International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 1

Informative Article | Information Security | India | Volume 10 Issue 12, December 2021


Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Ankit Srivastava, Jatin Nagpal


Abstract: In today's cyber world every bit of information is precious and the attempt to exploit this is unprecedented. From script kiddies to state - sponsored hacking groups, all are continuously attempting to breach into the systems for various reasons including complete service disruption. Directly or indirectly all sorts of data are stored in data centers whether it is for cloud service or for on - premises solutions. Security operation centers compliment data centers by providing required security measures. To ensure the security of Data Centers lots of security features are required to be implemented which can be ensured by establishing a security operation center (SOC).


Keywords: Security Operation Center, Multi - Layered Network, End to End Encryption, DDoS Mitigation, DNS Security Solution, SIEM, WAF, Workload Security, Network Behavior Analysis


Edition: Volume 10 Issue 12, December 2021,


Pages: 77 - 79


How to Cite this Article?

Ankit Srivastava, Jatin Nagpal, "Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR211130123410, Volume 10 Issue 12, December 2021, 77 - 79

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Security'

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 2

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021

Pages: 410 - 415

Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities

Mohammed Alwakeel, Sultan Swailem Alatawi

Share this Article

Similar Articles with Keyword 'Operation'

Downloads: 3 | Monthly Hits: ⮙3

Research Paper, Information Security, India, Volume 11 Issue 1, January 2022

Pages: 371 - 376

Anatomizing Relay Disintegration and Hop Operations of Tor

Ujas Dhami, Nisarg Shah

Share this Article

Downloads: 134

M.Tech / M.E / PhD Thesis, Information Security, India, Volume 8 Issue 5, May 2019

Pages: 814 - 818

Cloud Based Secured and Energy Efficient IoT System

Shukla Ashish Shivbahadur, Dr. Ravi K. Sheth

Share this Article

Similar Articles with Keyword 'Multi'

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 2

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021

Pages: 410 - 415

Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities

Mohammed Alwakeel, Sultan Swailem Alatawi

Share this Article
Top