About this Report
The primary aim of this document is to submit a report on Data center. Several factors related to data center are considered while documenting this report such as physical issues that should be dealt with while building a data center, cloud based and infrastructure based options available for maintaining a data center. Importance of having a data center is the standpoint substantiated with accountable facts collected from surveys as referenced.
Data center is physical (sometimes virtual) block/building reserved by an organization where the private information of an organization is stored, processed and served. The data size vary from one company to other depending on their need and requirements. Data
…show more content…
When it comes to maintaining the data centers, there are important factors to be considered. Size of data center play a vital role as the computers and servers are to be increased and maintained when the data of an organizations increase day to day. In other terms scalability factor need to be considered. Maintaining suitable environment is another key factor in data center. Proper cooling and heating temperatures are to be maintained at different zones within the data centers and suitable exhaust systems are to be build. Power supply is another area to be focused. As data centers need to be alive for all the time, energy resources are to be supplied without any failures and fluctuations. All these factors deals with large investments and maintenance charges. But several cost cutting approaches and methods are being followed to reduce the cost in hosting and maintaining data centers. As an example of that “energy saving LED building practices” in data centers is followed by many organizations.
Maintaining security in Data center is another area that need to be worked at. As data should not be accessed by any third party agent/system, imposing security becomes very important. Only authorized persons are to be given access to enter and monitor the systems and processes in data centers. The authorization is achieved by providing identification to staff be means of issuing Personal Identification
1. Description of the service-summary The service that we are going to research and try to incorporate into the organization is cloud infrastructure as a service. We are planning to provide the end user with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection and redundancy of the client data. With the changes in technology and advancements in cloud services, we should be able to save some money for the organization by going to cloud infrastructure services and limiting the maintenance and hardware cost of housing our own servers.We currently house 44+ servers in our service area, most of the servers are being used to less than 30% of capacity while others are reaching a peak 80-90% capacity. The servers house the client’s p: drive (personal data) as well as
This allows arranging IT resources in close proximity with one another, instead of keeping them geographically distributed. This allows for power sharing, higher efficiency in shared IT resource usage, and enhanced accessibility for IT personnel. These are the benefits that naturally popularized the Data Center concept. Modern data centers exist as specialized IT infrastructure used to house centralized IT resources, such as servers, databases, networking and telecommunication devices, and software systems.
Company must also develop a clear structure for granting employees access to sensitive information. Not all employees need such data in order to fulfill their everyday job responsibilities. For those who need admission to sensitive information, a strong authentication mechanism must be developed, which cannot be bypassed. This will ensure that only authorized users are accessing compromising data.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
The next step option to further prevent this security will involve restricting access to data by requiring a password, personal identification numbers, or a callback procedure. This approach will restrict logon time to a maximum of 2 minutes; if the computer goes idle for 2 minutes, a login password will be required to gain access to the system. The only problem with previous approach will the redundant need to frequently reenter password, to alleviate this problem associated with redundant authentication, the organization can adopt the use of a biometric method of authentication, for example, the use iris scanner, fingerprint, or an electronic signature (Joos et al, 2010).
Typical data centers can occupy from one room to a complete building. Most equipment are server-like mounted in rack cabinets. Servers differ in size from single units to large independently standing storage units which are sometimes as big as the racks. Massive data centers even make use of shipping containers consisting of 1000’s of servers. Instead of repairing individual servers, the entire container is replaced during upgrades.
Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.
Research Objective: The main theme of this research paper is to protect sensitive information that any organization or business possess. With community’s increasing reliance on information systems and technology there is scope for security breaches, more likely to happen. Not only monetary loss it can create damage to information assets that has sensitive data. To secure these assets from any internal or external damage organizations has to follow proposed rules and guidelines. Also security responsibilities
1. What business and social problems does data center power consumption cause? Information Technology Infrastructure 2. What solutions are available for these problems? Which are environment-friendly? 3. What are the business benefits and costs of these solutions? 4. Should all firms move toward green computing? Theorprojects in this section give you Why why not?
Cloud because of its wide range of applications it allows users to store data their data remotely in the cloud and enjoy the on-demand high quality cloud applications and reveal burden from the local storage, cost and maintenance. In this according to the user’s perspective, including both individuals (private) and enterprises like companies appealing the cloud benefits by storing data remotely into the cloud in a flexible on-demand manner and relief of the burden of storage management along with this he/she can also enjoy the universal data access which dependent geographical locations and avoidance of the capital expenditure, software, hardware and personnel management and maintenances and so on.
The technology solution that is recommended for the organization is to be provided by VMware. The physical topology of the datacenter consists of x86 virtualization servers, storage networks
One of the most important jobs in a data processing organization, other than the actual processing of data, is securing the information from the time the original data is entered until the end of the process. Businesses trust data processing companies with valuable business information from customer information lists to sensitive business documents so being a trustworthy processing center is critical. In order to ensure the safety and security of client’s information, data processing companies must have top-notch security in place from the locks on the door to the people they hire.
Many organizations focus almost exclusively on virtual security and nearly forget about the building or room that houses their data and whether it is properly secured. To be fully secure, a data center one must consider not only network, data and user security, but physical security as well (Chris, 2015).
Going Green is one of the most talked about topics today and it is no surprise that this concept is making it 's way into people 's thinking when they talk about Data Centers. Corporations both large and small are investing in ways to save energy and reduce establishment and running costs for such data centers. Through this paper, I will delve into prioritization of energy resources, implementation of a Green Data-Centre and performance comparison with Traditional Cloud.
All access to government servers, network devices and maintenance areas of the government agency's data center will be role-based and defined through authentication at a minimum (Amsel, 1988). Access methods will require two-party authentication and for access to server operating systems and rack-mounted servers, biometrics will also be required. One of the most critical success factors to ensuring a high level of security and stability and to guard again social engineering threats is to create and maintain authentication methods that thwart illusionary and coercive-driven access attempts (Burgess, Canright, Engø-Monsen, 2004). By having several roles requires to gain access to data,