Vulnerabilities and Threats in Distributed Systems

نویسندگان

  • Bharat K. Bhargava
  • Leszek Lilien
چکیده

We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault tolerance and reliability principles for security, enhancing role-based access control with trust ratings, protecting privacy during data dissemination and collaboration, and applying fraud countermeasures for reducing threats.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

Guide to Industrial Control Systems (ICS) Security

This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and...

متن کامل

Application of Fuzzy and FEMA Modified Methods in Risk Assessment of Man-Made Threats in Water Systems

Bacground and objective: Assessing the threats and vulnerabilities of infrastructure is one of the major concerns of security officials in a country, and water supply systems are one of the most important and sensitive infrastructures. Water supply systems are also among the basic infrastructures that are very important in assessing the threats in these systems and identifying its weaknesses. I...

متن کامل

A Distributed IDS for Industrial Control Systems

Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domainspecific approach to cyber threat detection within ICS, which is one of the most import...

متن کامل

An Analysis of Cloud Computing and its Security Issues

Cloud computing is a versatile technology for providing computing services by the internet on demand and pay per use access to a pool of shared resources like networks, servers, services, storage and applications, without acquiring physically . Cloud computing begins from the development of parallel computing, distributed computing, shared computing and grid computing. Although the technology a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004