|
English
|
正體中文
|
简体中文
|
Items with full text/Total items : 12145/12927 (94%)
Visitors : 849087
Online Users : 1559
|
|
|
Loading...
|
Please use this identifier to cite or link to this item:
http://ir.nhri.org.tw/handle/3990099045/14744
|
Title: | Secure information and data centres: An exploratory study |
Authors: | Pant, P;Anand, K;Onthoni, DD |
Contributors: | Institute of Population Health Sciences |
Abstract: | Getting delicate information is the objective of the overwhelming majority. Cyber-attack programs target data driven information because majority of strategic and touchy information are available there. Thus, associations should focus on data set security, and the initial step is information knowledge—knowing what touchy information one has, how their data set framework is designed, and who approaches it. It involves a common sense that the web isn't secure. Many occasions have shown that there are individuals in this enormous interconnection of organizations that need to, with different aims, take others’ data, disturb the administration of an overall specialist co-op, and assault frameworks to get entrance or to cut them down. Network security has been a principal component of each association to guarantee secure web availability and insurance against information breaks. While numerous associations have turned towards data centre specialists to save their time and effort on obtaining, establishing and securing of equipments, servers, and gadgets, data centres themselves are not secure from hooligans on the web. It is time for the Data Centre to demonstrate its reliability to clients by getting their information and disconnection from different clients that share a similar framework and offering continuous assistance with a base measure of personal time. To get Data Centres organizations and forestall information breaks, various sellers and Data Centre experts have proposed different arrangements, of which some have been examined in this paper. Besides, as Data Centre innovation has been created to adjust to mechanization through programming reflection, virtualization has become an indivisible piece. |
Date: | 2022-12-02 |
Relation: | Studies in Computational Intelligence. 2022 Dec 02;1065:61-88. |
Link to: | http://dx.doi.org/10.1007/978-981-19-6290-5_4 |
Cited Times(Scopus): | https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85143764101 |
Appears in Collections: | [其他] 圖書
|
Files in This Item:
File |
Size | Format | |
SCP85143764101.pdf | 1337Kb | Adobe PDF | 142 | View/Open |
|
All items in NHRI are protected by copyright, with all rights reserved.
|