International Journal of Mobile Computing and Multimedia Communications, 6(3), 75-105, July-September 2014 75
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
ABSTRACT
Developing security systems to protect the storage systems are needed. The main objective of this paper is to
study the security of fle storage server of an organization. Different kinds of security threats and a number of
security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for
evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based
on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented
on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed
organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact
that organizations are not capable of following the cyber security evolution and secure their storage systems
from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the
cyber security of their storage systems by applying certain techniques.
Improving the Security
of Storage Systems:
Bahrain Case Study
Wasan Shaker Awad, Ahlia University, Manama, Bahrain
Hanin Mohammed Abdullah, University of Bahrain, Sakheer, Bahrain
Keywords: Attacks, Cyber Security, Risk Assessment, Risk Matrix, Storage Systems, Threats
INTRODUCTION
In the old days, organizations and enterprises
have had almost always a file server that is
located in a corner without being used because
employees were relying on their local disk
drives. Nowadays everything has changed and
storage systems are of high importance and of
different applications and formations. Storage
Systems is becoming a specialization by itself
and companies acquire hardware and software
storage specialists. The decision of choosing
a particular storage system over another for a
specific application and the way the system is
managed after commissioning is not straight
forward and depends on a lot of factors one of
which is the cyber security which is the area of
research and concern in this paper.
Cyber Security of systems is becoming a
major issue worldwide and it is being discussed
on the highest level of decision makers. Hav-
ing this said, the security of important systems
which affects the performance of organizations
should be assessed and improved. One of these
systems is the storage system which has cur-
rently a lot of breaches and vulnerabilities in
most of the organizations. Some of those vul-
nerabilities are the lack of access control, weak
password policies and ineffective firewall rules.
DOI: 10.4018/IJMCMC.2014070104