THE DISTURBED COMPUTING ENVIRONMENT:ISSUES OF SECURE NETWORKS
Abstract
In the Distributed Computing Environment, many processors/nodes remain active in system at any moment, coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own code, sometimes own independent task, but at the same time there will still be sharing of some common resources and information. One of the main themes of recent research in distributed computing is "locality" (as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability becomes a major issues. Computing security is, at its core, more than a technical issue. It is a fundamental business challenge. Managers have plenty of security alternatives, but have very little real guidance on making intelligent decisions about them.. Today's distributed, multi-vendor, Internet-connected environments encompass more insecure systems and networks than ever before. Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. The first step to understand security is to know what the potential risks are, or more specifically, to determine the type and level of security risks for the organizations. Security risks are unique to each organization because they are dependent on the nature of the business and the environment in which the organization operates. Security risk is determined by identifying the assets that need to be protected.