International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 252 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Information Security | India | Volume 10 Issue 12, December 2021 | Popularity: 4.6 / 10


     

Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Ankit Srivastava, Jatin Nagpal


Abstract: In today's cyber world every bit of information is precious and the attempt to exploit this is unprecedented. From script kiddies to state - sponsored hacking groups, all are continuously attempting to breach into the systems for various reasons including complete service disruption. Directly or indirectly all sorts of data are stored in data centers whether it is for cloud service or for on - premises solutions. Security operation centers compliment data centers by providing required security measures. To ensure the security of Data Centers lots of security features are required to be implemented which can be ensured by establishing a security operation center (SOC).


Keywords: Security Operation Center, Multi - Layered Network, End to End Encryption, DDoS Mitigation, DNS Security Solution, SIEM, WAF, Workload Security, Network Behavior Analysis


Edition: Volume 10 Issue 12, December 2021


Pages: 77 - 79



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ankit Srivastava, Jatin Nagpal, "Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview", International Journal of Science and Research (IJSR), Volume 10 Issue 12, December 2021, pp. 77-79, URL: https://www.ijsr.net/getabstract.php?paperid=SR211130123410, DOI: https://www.doi.org/10.21275/SR211130123410



Downloads: 246 | Views: 468 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 8 Issue 11, November 2019

Pages: 95 - 101

Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)

S K. Niamathulla


Downloads: 221 | Views: 647 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Downloads: 161 | Views: 323 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G


Downloads: 148 | Views: 295 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Downloads: 144 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara


Top