Security in Data Center

Get Started. It's Free
or sign up with your email address
Security in Data Center by Mind Map: Security in Data Center

1. Objectives

1.1. Describe the risks of absence of security policy in Data Center

1.2. Identify solutions for network system protection and data security

1.3. show security solutions for data center, through the ISO 27000

2. Theory

2.1. It was decided to use the normal ISO 27000 due to the scope of its controls, it can be used to guide the implementation of a methodology for auditing and Security Standards in computer networks. (ANTONIO; TONIZETTI, 2008)

2.2. The purpose of control are control targets are to be achieved, Or negative effects to be avoided, to achieve these purposes. Translated into audit methods. (TONIZETTI,ANTONIO: 2008)

2.3. The audit methods form a group of actions (tabulations and analysis) that allows to acquire and assess the information necessary for the formulation of the opinion of the auditor. (TONIZETTI,ANTONIO: 2008)

3. Architecture

3.1. Physical

3.1.1. 1. Physical Architecture 2. Capacity Location. 3. Security. 4. Cooling of physical space. 5. Power Service

3.2. Logical

3.2.1. 1. Routers 2. Switches 3. Firewalls 4. Server

4. Author

4.1. Oliveira, Lucas: 2017.

4.2. Perez, Marcos: 2017.

5. Data Center

5.1. A data center is a type of value-added service that provides resources for processing and storage of data on a large scale to organizations of any size. (BEAL: 2005).

5.2. The data center which has as one of its main functions: to support the basis of all the servers of a company with the goal of achieving a stability by reducing to the maximum the physical risks in the machines of the servers. (BEAL: 2005).

6. Security

6.1. You can have your system invaded, ruined and with information stolen by crackers. (MANUEL: 2007).

7. Characteristics

7.1. Keep and protect data of a company . (BEAL: 2005)

7.2. Provided applications and services (web hosting, intranet, telecommunications and information technology). (BEAL: 2005).

7.3. Store, process and exchange information. (BEAL: 2005)