CHFI

Understanding Bit, Nibble and Byte

Understanding Bit, Nibble and Byte in this article explained  Bit , Nibble and Byte Data storage format of hard disk with how to calculate it.

Bit

A bit, short for binary digit is the smallest unit of data or basic information unit in computing and digital communications. It can contain only one of the two values represented as 0 or 1. They also represent logical values such as true/false, yes/no, activation states (on/off), algebraic signs (+/-) or any other two-valued attribute.

Byte

A byte, short for binary term is a digital information unit of data that consists of eight bits. The byte is representation of the number of bits a system has used to encode one text character. Therefore, it is the smallest addressable memory unit in many computer architectures. Two hexadecimal digits represent a full byte or octet.

Nibble

A nibble, also known as half-byte or tetrade is a collection of four bits or half of an octet in computing. Common representation of a byte is two nibbles.

Related Product : Computer Hacking Forensic Investigator | CHFI

Hard Disk Data Addressing

Hard disk data addressing is the technique of assigning addresses to physical blocks of data on the hard drives. There are two types of hard disk data addressing:

1. CHS (Cylinder-Head-Sector)

This process identifies individual sectors on a hard disk according to their positions in a track, and the head and cylinder numbers determine these tracks. It associates information on the hard drive by specifications such as head (platter side), cylinder (radius), and the sector (angular position).

2. LBA (Logical Block Address)

It addresses data by allotting a sequential number to each sector of the hard disk. The addressing mechanism specifies the location of blocks of data on computer storage devices and secondary storage systems such as hard disk drives, SCSI, and enhanced IDE drives. This method does not expose the physical details of the storage device to the operating system.

Data Densities on a Hard Disk

Hard disks store data using the zoned bit recording method, which is also known as multiple-zone recording. In this technique, tracks form a collection of zones depending on their distance from the center of the disk and the outer tracks have more sectors on them than the inner tracks. This allows the drive to store more bits in each outer track compared to the innermost zone and helps to achieve a higher total data capacity.

1. Track Density

It refers to the space a particular number of tracks require on a disk. The disks with greater track density can store more information as well as offer better performance.

2. Areal Density

It refers to the number of bits per square inch on a platter and it represents the amount of data a hard disk can hold.

3. Bit Density

It is the number of bits a unit length of track can accommodate.

Also Read : Tracks & Advanced Format of Sectors

Disk Capacity Calculation

Calculate

A disk drive that has:
  • 16,384 cylinders
  • 80 heads
  • 63 sectors per track

Assume a sector has 512 bytes. What is the capacity of such a disk?

Answer :  The conversion factors appropriate to this hard disk are

  • 16,384 cylinders / disk
  • 80 heads / cylinder
  • 63 sectors / track
  • 512 bytes / sector

Solution

Total bytes = 1 disk * (16,384 cylinders / disk) * (80 heads / cylinder) (1 track / head) * {63 sectors / track) * (512 bytes / sector) = 42,278,584,320 bytes 1 Kilobyte (KB) = 2^10 bytes = 1,024 bytes

1 Megabyte (MB) = 2^20 bytes = 1,048,576 bytes = 1,024 KB

1 Gigabyte (GB) = 2^90 bytes = 1073,741,824 bytes =1,048,576 KB = 1,024 MB

1 Terabyte (TB) = 2^40 bytes = 1,099,511,627,776 bytes = 1,073,741,824 KB = 1,048,576 MB= 1,024 GB

Using these definitions, express the result in GB as:

42,278,584,320 bytes / {1,073,741,824 bytes / GB) = 39.375 GB

Hard disk in a typical computer system has a storage capacity. Data is stored on the hard disk in the form of files.

Read More : https://info-savvy.com/understanding-bit-nibble-and-byte/


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

ISO 27001

ISO 27001 Annex : A.14.2.6 Secure Development Environment, A.14.2.7 Outsourced Development, A.14.2.8 System Security Testing & A.14.2.9 System Acceptance Testing

In this article explain ISO 27001 Annex : A.14.2.6 Secure Development Environment, A.14.2.7 Outsourced Development, A.14.2.8 System Security Testing & A.14.2.9 System Acceptance Testing.

A.14.2.6  Secure Development Environment

Control – ISO 27001 Annex : A.14.2.6 Secure Development Environment in this Organizations should create secure development environments and integration efforts for the entire life cycle of system development and should be adequately protected.

Implementation Guidance – A secure development environment includes people, processes, and technology in the development and integration of systems.

Organizations should evaluate the risks associated with the development of individual systems and establish secure development environments for specific system development efforts, taking into account the following points:

  1. Sensibility of processing, storage and transmission of data through the system;
  2. External and internal guidelines applicable, e.g. laws or policies;
  3. Security controls already carried out by the organization that endorses the development of the system;
  4. the reliability of personnel working in the environment;
  5. The level of outsourcing associated with the production of the system;
  6. The need for segregation between different environments for development;
  7. Access control to the environment for development;
  8. Monitoring environmental changes and the code contained in them;
  9. Secure offsite locations of backups are stored;
  10. Data transfers from and to the environment are controlled.

When the level of security is established for a specific development context, organizations will record and provide the corresponding processes to all or any individual who needs them in secure development processes.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

A.14.2.7  Outsourced Development

Control – The organization must monitor and monitor activity for the development of the outsourced system.

Implementation Guidance – If system development is outsourced, it is necessary to consider the following points across the entire external supply chain of the organization;

  1. Outsourced content licensing arrangements, code ownership and intellectual rights;
  2. Secure design, coding and testing requirements; contractual requirements;
  3. Providing the external developer with the approved threat model;
  4. Quality and accuracy of deliverables acceptance testing;
  5. Provide evidence that security criteria have been used for minimum appropriate security and privacy standards;
  6. provide evidence that enough testing has been applied to prevent both deliberate and unintentional malicious content from being delivered;
  7. provide proof that adequate research was used to defend against known vulnerabilities; collection of data;
  8. escrow schemes, for example, when source code is no more available
  9. Contractual right to inspect processes and controls for development;
  10. Efficient development environment documents used to construct deliverables;
  11. Compliance with applicable laws and monitoring effectiveness verification shall remain a responsibility of the organization.

Other Information – Additional information on provider relations is frequently available in ISO / IEC 27036.

Also Read : ISO 27001 Annex : A.14.2.3 , A.14.2.4  & A.14.2.5 

A well-known ISO 27001 Lead Auditor and ISO 27001 Lead Implementer certificate that mainly covers information security clauses and their implementation, i.e., controls which should be implemented by the organization to preserve the CIA triad, Confidentiality, Integrity, and Availability to maintain their critical, sensitive information in a secure manner. Infosavvy, an institute in Mumbai conducts training and certification for multiple domains in Information Security which includes IRCA CQI ISO 27001:2013 Lead Auditor (LA)ISO 27001 Lead Implementer (LI) (TÜV SÜD Certification). Infosavvy will help you to understand and recognize the full scope of your organization’s security checks to protect your organization’s activities and information equipment (assets) from attacks, and also to illustrate the controls for securing system engineering principles and also controls for maintaining and testing software packages and systems. We have trainers with extensive expertise and experience to ensure the efficient handling of the security of information. Consequently, the applicant will gain the necessary skills for the ISMS audit by using commonly agreed audit concepts, procedures and techniques….

Read More : https://info-savvy.com/iso-27001-annex-a-14-2-6-a-14-2-7-a-14-2-8-a-14-2-9/


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com