visit
is essentially a group of hard drives connected through a fiber-optic network. It is also called a storage area network (NAS for short). Data is split into blocks (thus the name “block storage”) and stored into different clusters in the storage medium. The data blocks may be split into different clusters. The applications needing such data blocks will have to access them through their unique addresses.How data gets split into blocks and which clusters each block goes into is handled by an independent software. Block storage is mainly used for data that is structured. It offers a way for such data to be changed. It performs input/output operations consistently. Thus, it is an ideal choice for applications such as databases that require such consistency.
In , data is stored as objects. Each object contains the actual data, or the blob, and a portion of metadata. The metadata includes a unique identifier for each object called a UUID (universally unique identification) that allows quick access to data. In contrast to block storage, where accessing each piece of data may require several steps (if each cluster is mounted in a file system, for example), object storage access is quick and easy.Another major advantage of object storage is that the data need not be structured. This makes it ideal for storing multiple types of data such as images, videos, notes, etc. It is also perfect for storing high volumes of data as you can store virtually unlimited amounts.The only drawback to object storage is that you cannot update the data already stored. The only way to change the data already in the storage is to add a new version of such data and refer your application to the new UUID so it may grab the updated version.
Level 1 attacks can create havoc in terms of security and are not caused by a malicious person gaining access to the storage system. They are caused mainly due to personnel incompetence at best and negligence at worst. For instance, wrong configurations may cause unauthorized personnel to access data they shouldn’t be able to.
Level 2 attacks are those done with the actual intention of hacking a data center. The motive may be to access and steal data or to destroy the data altogether. An example of such an attack would be when the attacker takes on the identity of someone with access and data manipulation authority.
Level 3 attacks are what great sci-fi/hacking movies are made of. While not very common, the magnitude of the damage these can cause is enormous. Level 3 attacks are made with utmost sophistication, and massive technology is involved. Thus, it only happens when the attacker is a big entity in itself (capable of investing in the requisite infrastructure and technology).
In each case, attacks can come from several sources. They can result from unauthorized access (can be either a Level 1 or Level 2 attack). Then we have data sniffing, where the attacker taps into the network traffic and can copy data being transferred over the network.As the business value of the data stored increases, we see huge investments made to secure them. For instance, aside from software measures, we see physical security solutions being employed for database locations.While security needn’t be the primary motivation for selecting which storage technology to use, it should be a major factor. For instance, databases mostly use Block Storage but can benefit from having a “worse-comes-to-worst” backup stored in an object storage facility (employing WORM).