendors have limited or no
CIFS support
 Large compute cluster users requiring high
performance access to file data
Parallel File System  Able to scale out
 Parallel file system improves throughput
and performance
 Some vendors don’t support CIFS or
have limited NFS support
 Parallel file access only available on
limited clients and requires special
client software
 Large compute cluster users requiring high
performance access to file data
 Anybody needing parallel access to file data
NAS Aggregators  Heterogeneous box consolidation
 Single namespace over multiple NAS boxes
 Added overhead
 Additional hardware to install,
configure and maintain
 Multibox, multivendor environment single
namespace configurability / usability
Network Attached Storage Security
• From the NAS perspective, we need to look at the:
- Access to shared data
- Access to administrative functions.
-Access to the NAS device over a network.
• The access to shared data is setting up permissions and access control lists to designate
who has access to what data and the rules for simultaneous access.
• The administrative function on the NAS device also needs to be secure. This means that
only an authorized person can access the system.
• The access to a NAS device over an Ethernet network using IP is also one of the areas that
in the past has been exploited for security breaches.
• Data being altered or monitored in the individual IP packets being transmitted is also a
security concern.
Network Attached Storage Security Principles
• Always change default passwords
• Do not click suspicious links in emails or elsewhere, especially if they
redirect to your local network (http://192.168.x.x for example)
• Use random, alphanumeric passwords for both your router and NAS logins
• Regularly update the firmware on your router or NAS. Turn on automatic
updates if supported.
Network Attached Storage Security Principles
– Securing Router
• Changing Default Passwords
• Enabling HTTPS
• Enable WPA2
– Securing NAS
• Changing Admin accounts and passwords
• Enabling SSL
• Blocking extra ports
• Using VPN
Future of Network Attached Storage
– NAS with Gigabit Ethernet Capability, more scale-out support
– Object Storage (Unstructured Data) replacing NAS.
– Cloud based file storage.
– Direct Attached Storage
Conclusion
• Configuring NAS security is not something hard.
• Built-in features to modern devices available.
• Locking and securing NAS is just a matter of properly keeping the
security principles in mind.
• A NAS has been a great addition to the home or office business
environments.
• Cloud backup solutions for the NAS are available to prevent data
loss.
?

More Related Content

What's hot

Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverviewscomoore
 
Mini Formation - Microsoft Data Center Dublin
Mini Formation - Microsoft Data Center DublinMini Formation - Microsoft Data Center Dublin
Mini Formation - Microsoft Data Center DublinHernando MONTOYA OLIVEROS
 
Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)rgtechnologies
 
Virtualized PC workplace as service: Swissdesktop
Virtualized PC workplace as service: SwissdesktopVirtualized PC workplace as service: Swissdesktop
Virtualized PC workplace as service: SwissdesktopChris Peter ⓥ
 
TDC2018SP | Trilha Cloud - Why Apache CloudStack
TDC2018SP | Trilha Cloud - Why Apache CloudStackTDC2018SP | Trilha Cloud - Why Apache CloudStack
TDC2018SP | Trilha Cloud - Why Apache CloudStacktdc-globalcode
 
KVH Data Center Solutions
KVH Data Center SolutionsKVH Data Center Solutions
KVH Data Center SolutionsKVH Co. Ltd.
 
Optimal Azure Database Development by Karel Coenye
 Optimal Azure Database Development by Karel Coenye Optimal Azure Database Development by Karel Coenye
Optimal Azure Database Development by Karel CoenyeITProceed
 
ParaScale At The Gartner It Expo
ParaScale At The Gartner It ExpoParaScale At The Gartner It Expo
ParaScale At The Gartner It ExpoParaScale Marketing
 
Define the it costs of your startup (HackAlgeria hackathon)
Define the it costs of your startup (HackAlgeria hackathon)Define the it costs of your startup (HackAlgeria hackathon)
Define the it costs of your startup (HackAlgeria hackathon)Amine Bendahmane
 
Big Data as PaaS in Enterprises
Big Data as PaaS in EnterprisesBig Data as PaaS in Enterprises
Big Data as PaaS in EnterprisesPankaj Khattar
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companiesSamrudhi Maknikar
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualizationmazin Salih
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosVeritas Technologies LLC
 
Cloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterCloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterEntel
 

What's hot (19)

Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
Mini Formation - Microsoft Data Center Dublin
Mini Formation - Microsoft Data Center DublinMini Formation - Microsoft Data Center Dublin
Mini Formation - Microsoft Data Center Dublin
 
Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)
 
Infrastructure as a Service
Infrastructure as a ServiceInfrastructure as a Service
Infrastructure as a Service
 
ScimoreDB - Enterprise level database
ScimoreDB - Enterprise level databaseScimoreDB - Enterprise level database
ScimoreDB - Enterprise level database
 
Cloud Computing IaaS
Cloud Computing IaaSCloud Computing IaaS
Cloud Computing IaaS
 
Virtualized PC workplace as service: Swissdesktop
Virtualized PC workplace as service: SwissdesktopVirtualized PC workplace as service: Swissdesktop
Virtualized PC workplace as service: Swissdesktop
 
TDC2018SP | Trilha Cloud - Why Apache CloudStack
TDC2018SP | Trilha Cloud - Why Apache CloudStackTDC2018SP | Trilha Cloud - Why Apache CloudStack
TDC2018SP | Trilha Cloud - Why Apache CloudStack
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
KVH Data Center Solutions
KVH Data Center SolutionsKVH Data Center Solutions
KVH Data Center Solutions
 
Optimal Azure Database Development by Karel Coenye
 Optimal Azure Database Development by Karel Coenye Optimal Azure Database Development by Karel Coenye
Optimal Azure Database Development by Karel Coenye
 
ParaScale At The Gartner It Expo
ParaScale At The Gartner It ExpoParaScale At The Gartner It Expo
ParaScale At The Gartner It Expo
 
Define the it costs of your startup (HackAlgeria hackathon)
Define the it costs of your startup (HackAlgeria hackathon)Define the it costs of your startup (HackAlgeria hackathon)
Define the it costs of your startup (HackAlgeria hackathon)
 
Big Data as PaaS in Enterprises
Big Data as PaaS in EnterprisesBig Data as PaaS in Enterprises
Big Data as PaaS in Enterprises
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companies
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil Dobos
 
Cloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterCloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic Datacenter
 

Similar to Network Attached Storage Security

How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”Hardway Hou
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS) Kshitij Shete
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingRutuja751147
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services OverviewMichael Fork
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyNexenta Systems
 
ARX Technology Briefing - man.pptx
ARX Technology Briefing - man.pptxARX Technology Briefing - man.pptx
ARX Technology Briefing - man.pptxSukiramSukiram
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaBlaze Arizanov
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage systemZhichao Liang
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)Michael Fork
 
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Doug O'Flaherty
 
Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar:  Overcoming the Top 3 Challenges of the Storage Status QuoWebinar:  Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar: Overcoming the Top 3 Challenges of the Storage Status QuoStorage Switzerland
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015Doug O'Flaherty
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzadkhurrak_shahzad
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxSakshiGawde6
 

Similar to Network Attached Storage Security (20)

How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
Nas Ashok1
Nas Ashok1Nas Ashok1
Nas Ashok1
 
Cloud storage infrastructures
Cloud storage infrastructuresCloud storage infrastructures
Cloud storage infrastructures
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability Technology
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
ARX Technology Briefing - man.pptx
ARX Technology Briefing - man.pptxARX Technology Briefing - man.pptx
ARX Technology Briefing - man.pptx
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
 
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
 
Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar:  Overcoming the Top 3 Challenges of the Storage Status QuoWebinar:  Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 

More from BU

Variables
VariablesVariables
VariablesBU
 
Do while loop
Do while loopDo while loop
Do while loopBU
 
Conditional operators
Conditional operatorsConditional operators
Conditional operatorsBU
 
Tarjumaye jadwali-quran-karim-pdf
Tarjumaye jadwali-quran-karim-pdfTarjumaye jadwali-quran-karim-pdf
Tarjumaye jadwali-quran-karim-pdfBU
 
Operating system concepts 5th edition by silberschatz & galvin
Operating system concepts 5th edition by silberschatz & galvinOperating system concepts 5th edition by silberschatz & galvin
Operating system concepts 5th edition by silberschatz & galvinBU
 
IP Routing
IP RoutingIP Routing
IP RoutingBU
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Handy back up installation
Handy back up installationHandy back up installation
Handy back up installationBU
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxyBU
 
Crash plane-backup-solution
Crash plane-backup-solutionCrash plane-backup-solution
Crash plane-backup-solutionBU
 

More from BU (10)

Variables
VariablesVariables
Variables
 
Do while loop
Do while loopDo while loop
Do while loop
 
Conditional operators
Conditional operatorsConditional operators
Conditional operators
 
Tarjumaye jadwali-quran-karim-pdf
Tarjumaye jadwali-quran-karim-pdfTarjumaye jadwali-quran-karim-pdf
Tarjumaye jadwali-quran-karim-pdf
 
Operating system concepts 5th edition by silberschatz & galvin
Operating system concepts 5th edition by silberschatz & galvinOperating system concepts 5th edition by silberschatz & galvin
Operating system concepts 5th edition by silberschatz & galvin
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Handy back up installation
Handy back up installationHandy back up installation
Handy back up installation
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxy
 
Crash plane-backup-solution
Crash plane-backup-solutionCrash plane-backup-solution
Crash plane-backup-solution
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Network Attached Storage Security

  • 1. Department of Computer Science & Engineering Amity School of Information Technology Amity University Haryana Mr. Ganesh Gupta Department of Computer Science & Engineering Amity School of Information Technology Amity University Haryana Seminar Paper On Network Attached Storage Security Under guidance of Ms. Shivali Dhaka Presented By: Said Masihullah Hashimi MSc. NTM II Sem Enrollment No: A50500818003
  • 2. Contents • Introduction – Network Attached Storage – NAS Types – Work Procedure – Functions – Advantage and Disadvantage • Network Attached Storage Security – Security Principles • Future of Network Attached Storage Security – NAS vs SAN – Cloud Based File Storage • Conclusion
  • 3. Introduction • Data is critical asset of any company or organization. • Any big or small businesses data storage needs: – Lower Cost Options – Ease of Operations (many small business don’t have IT staff) – Ease of data backup (always accessible) – Growth Capability • Network Attached Storage provides the solution for such problems. – NAS is device connected to a network that allows storage and retrieval of data from a central location to authorized network users and clients
  • 4. Network Attached Storage • NAS Devices has the following characteristics. – Simple to operate (A dedicated IT is not often required) – Lower cost from dedicated File Servers – Easy data backup (always accessible) – Good at centralizing data storage in a safe and reliable way. – Easier remote access like cloud from anywhere in the network. – Small in size and easy for relocation. – Flexible and expandable when ever we need more space.
  • 5. Network Attached Storage Types NAS Types Types Usage Benefits Consolidation Advanced Features/Benefits Low-end NAS Fast, Simple file storage Low cost: No special training Consolidates desktop storage Simplified backup Midmarket NAS Shared access to large volumes of files Low cost: Easily scaled to multiple terabyte: no special skills required Consolidates multiple file servers Clustering: Point-in-time snapshot High-end NAS Shared access to large volumes of files: Integrates with SAN Low cost: scalable: migration path Consolidates many file servers: potential for NAS- SAN consolidation Clustering replication: Gateway to SAN: multiprotocol support management
  • 7. Network Attached Storage Functions • File Sharing • Data backup / Disaster Recovery (with some software or windows backup) • Network Printing • Multimedia File Sharing • Media Server
  • 8. NAS Advantages and Disadvantages NAS Pros and Cons Approach Pros Cons Best Fits NAS gateways  Available SAN Storage can be used  Easy, Single-vendor migration tool  Upgrade back end or front end separately  Capacity and performance are limited to what is available behind the gateway.  Large, enterprise-class user that have a SAN  Single-vendor consolidation Integrated NAS  No SAN requirements: Simpler configuration  Easy, Single-vendor migration tool  Compare to gateway, the file system performance and capacity maybe limited  All-or-nothing performance upgrades  Small-sized to enterprise-class users without a SAN  Single vendor consolidation Clustered File System  Able to scale out  Performance of servers can be dilated to whatever is required  Some vendors have limited or no CIFS support  Large compute cluster users requiring high performance access to file data Parallel File System  Able to scale out  Parallel file system improves throughput and performance  Some vendors don’t support CIFS or have limited NFS support  Parallel file access only available on limited clients and requires special client software  Large compute cluster users requiring high performance access to file data  Anybody needing parallel access to file data NAS Aggregators  Heterogeneous box consolidation  Single namespace over multiple NAS boxes  Added overhead  Additional hardware to install, configure and maintain  Multibox, multivendor environment single namespace configurability / usability
  • 9. Network Attached Storage Security • From the NAS perspective, we need to look at the: - Access to shared data - Access to administrative functions. -Access to the NAS device over a network. • The access to shared data is setting up permissions and access control lists to designate who has access to what data and the rules for simultaneous access. • The administrative function on the NAS device also needs to be secure. This means that only an authorized person can access the system. • The access to a NAS device over an Ethernet network using IP is also one of the areas that in the past has been exploited for security breaches. • Data being altered or monitored in the individual IP packets being transmitted is also a security concern.
  • 10. Network Attached Storage Security Principles • Always change default passwords • Do not click suspicious links in emails or elsewhere, especially if they redirect to your local network (http://192.168.x.x for example) • Use random, alphanumeric passwords for both your router and NAS logins • Regularly update the firmware on your router or NAS. Turn on automatic updates if supported.
  • 11. Network Attached Storage Security Principles – Securing Router • Changing Default Passwords • Enabling HTTPS • Enable WPA2 – Securing NAS • Changing Admin accounts and passwords • Enabling SSL • Blocking extra ports • Using VPN
  • 12. Future of Network Attached Storage – NAS with Gigabit Ethernet Capability, more scale-out support – Object Storage (Unstructured Data) replacing NAS. – Cloud based file storage. – Direct Attached Storage
  • 13. Conclusion • Configuring NAS security is not something hard. • Built-in features to modern devices available. • Locking and securing NAS is just a matter of properly keeping the security principles in mind. • A NAS has been a great addition to the home or office business environments. • Cloud backup solutions for the NAS are available to prevent data loss.
  • 14.
  • 15. ?