Vulnerabilities and Threats in Distributed Systems
نویسندگان
چکیده
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault tolerance and reliability principles for security, enhancing role-based access control with trust ratings, protecting privacy during data dissemination and collaboration, and applying fraud countermeasures for reducing threats.
منابع مشابه
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملGuide to Industrial Control Systems (ICS) Security
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and...
متن کاملApplication of Fuzzy and FEMA Modified Methods in Risk Assessment of Man-Made Threats in Water Systems
Bacground and objective: Assessing the threats and vulnerabilities of infrastructure is one of the major concerns of security officials in a country, and water supply systems are one of the most important and sensitive infrastructures. Water supply systems are also among the basic infrastructures that are very important in assessing the threats in these systems and identifying its weaknesses. I...
متن کاملA Distributed IDS for Industrial Control Systems
Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domainspecific approach to cyber threat detection within ICS, which is one of the most import...
متن کاملAn Analysis of Cloud Computing and its Security Issues
Cloud computing is a versatile technology for providing computing services by the internet on demand and pay per use access to a pool of shared resources like networks, servers, services, storage and applications, without acquiring physically . Cloud computing begins from the development of parallel computing, distributed computing, shared computing and grid computing. Although the technology a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004