ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Journal: International Journal of Science and Research (IJSR) (Vol.10, No. 12)

Publication Date:

Authors : ; ;

Page : 77-79

Keywords : Security Operation Center; Multi - Layered Network; End to End Encryption; DDoS Mitigation; DNS Security Solution; SIEM; WAF; Workload Security; Network Behavior Analysis;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today's cyber world every bit of information is precious and the attempt to exploit this is unprecedented. From script kiddies to state - sponsored hacking groups, all are continuously attempting to breach into the systems for various reasons including complete service disruption. Directly or indirectly all sorts of data are stored in data centers whether it is for cloud service or for on - premises solutions. Security operation centers compliment data centers by providing required security measures. To ensure the security of Data Centers lots of security features are required to be implemented which can be ensured by establishing a security operation center (SOC).

Last modified: 2022-02-15 18:57:28