Data Center Tiers Security Service

سال انتشار: 1390
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,603

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

SASTECH05_155

تاریخ نمایه سازی: 22 مرداد 1391

چکیده مقاله:

The heartbeat of any organization is its Data Centers. Employees, partners, and customers rely on data and resources in the Data Centers to effectively create, collaborate and interact for their business. Over the last decade, the rise of Internet and Web-based technologies has made the Data Centers more strategic than ever, improving productivity, enhancing business processes, and accelerating change. Data centers are the strategic focus of IT efforts to protect and optimize the growth of businesses.Therefore, IT organizations must improve operational efficiency, optimize utilization of Datacenters resources, and release funds for innovative new IT projects that help generate revenue. Data centers have evolved significantly as organizations consolidate servers, applications, and other resources, and as they adopt new technologies as a means to reduce costs and increase efficiency. However, technologies such as Server Virtualization, Virtual Machines and Web services eliminate this coupling and create a mesh of interactions between systems that create subtle and significant new security risks. Consequently, Datacenters managers face several security challenges in fulfilling their goals.In this paper, we want to present a framework for developing risk-driven enterprise information security and information assurance architectures and for delivering security infrastructure solutions that support critical business initiatives. This paper also discusses multi-tier architecture, This Model comprises four layers, and it follows closely the work done by John A. Zachman in developing a model for enterprise architecture. Each tier has a different role in the process of specifying, designing, constructing and using the building. It has a security service management that has been placed vertically across the other layers which manages other layers.

نویسندگان

S Janosepah

Falculty member in IAU Majlesi Branch and M.s Student in IAU EUA, Isfahan, Iran

N Modiri

Faculty member in IAU Zanjan Branch, Tehran, Iran

M.V Malakooti

Faculty member in IAU EUM, Dubai, Emirate

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Cisco Systems (2007), "Cisco Data Center Infrastructure 2.5 Design Guide". ...
  • Cisco Systems (2010), "Next Generation Data center Architecture", Cisco System. ...
  • Dawoud, W. (2010), "Infrastructure as a service security: Challenges and ...
  • Talukder, A.K. (2009), "Security & scalability architecture for next generation ...
  • John A. Zachman (1987), "A Franework for Information Systems Architecture." ...
  • Kailash Jayaswal (2006), "Administering Data Centers: Servers, Storage, and Voice ...
  • نمایش کامل مراجع