Data Processing Center
Data Processing Center
PROCESSING
CENTER
ADMINISTRATION
A data processing center or data processing center (CPD) (in English: Data Center) is the space where the
It is also known as a computing center in Latin America and in Spain as a calculation center, data center,
https://es.wikipedia.org/wiki/Centro_de_procesamiento_de_data
A Data Processing Center (CPD) is the set of physical, logical, and human resources necessary for the
http://www.monografias.com/trabajos7/ceproc/ceproc.shtml#ixzz551z6qSwW
BASIC FUNCTIONS OF A CENTER
DATA PROCESSING
Exploitation of systems or applications: The exploitation or operation of a computer system or computer
application consists of the use and benefit of the developed system. It consists of forecasting dates for work
execution, general system operation, control and management of supports, system security, supervision of
work, etc.
Technical support for users: Support, both for users and for the system itself, involves selecting, installing
and maintaining the appropriate operating system, the design and control of the database structure, the
management of teleprocessing equipment, the study and evaluation of the needs and performance of the
The management and administration functions of a Data Processing Center include supervision operations,
project planning and control, project security and control, general security of facilities and equipment,
□ Strategic planning
□ Resource Planning
□ Operational Planning
□ Personnel Planning
□ Physical Installation Planning
PHYSICAL LOCATION IN A CPD
hierarchical levels, and also describes the different functions of the positions, this manual being a part of the
2 .Hardware Manuals:
These indicate the configuration of the equipment we have installed, its benefits and limitations. They must
be under the custody of the persons who operate each piece of equipment and registered in the centralized
These are the manuals for the different packages used in the institution. These must be in a safe place and
4 .Application Manual:
These are manuals that describe in detail the different steps carried out in the studies, development and
installation of a system. These manuals must be subdivided according to the use or operations carried out
by the different areas of the Center and the users. Among these, the following can be mentioned: Feasibility
follow for automated data processing, results forms and the number of copies made from backups on
magnetic media.
6 .User Manual:
This describes the instructions for filling out forms and source information, calculation instructions to be
performed and counts necessary for control. All these manuals must be constantly updated.
CRITERIA FOR SELECTING SOFTWARE □
CONTINGENCY PLAN
Despite all safety measures, a disaster can (will) occur. In fact, security experts "subtly" state that a disaster
recovery plan must be defined "for when the system fails", not "in case the system fails" (1).
Therefore, it is necessary that the Contingency Plan includes a disaster recovery plan, which will aim to
restore the computing service quickly, efficiently and with the lowest possible cost and losses.
A Computer Security Contingency Plan consists of the steps that must be followed, after a disaster, to
recover, at least in part, the functional capacity of the system, although, and generally, they consist of
technology considered and where they will be used. The most appropriate security measures for technology
that is designed for travel or field use will be very different from those that are static and used in office
environments.
Environmental factors
• Fires. Fires are caused by improper use of fuels, faulty wireless installations, and improper storage and
transportation of hazardous substances.
Floods. IT IS THE INVASION OF WATER DUE TO EXCESS SURFACE RUNOFF OR ACCUMULATION ON FLAT LAND,
CAUSED BY A LACK OF DRAINAGE, WHETHER NATURAL OR ARTIFICIAL. THIS IS ONE OF THE MAJOR CAUSES OF
DISASTERS IN COMPUTER CENTERS.
• Earthquakes. These seismic phenomena can be so weak that only very sensitive instruments detect
them, or so intense that they cause the destruction of buildings and even the loss of human lives.
• Humidity. A separate heating, ventilation and air conditioning system must be provided, dedicated
exclusively to the computer room and the machine area.
• Acts of vandalism. In companies, there are disgruntled employees who may retaliate against equipment
and facilities.
• Acts of vandalism against the network system. Many of these acts are related to sabotage.
• Fraud. Every year millions of dollars are stolen from companies and, in many cases, computers have been
used for such purposes.
•Sabotage. It is the most feared danger in computer centers. Companies that have tried to implement high-
level security systems have found that protection against saboteurs is one of the toughest challenges; the
saboteur can be an employee or a person outside the company.
•Terrorism. A few years ago, this would have been a remote case, but with the war situation that the world is
facing, companies must increase their security measures, because the most famous companies in the world are a
very attractive target for terrorists.
FUNCTIONS ORGANIZATION
Evaluation of Security X X
Services.
Protecting network
management systems.
X X
Requirements and dangers for the
security.
Safety Features:
Integrity, Confidentiality,
Availability, Authenticity.
Threat:
Modification: An unauthorized person gains access to the information and can
modify it.
Threat:
Interception: an unauthorized person (person,
program or computer) gains access to any part
of the information.
Threat:
Interruption: if some part of the system or information is
rendered useless or destroyed.
Threat:
Fabrication: If an unauthorized person inserts counterfeit objects into
the system.
Viruses, worms,
Trojans, backdoors, Antivirus.
ransomware, spear
phishing.
Intruders: Bugs, Firewall, anti-
Spyware spyware.
Software that is intended to alter the They replace files with others infected
operation of a computer, without the with their code. They can destroy
user's permission or knowledge. data stored on a computer.
Public Threat
Administration Action or element that is harmful to an
asset
(e.g. virus, fire, phishing, etc.)
Protect
Vulnerability
Degree of exposure of an asset to
a specific threat (e.g. a PC without an antivirus,
Risk
It is the result of multiplying the probability that
a threat materializes by the impact it could cause
(e.g. A virus with a high probability of infection but
which only displays a message on the screen has a low risk
)
CONTINGENCY PLAN IN CASE OF
FIRE
□What to do before a fire?
□What to do after a fire?
□What to do in all cases?
CONTINGENCY PLAN IN CASE OF
FLOOD
ADVANTAGES AND
DISADVANTAGES
DEVELOP A CONTINGENCY PLAN FOR
INFORMATION SECURITY
□ What to do
□ What not to do
LET'S GET TO WORK