Data center authority distribution and cyber-defense modeling
DOI:
https://doi.org/10.18372/2410-7840.20.12452Keywords:
Data Center, authority distribution, data loss vectors, channel capacity, cyber-attack, bandwidth exhaustionAbstract
Data Center authority distribution and cyber-defense measures development was analyzed. It was shown that paradigm of openness and information sharing as a cultural norm significantly enlarges number data loss vectors. Analysis demonstrated that on physical level main trend of irresponsible information sharing is exponential growth of the information recording density which was caused by reduction in data storage price. It led to network channel capacity growth and decentralization of information systems in order to organize effective communication infrastructure. It was proposed to divide data loss vectors into groups of people-based vulnerabilities, process-based vulnerabilities and technology-based vulnerabilities. Data loss prevention strategies should be based on data classification methodology. In this work there were used two classification schemes: one of them divides confidential data into categories of customer data, employees’ data, transaction data, corporate data. Other one analyzes data loss threat in concordance to the states in the data lifecycle as data at rest, data in motion and data in use. It was mentioned that use of Data Center services significantly increases efficiency of IT infrastructure and data loss prevention strategy implies that for stored confidential data has to be used virtual server that provides a guaranteed part of the Data Center server resources. It was considered that data loss prevention strategy includes stages of data governance, data loss prevention management and information security support. After development of Data Center infrastructure authority distribution, security policies and cyber-defense measures cyber-attack probability could be calculated as sum of bandwidth exhaustion, filtering depletion and memory depletion probabilities.References
Z. Sojaat, K. Skalaa, "The dawn of Dew: Dew Computing for advanced living environment", 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017, doi:10.23919/mipro.2017.7973447.
M. Vermaat, S. L. Sebok, S. M. Freund, J. T. Campbell, M. Frydenberg, Discovering computers 2018: Digital technology, data, and devices, Boston, MA: Cengage Learning, 2017.
S. Pulickal, Data Center: An emerging real estate asset class, 2013.
M. T. Raggo, "Understanding Mobile Data Loss Threats", Mobile Data Loss, pp. 7-16, 2016, doi:10. 1016/b978-0-12-802864-3.00002-7.
M. Harris, "Data Center Infrastructure Management", Data Center Handbook, pp. 601-618, 2014, doi:10.1002/ 9781118937563.ch33.
V. Mulay, "Environmental Control of Data Centers", Data Center Handbook, pp. 343-357, 2014, doi:10.1002/ 9781118937563.ch18.
Ch. O. Kennedy, Security Operations Center Guidebook, 2017, Iv. doi:10.1016/b978-0-12-803657-0.00022-2.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).