Beruflich Dokumente
Kultur Dokumente
System
Syndicate 10
Importance
CardSystems Solutions, top payment processors, data
breach exposed 40 million credit card accounts. The
incident force the company out of business.
Heartland Payment Systems, provider of credit and
debit processing was the victim of a data breach. largest
ever, with 100 million records potentially affected.
Security Breaches Cost $90 To $305 Per Lost Record
More than one-half (55%) of midmarket and enterprise
organizations will increase their spending on
information security products and services in 2010
3 critical security areas
Physical Security - includes locking
down and logging all physical access
to servers at our data center.
Operational Security - security
involves creating business processes
that follow security best practices to
limit access to confidential
information and maintain tight
security over time.
System Security - involves locking
down customer systems from the
inside, starting with hardened
operating systems and up-to-date
patching
Physical Security
Three levels of access authentication
First Level: Manned security 24 X 7.
Second Level: Authentication based on access cards.
Third Level: Biometrics scan, the area with hosted
servers are caged for additional security.
Surveillance Cameras with Digital Video
Recorder
Video searches by event, time, date and camera
Remote access to security footage
Physical Security
Fire Security
Fire resistant tiles
Fire Retardant Doors and Glasses
Second Level Of Risk Mitigation
VESDA (Very Early Smoke Detection Apparatus)
FAS (Fire Alarm System)
GAS Suppression FM200 (For Fire Suppression)
Other Security Measures
WLD (Water Leak Detection)
Pest Repellent
Rodent Triple Agent
Consider Who Has Access to Sensitive Data
Intellectual
Intellectual
Property
CFO Property
Salaries
Salaries
and
and
Reviews DR Storage
Reviews Storage Repair/
Administrators
Litigation
Service Staff
Litigation
Docs
Docs
General
Counsel Tape
Courier
System Backup
Administrators Administrators
System Security
Data Center Security Threats
Intrusion Threats
Outbreak Prevention
Security Management
Threats for a Data Center
Physical Security Methods
for Data Centers