From the course: Cloud Security Operations by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
The impact of distributed IT
From the course: Cloud Security Operations by Pearson
The impact of distributed IT
Distributed IT poses its own special security risks in our environment. Remember, with distributed, we have multiple participants. We can have data that's dispersed over multiple locations. So you have your distributed application interfaces with middleware and then various local operating systems that can be geographically dispersed over an IP version 4, IP version 6 network. Traditionally, we can have distributed through, let's say, peer-to-peer file sharing. With peer-to-peer file sharing, your local operating system is not just a client, but it's also a server. So if you think about the fact that we could be using, let's say, personal cloud storage and we can have automatic distribution of files in the cloud that presents particular problems. Also with distributed systems, we have to consider the fact that they're going to have their own kind of unique security vulnerabilities like meat in the middle or a man-in-the-middle attacks. If you are dealing with some kind of distributed…
Contents
-
-
-
-
-
-
(Locked)
Audit controls, reports, and their impact1m 59s
-
(Locked)
Gap analysis and internal InfoSec management systems2m 41s
-
(Locked)
Policies and stakeholder involvement4m 21s
-
(Locked)
Specialized compliance requirements2m 55s
-
(Locked)
The impact of distributed IT3m 33s
-
(Locked)
Business agreement requirements2m 56s
-
(Locked)
Supply chain management1m 28s
-
(Locked)
-