SlideShare a Scribd company logo
1 of 2
Download to read offline
Security Challenges" Please respond to the following:
Distributed applications and cloud computing have become a viable option within the LAN-to-
WAN Domain. Discuss the primary challenges related to maintaining the security of both
applications and data in such an environment.
Describe the controls that are needed to ensure the security of distributed applications and data.
Identify the auditing approach that you believe is best suited to this arrangement. Provide a
rationale for your response.
No plagiarism please.
Solution
Challenges in Distributed applications :
1) Computational problems:-
Those kind of problems which cannot be resolved within a specific amount of time on a single
computer.
2) Scalability:-
The system has to remain effective enough so that it can handle the increase in the number of
resources and users.
3) Security:-
In Distributed applications, the possible threats could be the information leakage, integrity
violation, DoS(Denial Of Services)
, illegitimate usage of the system.
4) Concurrency:-
The shared access to the resources should be handled properly.
Challenges in Cloud computing :
1) Security & Privacy:-
The fact that the organization's data will reside outside the organization's firewall really raises
a serious concern.
Various types of attacks including hacking may affect multiple clients even if only one site is
attacked.These risks has to be mitigated by using proper
security applications, encrypted file-systems, using a proper storage devices to track unsual
activity across the servers .
2) Loss of control over sensitive data:-
The sensitive data that are stored in the servers has to be properly controlled.
3) Reliability and Availability:-
The frequent outages has to be avoided here. It is very important to monitor the activity of
servers using monitoring tool.
The controls that are essential to prevent security threats in distributed applications and data
include:
1) The control should protect data and integrity of system in case of invalid operation on secured
data:-
In case, a user tries to enter invalid data into the system, the control should protect the system
from such operations.
2) Unauthorized invocations should be rejected by security control.
3) Efficient protection against unauthorized users:-
Unauthorized access request by non-system users should be rejected by the control.
The auditing approach should firstly start by ensuring data integrity that is associated with
application. Control should specify the operation that can be invoked only by authorized person
while rejecting access to unauthorized users when the data resources are accessed. Irrespective of
operation, control should
select only that user which can be allowed access while restricting others non-system users.
Rules should be strictly followed by control and on the basis of defined rules, users access
should be granted or denied.

More Related Content

Similar to Security Challenges Please respond to the followingDistributed .pdf

Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
ย 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
ย 
CIS 349 RANK Introduction Education--cis349rank.com
CIS 349 RANK Introduction Education--cis349rank.comCIS 349 RANK Introduction Education--cis349rank.com
CIS 349 RANK Introduction Education--cis349rank.comclaric263
ย 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comMcdonaldRyan38
ย 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comMcdonaldRyan37
ย 
CIS 349 RANK Education Counseling--cis349rank.com
CIS 349 RANK Education Counseling--cis349rank.comCIS 349 RANK Education Counseling--cis349rank.com
CIS 349 RANK Education Counseling--cis349rank.comshanaabe13
ย 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com amaranthbeg147
ย 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
ย 
CIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comCIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comclaric103
ย 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comrobertleses8
ย 
Cis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comCis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comjhonklinz9
ย 
CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com donaldzs55
ย 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentalsJassika
ย 
CIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comCIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comclaric154
ย 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final showahmad abdelhafeez
ย 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
ย 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challengessidraasif9090
ย 
Cis 349 Inspiring Innovation--tutorialrank.com
Cis 349  Inspiring Innovation--tutorialrank.comCis 349  Inspiring Innovation--tutorialrank.com
Cis 349 Inspiring Innovation--tutorialrank.comPrescottLunt371
ย 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
ย 
Application security
Application securityApplication security
Application securityHagar Alaa el-din
ย 

Similar to Security Challenges Please respond to the followingDistributed .pdf (20)

Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
ย 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
ย 
CIS 349 RANK Introduction Education--cis349rank.com
CIS 349 RANK Introduction Education--cis349rank.comCIS 349 RANK Introduction Education--cis349rank.com
CIS 349 RANK Introduction Education--cis349rank.com
ย 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
ย 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
ย 
CIS 349 RANK Education Counseling--cis349rank.com
CIS 349 RANK Education Counseling--cis349rank.comCIS 349 RANK Education Counseling--cis349rank.com
CIS 349 RANK Education Counseling--cis349rank.com
ย 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
ย 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
ย 
CIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comCIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.com
ย 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.com
ย 
Cis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comCis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.com
ย 
CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com
ย 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
ย 
CIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comCIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.com
ย 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ย 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
ย 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
ย 
Cis 349 Inspiring Innovation--tutorialrank.com
Cis 349  Inspiring Innovation--tutorialrank.comCis 349  Inspiring Innovation--tutorialrank.com
Cis 349 Inspiring Innovation--tutorialrank.com
ย 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
ย 
Application security
Application securityApplication security
Application security
ย 

More from arkleatheray

briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfbriefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfarkleatheray
ย 
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfCompare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfarkleatheray
ย 
Determine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfDetermine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfarkleatheray
ย 
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfDiscuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfarkleatheray
ย 
Data StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfData StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfarkleatheray
ย 
Create Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfCreate Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfarkleatheray
ย 
Before 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfBefore 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfarkleatheray
ย 
at age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfat age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfarkleatheray
ย 
What is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfWhat is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfarkleatheray
ย 
^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdfarkleatheray
ย 
What is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfWhat is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfarkleatheray
ย 
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfWhy is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfarkleatheray
ย 
Why does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfWhy does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfarkleatheray
ย 
Which of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfWhich of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfarkleatheray
ย 
What are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfWhat are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfarkleatheray
ย 
The probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfThe probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfarkleatheray
ย 
The mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfThe mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfarkleatheray
ย 
The groin is also known as the _____ region. crural inguinal perin.pdf
The groin is also known as the _____ region.  crural  inguinal  perin.pdfThe groin is also known as the _____ region.  crural  inguinal  perin.pdf
The groin is also known as the _____ region. crural inguinal perin.pdfarkleatheray
ย 
short answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfshort answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfarkleatheray
ย 
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfSheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfarkleatheray
ย 

More from arkleatheray (20)

briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfbriefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
ย 
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfCompare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
ย 
Determine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfDetermine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdf
ย 
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfDiscuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
ย 
Data StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfData StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdf
ย 
Create Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfCreate Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdf
ย 
Before 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfBefore 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdf
ย 
at age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfat age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdf
ย 
What is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfWhat is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdf
ย 
^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf
ย 
What is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfWhat is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdf
ย 
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfWhy is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
ย 
Why does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfWhy does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdf
ย 
Which of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfWhich of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdf
ย 
What are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfWhat are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdf
ย 
The probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfThe probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdf
ย 
The mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfThe mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdf
ย 
The groin is also known as the _____ region. crural inguinal perin.pdf
The groin is also known as the _____ region.  crural  inguinal  perin.pdfThe groin is also known as the _____ region.  crural  inguinal  perin.pdf
The groin is also known as the _____ region. crural inguinal perin.pdf
ย 
short answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfshort answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdf
ย 
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfSheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
ย 

Recently uploaded

MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
ย 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
ย 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
ย 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
ย 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
ย 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
ย 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
ย 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
ย 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
ย 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ไธญ ๅคฎ็คพ
ย 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
ย 
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinhฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
ย 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
ย 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
ย 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
ย 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
ย 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
ย 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
ย 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
ย 

Recently uploaded (20)

MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
ย 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
ย 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
ย 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
ย 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
ย 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
ย 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
ย 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
ย 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
ย 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ย 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
ย 
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinhฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ย 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
ย 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
ย 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
ย 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
ย 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
ย 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
ย 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
ย 

Security Challenges Please respond to the followingDistributed .pdf

  • 1. Security Challenges" Please respond to the following: Distributed applications and cloud computing have become a viable option within the LAN-to- WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment. Describe the controls that are needed to ensure the security of distributed applications and data. Identify the auditing approach that you believe is best suited to this arrangement. Provide a rationale for your response. No plagiarism please. Solution Challenges in Distributed applications : 1) Computational problems:- Those kind of problems which cannot be resolved within a specific amount of time on a single computer. 2) Scalability:- The system has to remain effective enough so that it can handle the increase in the number of resources and users. 3) Security:- In Distributed applications, the possible threats could be the information leakage, integrity violation, DoS(Denial Of Services) , illegitimate usage of the system. 4) Concurrency:- The shared access to the resources should be handled properly. Challenges in Cloud computing : 1) Security & Privacy:- The fact that the organization's data will reside outside the organization's firewall really raises a serious concern. Various types of attacks including hacking may affect multiple clients even if only one site is attacked.These risks has to be mitigated by using proper security applications, encrypted file-systems, using a proper storage devices to track unsual activity across the servers . 2) Loss of control over sensitive data:-
  • 2. The sensitive data that are stored in the servers has to be properly controlled. 3) Reliability and Availability:- The frequent outages has to be avoided here. It is very important to monitor the activity of servers using monitoring tool. The controls that are essential to prevent security threats in distributed applications and data include: 1) The control should protect data and integrity of system in case of invalid operation on secured data:- In case, a user tries to enter invalid data into the system, the control should protect the system from such operations. 2) Unauthorized invocations should be rejected by security control. 3) Efficient protection against unauthorized users:- Unauthorized access request by non-system users should be rejected by the control. The auditing approach should firstly start by ensuring data integrity that is associated with application. Control should specify the operation that can be invoked only by authorized person while rejecting access to unauthorized users when the data resources are accessed. Irrespective of operation, control should select only that user which can be allowed access while restricting others non-system users. Rules should be strictly followed by control and on the basis of defined rules, users access should be granted or denied.