Data Center Physical Security Ontology for Automated Evaluation

نویسنده

  • Nanta Janpitak
چکیده

Nowadays, most business operations are supported by IT systems. Therefore, their availability is critical to keep business running smoothly and continuously. In order to provide high quality IT services, a well-managed data center is required to house computer servers, storage systems, network devices, and their associated components. Downtime of the data center can be costly resulting in production and business losses so that the high availability requirement of the data center is needed. Apart from availability, the data center also requires a dependable and secure computing including such attributes as confidentiality, reliability, safety, integrity, maintainability, etc. This paper introduces an ontology-based framework for data center physical security by gathering and mapping the requirement from well-known information security standards such as COBIT, ISO/IEC 27002, and ITIL. In order to fulfill the safety requirement of the data center, this ontology-based framework is also designed to be applicable with National Fire Protection Association (NFPA) code and standard for protecting all data center occupants and for limiting data center property loss from fire. The completion of this ontology will be used for the knowledge sharing and also as an input for data center physical security evaluation tool.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Evaluation of Physical Security at IDA

This report is a detailed study of physical security methods available for protecting a data center. A preliminary analysis has been done on the data center located at the Department of Computer and Information Science (IDA) of Linköping University, Sweden. Various traditional methods for physical security are discussed in this report along with their implementation. The two appropriate solutio...

متن کامل

Ontological Mapping of Common Criteria's Security Assurance Requirements

The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data security and data privacy. Due to the very complex and time-consuming certification process a lot of companies abstain from a CC certification. We created the CC Ontology tool, which is based on an ontological representation...

متن کامل

Outcome Evaluation of Therapeutic Community Model in Iran

Background Evaluation of treatment programs in addiction field is a prerequisite to improve the quality of care. This study aimed to investigate the effectiveness of Therapeutic Community (TC) program in Iran.   Methods Individuals who had voluntarily enrolled in the TC center within a period of seven years, from early 2005 to late 2011, entered the study. Those who successfully completed the 1...

متن کامل

Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology

Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011