View Single Post
Old 03-15-2014, 01:43 PM   #17
chaley
Grand Sorcerer
chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.chaley ought to be getting tired of karma fortunes by now.
 
Posts: 12,476
Karma: 8025702
Join Date: Jan 2010
Location: Notts, England
Device: Kobo Libra 2
Quote:
Originally Posted by theducks View Post
I am not sure why connecting storage to the router would be much different than elsewhere on the network. Because of no A/V?
Still

Because the same processor that controls the router security has direct access to the disc. Should some bad guy figure out how to penetrate the router, job done. If the storage is across the local LAN, then the bad guy must penetrate the router, and then penetrate the machine hosting the storage using only the access the LAN gives, adding a second layer of difficulty and another opportunity to detect the intrusion.

The is the same logic that people use when they set up a DMZ: a section of the LAN that is behind the entry router but in front of the company's assets. Customer-facing servers live there, getting their data through a security gateway between the DMZ and the company's computing infrastructure. Some people actually use 2 DMZs, putting the internal/external shared data in the second while putting the rest of the infrastructure after the second.
chaley is offline   Reply With Quote