Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required

Recently, several severe cyber attacks to commercial networks and their systems have been found more frequently compared to the last half decade. According to the analysis results from the experts, most of the attacks had similar approach to reach their goal: compromising the web server and bridging to the storage server instead of direct penetrating through the firewalls within the intranet. Because web servers are usually easier to compromise than other insiders in the server farm, this unwanted approach would be common for hackers. This means that the servers in the secured server farm became unsafe and the storage server has no exception. Because of the reason, this paper introduces the concept of the secondary backup and proposes a consequent framework.

[1]  Kazuhiko Kato,et al.  Protection and Recovery of Disk Encryption Key Using Smart Cards , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[2]  Anand Sivasubramaniam,et al.  Multi-level Crypto Disk: Secondary Storage with Flexible Performance Versus Security Trade-offs , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[3]  Min Liang,et al.  Research and design of full disk encryption based on virtual machine , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[4]  Ilsun You,et al.  Safe Authentication Protocol for Secure USB Memories , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[5]  Mahmut Kandemir,et al.  Securing Disk-Resident Data through Application Level Encryption , 2007 .

[6]  A. Tomlinson,et al.  Secure Virtual Disk Images for Grid Computing , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.

[7]  Ethan L. Miller,et al.  An experimental analysis of cryptographic overhead in performance-critical systems , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[8]  Li Jun,et al.  Trusted full disk encryption model based on TPM , 2010, The 2nd International Conference on Information Science and Engineering.

[9]  Fangyong Hou,et al.  Secure Disk with Authenticated Encryption and IV Verification , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[10]  Jian He,et al.  Research on Storage Security Based on Trusted Computing Platform , 2008, 2008 International Symposium on Electronic Commerce and Security.

[11]  Tom Coughlin,et al.  Disposal of Disk and Tape Data by Secure Sanitization , 2009, IEEE Security & Privacy.

[12]  Wen-Zhi Chen,et al.  Cerberus: A Novel Hypervisor to Provide Trusted and Isolated Code Execution , 2010, 2010 International Conference of Information Science and Management Engineering.

[13]  Shinsaku Kiyomoto,et al.  Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism , 2011, J. Internet Serv. Inf. Secur..