Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 7Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations

Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra

C. V. Raman College of Engineering, Bhubaneswar, Odisha, India

Email: soumitraghosh311@gmail.com, anjanamishra2184@gmail.com, brojokishoremishra@gmail.com

Abstract

This chapter focuses on various cybersecurity techniques meant for parallel as well as distributed computing environment. The distributed systems basically are candidates for giving increased performance, extensibility, increased availability, and resource sharing. The necessities, like multi-user configuration, resource sharing, and some form of communication between the workstations, have created a new set of problems with respect to privacy, security, and protection of the system as well as the user and data. So, new age cybersecurity techniques to combat cybercrimes and protect data breaches are the need of the hour. The chapter also focuses on the need for service level agreements (SLAs) that prevail between a service provider and a client relating to certain aspects of the service such as quality, availability, and responsibilities. The Cuckoo’s Egg lessons on cybersecurity by Clifford Stoll as well as various amendments to curb fraud, data breaches, dishonesty, deceit and other such cybercrimes, are also thoroughly discussed herein.

Keywords: Cybersecurity, cybercrime, threat, security, computing, computer security, risk, vulnerability, parallel, distributed

7.1 Introduction ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book