Downloads: 2 | Views: 252 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article | Information Security | India | Volume 10 Issue 12, December 2021 | Popularity: 4.6 / 10
Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview
Ankit Srivastava, Jatin Nagpal
Abstract: In today's cyber world every bit of information is precious and the attempt to exploit this is unprecedented. From script kiddies to state - sponsored hacking groups, all are continuously attempting to breach into the systems for various reasons including complete service disruption. Directly or indirectly all sorts of data are stored in data centers whether it is for cloud service or for on - premises solutions. Security operation centers compliment data centers by providing required security measures. To ensure the security of Data Centers lots of security features are required to be implemented which can be ensured by establishing a security operation center (SOC).
Keywords: Security Operation Center, Multi - Layered Network, End to End Encryption, DDoS Mitigation, DNS Security Solution, SIEM, WAF, Workload Security, Network Behavior Analysis
Edition: Volume 10 Issue 12, December 2021
Pages: 77 - 79
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 246 | Views: 468 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Security, India, Volume 8 Issue 11, November 2019
Pages: 95 - 101Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)
S K. Niamathulla
Downloads: 221 | Views: 647 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Downloads: 161 | Views: 323 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G
Downloads: 148 | Views: 295 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2678 - 2678Cyber Security - A Business Accelerator??
Riya V S, Dr. Aarthy C
Downloads: 144 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Security, Kenya, Volume 7 Issue 1, January 2018
Pages: 345 - 350Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza, Samuel Liyala, Solomon Ogara