Research Article

On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

Table 5

Scenario defined for our case study.

Scenario
Role  1 Role  2 Role  3

Access type E-mail, FTP,
web,
applications,
data center servers
E-mail, FTP,
web,
applications,
server S1 in DMZ,
server S2 in DMZ
E-mail, FTP,
web,
applications,
data center servers,
DMZ production servers,
General office

Data size
(for each action separately)
E-mail: 8 MB
FTP: 10 MB
Web: 3 MB Applications: 4 MB
Data center: 25 MB
E-mail: 10 MB
FTP: 10 MB
Web: 4 MB Applications: 6 MB
Server S1: 5 MB
Server S2: 15 MB
E-mail: 10 MB
FTP: 5 MB
Web: 4 MB
Applications: 6 MB
Data center: 15 MB
DMZ production servers: 8 MB
General office: 2 MB

Security mechanisms TLSv1
(see Box 1)
TLSv2
(see Box 1)
TLSv3
(see Box 1)

Security level Low Medium High

Security objectives 1, 2, 3, 4, 5, 6 1, 2, 3, 4, 5, 6 1, 2, 3, 4, 5, 6