{"id":296,"date":"2014-06-16T12:05:43","date_gmt":"2014-06-16T11:05:43","guid":{"rendered":"http:\/\/accounts.ulster.ac.uk\/accounts\/?p=296"},"modified":"2014-12-04T08:45:54","modified_gmt":"2014-12-04T08:45:54","slug":"accounts-of-the-conflict-computing-infrastructure-overview","status":"publish","type":"post","link":"https:\/\/accounts.ulster.ac.uk\/accounts\/blog\/accounts-of-the-conflict-computing-infrastructure-overview\/","title":{"rendered":"Accounts of the Conflict: Computing Infrastructure Overview"},"content":{"rendered":"<h2>Accounts of the Conflict Computing Infrastructure Overview<\/h2>\n<p>Because of the sensitive nature of the data that will be collected and archived by the Accounts of the Conflict project it is important to provide a sense of security and peace of mind for our depositors regarding the collection, storage, and security of their data.<\/p>\n<p>In this short blog I shall attempt in layman\u2019s term to give an overview of the Account of the Conflict\u2019s Server and Storage infrastructure within the university and the different security levels and procedures in place that protect the deposited data.<\/p>\n<p><b><\/b><b>Hardware (Servers and Storage)<\/b><\/p>\n<p>The Accounts of the Conflict project computing infrastructure is split across the Coleraine and Belfast campuses of the <a href=\"http:\/\/ulster.ac.uk\"><strong>University of Ulster<\/strong><\/a> and is an integral part of the University\u2019s data centres.<\/p>\n<p>The Coleraine Data Centre is the University\u2019s Primary Data Centre. It hosts the Accounts of the Conflict project\u2019s hardware, data and backup facilities.<\/p>\n<p>The Belfast campus Data Centre is the secondary Data Centre linked via dedicated network lines to the Coleraine Data Centre where the data and hardware in Coleraine is replicated. Should the Computer Centre in Coleraine fail for any reason the Belfast will Data Centre will automatically assume the primary function and maintain our services.<\/p>\n<p>All of our hardware has built in management and monitoring systems that will alert the computing staff to any impending hardware failures and a comprehensive 4 hr. response maintenance program is in place in the event of a hardware failure at either Data Centre.<\/p>\n<p><b><\/b><b>Security<\/b><\/p>\n<p>There are several levels of security in place restricting both physical and virtual access.<\/p>\n<p>Only authorised members of the university\u2019s Information Systems Department (ISD) staff can gain physical access to the data centres using chipped ID cards. The Data Centres are fitted with CCTV cameras and accesses are recorded and audited on a daily basis. \u00a0Anyone else requiring access needs to give prior notice and obtain permission from the head of ISD and they will then be accompanied by an authorised staff member at all times whilst in the Data Centre.<\/p>\n<p>External and internal access to our servers via the network is restricted by the University\u2019s comprehensive firewall. Only authorised members of staff have full access from within the University\u2019s firewall to the Data Centre. External access from outside the University is only possible via the University\u2019s Virtual Private Network (VPN). This service is restricted to authorised and vetted staff using personal cryptographic keys.<\/p>\n<p><b>Data Collection.<\/b><\/p>\n<p>When a project agrees to archive their data on our system and are accepted having completed the necessary administrative procedures we will provide an external disk or disks with an encrypted file system for the transportation of their data to our offices. Should the disk get lost or stolen in transit the data will be unreadable. The disk will then be delivered to us by the project or we will arrange to collect it. Once decrypted and transferred to a secure area on our servers the transporting disk will be securely wiped and reformatted.<\/p>\n<p>Data that is to be stored whilst it is embargoed will be encrypted using 56-bit encryption software. \u00a0The donor project will decide upon the encryption key and they will be responsible for it\u2019s safekeeping until the data is no longer embargoed.<\/p>\n<p>Hopefully this blog was technically jargon free. However, if you have been confused or have any queries about issues you feel have not been addressed fully then please feel free to contact me at anytime through the contact details on this website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accounts of the Conflict Computing Infrastructure Overview Because of the sensitive nature of the data that will be collected and archived by the Accounts of the Conflict project it is&#8230; <\/p>\n<p><a href=\"https:\/\/accounts.ulster.ac.uk\/accounts\/blog\/accounts-of-the-conflict-computing-infrastructure-overview\/\">View Full Article &raquo;<\/a><\/p>\n","protected":false},"author":8,"featured_media":122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3,2,10],"tags":[],"class_list":["post-296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archiving","category-blog","category-digital-media"],"_links":{"self":[{"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/posts\/296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":17,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/posts\/296\/revisions\/811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/media\/122"}],"wp:attachment":[{"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accounts.ulster.ac.uk\/accounts\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}