📜 ⬆️ ⬇️

Google Security

Google uses one of the largest networks of distributed data centers in the world and attaches great importance to the preservation of data and intellectual property in these centers located throughout the world and the number of which is not subject to disclosure. Most of Google’s core data centers are wholly owned by the company and are maintained by it to prevent other companies from accessing them. The geographical location of data centers was chosen in such a way as to protect them from catastrophic events.

Datacenters are located on classified, protected sites in order to prevent attacks on user information. These facilities are guarded by armed personnel around the clock. In addition to this, complex access restriction methods are involved: biometric information readers and smart cards are used to allow only authorized personnel. Only selected employees of Google have the right to access data centers and servers located in them. Access is carefully monitored and verified.

The equipment is designed not only with maximum efficiency, but also safety and reliability. Multiple levels of redundancy ensure continuous operation and availability of services even in the most adverse and extreme conditions. They include multiple levels of redundancy both within the data center, and backup operations performed, consuming the energy generated by the generators, and full redundancy of the multiple distributed centers.
')
The company uses unique management tools for internal and remote monitoring of the centers, as well as automated systems for interception of management in case of failure or failure. (...)

Information such as e-mail is stored in an encrypted format optimized for speed, as opposed to regular file systems or databases. Data is distributed across multiple physical and logical partitions in order to create redundancy and distributed access, thus confusing intruders.

The physical information protection tools of Google described above prevent physical access to company’s servers. All access to company systems is provided by authorized personnel using encrypted SSH (secure shell). The company has collected specific information about the data structure and built its own distributed architecture in order to provide a higher level of security and reliability than for conventional systems with traditional, unallocated architecture.

Individual user information is distributed between several anonymous servers, clusters and data centers, thereby preventing possible data loss and protecting them.

Source: https://habr.com/ru/post/30905/


All Articles