From the course: Cloud Security Operations by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

The impact of distributed IT

The impact of distributed IT

Distributed IT poses its own special security risks in our environment. Remember, with distributed, we have multiple participants. We can have data that's dispersed over multiple locations. So you have your distributed application interfaces with middleware and then various local operating systems that can be geographically dispersed over an IP version 4, IP version 6 network. Traditionally, we can have distributed through, let's say, peer-to-peer file sharing. With peer-to-peer file sharing, your local operating system is not just a client, but it's also a server. So if you think about the fact that we could be using, let's say, personal cloud storage and we can have automatic distribution of files in the cloud that presents particular problems. Also with distributed systems, we have to consider the fact that they're going to have their own kind of unique security vulnerabilities like meat in the middle or a man-in-the-middle attacks. If you are dealing with some kind of distributed…

Contents