By: Mike Nazzario. What is a Data Center?  Facility used to house computer servers for remote storage  Sensitive Data  Warehouse – room with a couple.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Computing Infrastructure
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
IBM Software Group ® Integrated Server and Virtual Storage Management an IT Optimization Infrastructure Solution from IBM Small and Medium Business Software.
Computer Parts There are many parts that work together to make a computer work.
Background Information. 2 Scope: Computer Hardware  Tablets, Laptops, Embedded Systems  Desktops, Servers, Supercomputers  Peripherals and Accessories:
Supreme Systems Profile
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Our z/OS Security Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding.
CERT MEOC Mobile Emergency Operations Center Concept designed by Keith Morin & Associates - Tucson, AZ.
CIT  Describe servers that offer substantial savings in electrical usage over traditional servers  Explain methods for greening the workplace.
Day Wipe, Recover, Replace, Archives Remote fallback wipe, recover, replace 1.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
AFCOM Facility Presentation Directlink Technologies Corp. April 8, 2011.
The Ultimate Backup Solution.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Introduction to Computer Administration System Administration
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
E-Book Repository Solution By Tim Haynes. Contents What is an E-book Repository My Solution Components of My Solution Diagram of My Solution Threats and.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
BeechTek – Computer/Server/Wireless/Datacenter Hosted Business Management Software Solutions Web Hosting + Domain Search and Registration Printer Repair.
Component 4: Introduction to Information and Computer Science Unit 1: Basic Computing Concepts, Including History 1 Health IT Workforce Curriculum Version.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
Security and backups GCSE ICT.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
TIME MANAGER.  Detailed clocking in system  Export hours in to Payroll software  Absences calendar  Rotas and shifts  Overtime rules  Multi User.
EXPLORING Strategic Partnership “Collaboration” Prepared by NET6.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
INDIACMS-TIFR Tier 2 Grid Status Report I IndiaCMS Meeting, April 05-06, 2007.
Progress Energy Corporate Data Center Rob Robertson February 17, 2010 of North Carolina.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Component 4: Introduction to Information and Computer Science Unit 1: Basic Computing Concepts, Including History Lecture 3 This material was developed.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
 Networks A visit to the admin block…. Network Topology  Our school uses the flat topology.  All devices are connected directly to one another in this.
Security fundamentals Topic 11 Maintaining operational security.
HalFILE 2.1 Network Protection & Disaster Recovery.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Data Availability.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
LBT Q Eng/SW Review CIN/NIN -Computer and Network Infrastructure.
Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.
 Fine Solutions Sam Walters, Kendyl Prosser, Amanda Buescher.
Physical Security Concerns for LAN Management By: Derek McQuillen.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
PYRESCOM - Mas des Tilleuls Canohès -FRANCE Tél. : +33 (0)4. 68
INSPIRE | EQUIP | CONNECT | The “Cloud” and other IT resources that can be beneficial to nonprofits.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
About Us | Our Mission | Looking Ahead THE COMPANY HOME | THE COMPANY
IOT Critical Impact on DC Design
CERN Data Centre ‘Building 513 on the Meyrin Site’
Chromebook Carts Kamiak High School.
Presentation transcript:

By: Mike Nazzario

What is a Data Center?  Facility used to house computer servers for remote storage  Sensitive Data  Warehouse – room with a couple servers  Off-site backup

One of Google’s Data Center’s

IUP’s Data Center  Stright Hall and basement of Police Station  Physical protection double doors with dual pass codes  Doors only accessible at certain hours  Cameras for surveillance

Inside  Positively charged room for cooling  Raised floor with air ducts and cables  Rows of server racks  Vents in front and behind racks

In case of power failure  There are battery backups inside that keep the system online for 15 min  Outdoor generator takes 12 min to power up.  Takes over and powers whole network

Back-ups and in house work  Off site back up is located in the basement of the university police station  They keep backup tapes in the data center as well  All HDD wipes are done in the data center  3 wipe process

Updates and Repairs  Currently are updating the search server  They repair all hardware problems in house  Servers are accessed through terminals inside the data center

What is the reason for all this?  The main goal of a data center is to protect sensitive data.  Such as your banner ID that gives access to your payments to the university and contains all your personal info  Such as: name, address, SSN….

Software Security  Cisco is the number one for Data Center security solutions  Companies like IBM Microsoft McAfee and HP specialize in Data Center Security.  IUP uses Red Hat Linux as their platform of choice

Security  You must have physical security to protect the data  As well as methods to protect the servers in the data center  HDD maintenance

Physical Security  Common ways of physically protecting data are security guards  ID badges with magnetic key codes  Physical passwords  Even biometrics

HDD maintenance  Hard drives are kept track of with barcodes  HDD’s can be reused after wipes  Drives are crushed and destroyed as well

Works Cited    Ql4 Ql4  eral/ns340/ns517/ns224/ns376/infonetics_ data_center_security.pdf eral/ns340/ns517/ns224/ns376/infonetics_ data_center_security.pdf  s394/ns224/ns376/ s394/ns224/ns376/