Cisco Cisco NSS030 Smart Storage External Power Adapter 白皮書
Security Considerations White Paper for Cisco Smart Storage
25
White Paper
Figure 21 Security Level Configuration
Conclusion
“You can’t outrun the Bear” but there are ways to avoid being eaten. One is to be
faster than the guy next to you. The other is to make it difficult and not worth the
effort for the bear to chase you. In either case, you have to do something. It is
difficult to render the system bullet-proof from hackers and attacks without
effecting the system usability and accessibility. The key is to consider the trade-
offs very carefully between the convenience and utility of enabling WAN based
access to the NAS, and various services (MySQL, Web Server, etc.) versus the
security risks. If improperly assessed, the end result can lead to loss of sensitive
information (confidential company information, marketing strategies, etc.),
correspondence (emails, contacts), or financial details.
Cisco, Cisco Systems, the Cisco logo, and the Cisco Systems logo are registered trademarks or trademarks of Cisco and/or its affiliates in the
United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective
owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1002R)
© 2010 Cisco Systems, Inc. All rights reserved.
OL-23025-01