The remote-type modules are executed by the servers obtaining information remotely(prediction included)and the local modules are obtained by the Data Server.
Remote-type modules are executed by the servers obtaining information remotely(network server, recon server…)and local modules are obtained and processed by the Data Server.
Data access terminal(see Figure 1)A device that is for data users to access data in the data server and that does not permanently save the data locally.
In the IT environment including the data server, it is necessary to satisfy the following(1) to(4) as preconditions except in the case of using only the off-premise-server.
The operation manager should restricteven communication from/to the LAN where the data server is installed appropriately at least by a firewall function(e.g., iptables in Linux) provided by the OS etc.
Despite its simplicity and scarce use of resources, the data server is one of the critical elements of the system, since it processes all agent information and generates alerts and system events according to those data..
When transmitting data between the data access terminal and the data server, via a communication path outside the data server-installed LAN, it is necessary that all communication paths are encrypted with sufficient strength or that the data themselves are encrypted before being transmitted.
The PI should keep arecord of information regarding data users and the data server(including information on the data storage place in the file system) in an electronic file or the like accessible to only data users, and update the record every time a change occurs.
The operation managershould keep a record of information on the operators and the data server(including the storage location in the file system) in an electronic file or the like accessible only to the operation manager and the operators, and update the record every time a change occurs.
The operation managershould install a firewall between the LAN where the data server is installed and the external network, and manage the access to/from the outside to the minimum necessary(e.g., the IP address and port of source and destination are limited) to keep high security.
English
中文
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Bahasa indonesia
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt