dc.contributor.author |
Rayjada, Hardiksinh |
|
dc.contributor.author |
Dr. Parsania, Vaishali |
|
dc.date.accessioned |
2023-05-11T10:08:39Z |
|
dc.date.available |
2023-05-11T10:08:39Z |
|
dc.date.issued |
2020 |
|
dc.identifier.citation |
Rayjada, H., & Dr. Parsania, V. (2020). Analytical Research of Data Center Security Implementations and Cyber Attacks. Palarch’s Journal Of Archaeology Of Egypt/Egyptology, 17(7), 1567-214X. https://archives.palarch.nl/index.php/jae/article/view/5362 |
en_US |
dc.identifier.issn |
1567-214X |
|
dc.identifier.uri |
http://10.9.150.37:8080/dspace//handle/atmiyauni/925 |
|
dc.description.abstract |
As the Internet is not secure; data center security can be at a threat due to any anonymous attacks. The Physical Security setup on the data center is the set of protocols within the data center facilities. Virtual security is a very hard task to handle, as there exist many ways and confidentiality Datacenter. Standard attacks are daily threats for the data centers. WAN, LAN, and HOST security require server implementing security more than seven tins to protect server attack from a virus, Hacker, and human. Data centers maintain multiple levels of security on a 24*7*365Days, Network protection, inside and outside security Firewalls, and data protection is a major critical area for security break. Servers implementing security can have more safety data. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Palarch’s Journal Of Archaeology Of Egypt/Egyptology |
en_US |
dc.subject |
Physical Security |
en_US |
dc.subject |
Virtual Security |
en_US |
dc.subject |
Firewall Security |
en_US |
dc.subject |
Server security |
en_US |
dc.subject |
Network Security |
en_US |
dc.subject |
Common attack |
en_US |
dc.subject |
Inside and outside data center security |
en_US |
dc.subject |
Data privacy |
en_US |
dc.subject |
Security issues |
en_US |
dc.subject |
HOST Protection |
en_US |
dc.subject |
WAN |
en_US |
dc.subject |
LAN |
en_US |
dc.title |
Analytical Research of Data Center Security Implementations and Cyber Attacks |
en_US |
dc.type |
Article |
en_US |