DSpace Repository

Analytical Research of Data Center Security Implementations and Cyber Attacks

Show simple item record

dc.contributor.author Rayjada, Hardiksinh
dc.contributor.author Dr. Parsania, Vaishali
dc.date.accessioned 2023-05-11T10:08:39Z
dc.date.available 2023-05-11T10:08:39Z
dc.date.issued 2020
dc.identifier.citation Rayjada, H., & Dr. Parsania, V. (2020). Analytical Research of Data Center Security Implementations and Cyber Attacks. Palarch’s Journal Of Archaeology Of Egypt/Egyptology, 17(7), 1567-214X. https://archives.palarch.nl/index.php/jae/article/view/5362 en_US
dc.identifier.issn 1567-214X
dc.identifier.uri http://10.9.150.37:8080/dspace//handle/atmiyauni/925
dc.description.abstract As the Internet is not secure; data center security can be at a threat due to any anonymous attacks. The Physical Security setup on the data center is the set of protocols within the data center facilities. Virtual security is a very hard task to handle, as there exist many ways and confidentiality Datacenter. Standard attacks are daily threats for the data centers. WAN, LAN, and HOST security require server implementing security more than seven tins to protect server attack from a virus, Hacker, and human. Data centers maintain multiple levels of security on a 24*7*365Days, Network protection, inside and outside security Firewalls, and data protection is a major critical area for security break. Servers implementing security can have more safety data. en_US
dc.language.iso en en_US
dc.publisher Palarch’s Journal Of Archaeology Of Egypt/Egyptology en_US
dc.subject Physical Security en_US
dc.subject Virtual Security en_US
dc.subject Firewall Security en_US
dc.subject Server security en_US
dc.subject Network Security en_US
dc.subject Common attack en_US
dc.subject Inside and outside data center security en_US
dc.subject Data privacy en_US
dc.subject Security issues en_US
dc.subject HOST Protection en_US
dc.subject WAN en_US
dc.subject LAN en_US
dc.title Analytical Research of Data Center Security Implementations and Cyber Attacks en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account