Data center authority distribution and cyber-defense modeling

Authors

  • Artemii Kropachev Bell Integrator USA
  • Denis Zuev Network and Cloud

DOI:

https://doi.org/10.18372/2410-7840.20.12452

Keywords:

Data Center, authority distribution, data loss vectors, channel capacity, cyber-attack, bandwidth exhaustion

Abstract

Data Center authority distribution and cyber-defense measures development was analyzed. It was shown that paradigm of openness and information sharing as a cultural norm significantly enlarges number data loss vectors. Analysis demonstrated that on physical level main trend of irresponsible information sharing is exponential growth of the information recording density which was caused by reduction in data storage price. It led to network channel capacity growth and decentralization of information systems in order to organize effective communication infrastructure. It was proposed to divide data loss vectors into groups of people-based vulnerabilities, process-based vulnerabilities and technology-based vulnerabilities. Data loss prevention strategies should be based on data classification methodology. In this work there were used two classification schemes: one of them divides confidential data into categories of customer data, employees’ data, transaction data, corporate data. Other one analyzes data loss threat in concordance to the states in the data lifecycle as data at rest, data in motion and data in use. It was mentioned that use of Data Center services significantly increases efficiency of IT infrastructure and data loss prevention strategy implies that for stored confidential data has to be used virtual server that provides a guaranteed part of the Data Center server resources. It was considered that data loss prevention strategy includes stages of data governance, data loss prevention management and information security support. After development of Data Center infrastructure authority distribution, security policies and cyber-defense measures cyber-attack probability could be calculated as sum of bandwidth exhaustion, filtering depletion and memory depletion probabilities.

Author Biographies

Artemii Kropachev, Bell Integrator USA

Bell Integrator USA Automation Solution Department Manager

Denis Zuev, Network and Cloud

Independent Consultant Lead Arcitect, Network and Cloud

References

Z. Sojaat, K. Skalaa, "The dawn of Dew: Dew Computing for advanced living environment", 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017, doi:10.23919/mipro.2017.7973447.

M. Vermaat, S. L. Sebok, S. M. Freund, J. T. Campbell, M. Frydenberg, Discovering computers 2018: Digital technology, data, and devices, Boston, MA: Cengage Learning, 2017.

S. Pulickal, Data Center: An emerging real estate asset class, 2013.

M. T. Raggo, "Understanding Mobile Data Loss Threats", Mobile Data Loss, pp. 7-16, 2016, doi:10. 1016/b978-0-12-802864-3.00002-7.

M. Harris, "Data Center Infrastructure Management", Data Center Handbook, pp. 601-618, 2014, doi:10.1002/ 9781118937563.ch33.

V. Mulay, "Environmental Control of Data Centers", Data Center Handbook, pp. 343-357, 2014, doi:10.1002/ 9781118937563.ch18.

Ch. O. Kennedy, Security Operations Center Guidebook, 2017, Iv. doi:10.1016/b978-0-12-803657-0.00022-2.

Published

2018-03-27

Issue

Section

Articles