Chapter 7Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations

Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra

C. V. Raman College of Engineering, Bhubaneswar, Odisha, India

Email: soumitraghosh311@gmail.com, anjanamishra2184@gmail.com, brojokishoremishra@gmail.com

Abstract

This chapter focuses on various cybersecurity techniques meant for parallel as well as distributed computing environment. The distributed systems basically are candidates for giving increased performance, extensibility, increased availability, and resource sharing. The necessities, like multi-user configuration, resource sharing, and some form of communication between the workstations, have created a new set of problems with respect to privacy, security, and protection of the system as well as the user and data. So, new age cybersecurity techniques to combat cybercrimes and protect data breaches are the need of the hour. The chapter also focuses on the need for service level agreements (SLAs) that prevail between a service provider and a client relating to certain aspects of the service such as quality, availability, and responsibilities. The Cuckoo’s Egg lessons on cybersecurity by Clifford Stoll as well as various amendments to curb fraud, data breaches, dishonesty, deceit and other such cybercrimes, are also thoroughly discussed herein.

Keywords: Cybersecurity, cybercrime, threat, security, computing, computer security, risk, vulnerability, parallel, distributed

7.1 Introduction ...

Get Cyber Security in Parallel and Distributed Computing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.