Where to store the file server of a small company?
Puzzled by the question of safe information storage on the server (in case the search did not pick up the server). On the one hand, you have to drive a lot of information, on the other hand would be away from the office. Internet in the office is not very bright. The idea was to hang the server under the ceiling, but there is still a probability of detection during the search. I welcome any ideas )
IMHO from a search it is better not to hide the "physical" way. Make backups, store them in the cloud, put TrueCrypt on the server and keep it safely in the office.
Schuyler.Kertzmann97 answered on October 8th 19 at 01:07
To keep in the van, and if the test is to unhook the wires and put pressure on the pedal)
Vern.Moo answered on October 8th 19 at 01:09
What is the budget for a solution?
luciano.Schmi answered on October 8th 19 at 01:11
Immured in the wall!
But seriously, the cloud will not work?
Delbert_Bauch answered on October 8th 19 at 01:13
Join the above — TrueCrypt + bakapy in the cloud. The server is hidden and only available via radio. Pgp TrueCrypt container can be placed on the virtual disk server, thus, turning off the power erases the old.
Some of the nuances.
Bakapy can be stored in the cloud, and the houses on the Trustee.
A power outage can be arranged so. Put a large, but fake a server — something like a Dual PII/PIII on a fullsized PC motherboard, boot from live media. During the search it is removed in the first place. As soon as a real server stops responding to ping sham — it also disables/encryption is provided...
Oh, by the way, thermite-theft screw on the trigger when opening the housing can also be considered as an option seem on dealextreme there is something Chinese-serial on the subject.
Schuyler.Kertzmann97 answered on October 8th 19 at 01:15
Something tells me that if the reviewer will nachnutsya such thermite thing, test will be with particular zeal)
Vern.Moo answered on October 8th 19 at 01:17
Examples from life:
1) Business center in Central Moscow. Agreed (through a friend) with the district provider about what server hosted from them, and to the office of a radio channel from a nearby building.
2) 3) Leased space for storage on the second floor (in the basement). For complete discretion — to rent their "Horns and Hoofs".
4) Powerful laptop. If anything, put in a briefcase and oritse that it is a private property and search are not eligible.
Trucrypt on the partition and backups in the cloud, the idea is very common, but do not forget that termorektalny cryptanalysis in truth works wonders! As experienced analysts in the police, alas, every second if not more. This basic protection for You as an employee of this company and the Director will be to create protection from the application of this analysis to You and other employees, and it is possible when creating a framework by which the fingers can be persuaded analysts to complete inability to get to information access.
gwen_Bashirian answered on October 8th 19 at 01:21
If possible you can try to look for in the same building where the main office, a small room. If the building was built in Soviet times, the probability of availability of basement and(or) outbuildings. Connection via WIFI.
Delbert_Bauch answered on October 8th 19 at 01:23
Continuing about the theft — after all, this is not tirmidi, and electromagnetic boxes for magnetic Erasure of information from hard for the team. Speaking of which, domestic production, are really $1500, but in the aforesaid budget fit — Clap. Key lock, in particular, can trigger for Atiku opening.
Isaias.Ki answered on October 8th 19 at 01:25
and the one with common sense:
a) either the grain to work in a dark office
b) to work so as not to violate the laws.
Garet answered on October 8th 19 at 01:27
Long ago I read an idea where you don't remember. Proceeds from "the hidden place is the most prominent place."
So, take the motherboard without LEDs, no PSU cooler, PERC + passive cooling, a couple hard.
Put it all on the table without a box, very close to the soldering iron, solder and rosin. Induced work disorder, can be a couple of circuits to print and is also close to quit.
donato_Colli answered on October 8th 19 at 01:29
Heard about the idea of placing a data center in the orbit of the earth, there is for sure no one will get it. :)
jaunita answered on October 8th 19 at 01:31
The problem as I understand it only the data? Calculations will hold the server itself (virtaully let it run)
Gigabit networking and distributed file system in encrypted with multiple containers duplicate files on all users ' machines (RAID lvm/distributed system using drbd/access containers smb), the file to execute as a user pron.avi, also more reliable you can work with supposedly the system files (on the system drive pagefile.sys and hiberfil.sys there are always contain garbage, don't have to use, people will not even know).
Starting server processes manually using the stick of a Trustee
p.s. as 90% of cases is enough in the server to cram more RAM and keep working the images there (backup the RAID to the network).
Seth.Runte answered on October 8th 19 at 01:33
In one office where I once worked, had done so: some rented room in another part of the city, which was transported all the secret servers that have been given a range of addresses from 10.0.0.0 subnet, and not pinholes or from one office, with terminal people they can connect. Just use the system Sapsan, and cost guard to press the button during the visit of the uninvited guests to the office in one part of the city, the servers themselves off in another part of the city.
herta_Kihn answered on October 8th 19 at 01:35
The task is divided into parts:
1. place the server close to where it is hard to find and where it will not be able to pick up quickly to have time to execute the procedure of Stripping
2. make a backup of the server to where it can't physically take in principle (the cloud)
3. guests can enjoy daily access to the server and becau a working key for employees
4. implement an automatic sweep by pressing the panic button, including the compromise of working key (password) officers, a sweep of the server and prepare it for the safe transfer of analysts that would be required in the case of detection.
5. a separate spare key for access betapam handed to those who are not available to cryptanalysts rectal (placed in the cell in Cyprus)
And no secrets, so there is not even hint of your disloyalty.
Panic button you can give the sysadmin, Director, accountant, security guy. Button might just call a friend.
Isaias.Ki answered on October 8th 19 at 01:37
I recall how under the bar servers in some office was mine which was the magnets.
in which case press the button and stand with storages inside passing powerful magnets.
In General, if comes serious mask show — first of all blocked communication jammers gsm/3g networks/Wi-Fi and truncated channels in the Internet. Guys friends told me that in the neighbouring office car came with a good antenna, then the mobile communication said, "Oh!" and ended until the end of the campaign.
but the problems of the Internet ended with the power outage.
God knows, but if everything is so serious...