• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Methods of Information Security in the Storage Systems

Student: Kiselev Kirill

Supervisor: Elena Baranova

Faculty: Graduate School of Business

Educational Programme: Business Informatics (Bachelor)

Year of Graduation: 2017

In this work the device storage systems and the methods, used to protect the information contained in them, increase their fault tolerance, minimize losses and recovery time in the event of an emergency, are studied. The main goal of the work was to review the list of the main backup technologies currently used in data storage systems of various sizes. The goal of the practical addition was to develop a sequence of actions needed for configuring the redundant array of independent disks using the Huawei hardware platform. The tasks were set as follows: to describe what type of threats the data backup can protect from, which information carriers are the most suitable for creating backups, how enterprises define the aspects of information storage, transmission and processing that require special attention, what technologies of backup and redundancy they use, what are the advantages and disadvantages of such technologies; In addition, it was supposed to research practically the principles of backup systems building by creating and configuring of the disk arrays LSISA 2208 and LSISA 2308. The information security literature analysis was carried out to fulfill the goals and tasks of this research. As a result, an overview of classifications of information security threats to accessibility and information integrity in data storage systems was made. This research also contains the main methods for analyzing weaknesses in companies information security ensuring and the interpretation of the concepts used in this information technology sphere. In addition, disk arrays and tape libraries as the most common carriers for data storage systems were studied and the most frequently used technologies for protecting them from data loss were researched (3 technologies of preventing of logical and physical distortions of the data, and also 7 strategies). The work contains a detailed description of the RAID configuration.

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses