International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Information Security | India | Volume 10 Issue 12, December 2021


Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Ankit Srivastava [3] | Jatin Nagpal


Abstract: In today's cyber world every bit of information is precious and the attempt to exploit this is unprecedented. From script kiddies to state - sponsored hacking groups, all are continuously attempting to breach into the systems for various reasons including complete service disruption. Directly or indirectly all sorts of data are stored in data centers whether it is for cloud service or for on - premises solutions. Security operation centers compliment data centers by providing required security measures. To ensure the security of Data Centers lots of security features are required to be implemented which can be ensured by establishing a security operation center (SOC).


Keywords: Security Operation Center, Multi - Layered Network, End to End Encryption, DDoS Mitigation, DNS Security Solution, SIEM, WAF, Workload Security, Network Behavior Analysis


Edition: Volume 10 Issue 12, December 2021,


Pages: 77 - 79


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ankit Srivastava, Jatin Nagpal, "Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview", International Journal of Science and Research (IJSR), Volume 10 Issue 12, December 2021, pp. 77-79, https://www.ijsr.net/get_abstract.php?paper_id=SR211130123410

Similar Articles with Keyword 'Security'

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi | Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 0

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami [4] | Nisarg Shah [4]

Share this Article
Top