SlideShare a Scribd company logo
Data Networking Year 2 Client Server Networks Minimising Server Room Risk Colm Bennett
Server Room Security - Why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Risk Areas? ,[object Object],[object Object],[object Object]
Risk Areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk - Location ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk –  Air Con ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk - Power ,[object Object],[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk - Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk - Building/Construction ,[object Object],[object Object],[object Object]
Designing to Minimise Risk - Layout ,[object Object],[object Object],[object Object],[object Object]
Designing to Minimise Risk – Audit Risk ,[object Object],[object Object],[object Object]

More Related Content

Similar to Client Server Server Room Risk

BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
Marina Krotofil
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2
debmalyakhan
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
keturahhazelhurst
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011
Agora Group
 
ACA Group Presentation
ACA Group PresentationACA Group Presentation
ACA Group Presentation
Hamed Jabbari
 

Similar to Client Server Server Room Risk (20)

BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Data Center Design Case Study
Data Center Design Case StudyData Center Design Case Study
Data Center Design Case Study
 
Data Center Advanced.pptx
Data Center Advanced.pptxData Center Advanced.pptx
Data Center Advanced.pptx
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Turnkey data center solutions by Vertiv, marketed by Aatiq Power Solutions In...
Turnkey data center solutions by Vertiv, marketed by Aatiq Power Solutions In...Turnkey data center solutions by Vertiv, marketed by Aatiq Power Solutions In...
Turnkey data center solutions by Vertiv, marketed by Aatiq Power Solutions In...
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2
 
Dc
DcDc
Dc
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
 
Chapter 9 (1).ppt
Chapter 9 (1).pptChapter 9 (1).ppt
Chapter 9 (1).ppt
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Bringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptBringing IT to the factory floor.ppt
Bringing IT to the factory floor.ppt
 
Data Center Planning & Infrastructure Management' by David Tremont'
Data Center Planning & Infrastructure Management' by David Tremont'Data Center Planning & Infrastructure Management' by David Tremont'
Data Center Planning & Infrastructure Management' by David Tremont'
 
ACA Group Presentation
ACA Group PresentationACA Group Presentation
ACA Group Presentation
 
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 

More from colmbennett

More from colmbennett (7)

Java Objects Intro
Java  Objects  IntroJava  Objects  Intro
Java Objects Intro
 
Software Rollout
Software RolloutSoftware Rollout
Software Rollout
 
C I D R
C I D RC I D R
C I D R
 
Network Admin D R P
Network  Admin    D R PNetwork  Admin    D R P
Network Admin D R P
 
Ip Adressing Intro
Ip Adressing IntroIp Adressing Intro
Ip Adressing Intro
 
V S L M
V S L MV S L M
V S L M
 
Subnet
SubnetSubnet
Subnet
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Client Server Server Room Risk

  • 1. Data Networking Year 2 Client Server Networks Minimising Server Room Risk Colm Bennett
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.