SlideShare a Scribd company logo
1 of 30
Scalable Architecture and
Security
15.04.2019
2
Scalability is the property of a system to
handle a growing amount of work by adding
resources to the system
Classification level: for internal use only
Availability
3Classification level: for internal use only
The system should be available for use as much as possible
Uptime percentage has the most immediate effect on user experience
It doesn’t matter how useful a system is if no one can access it
Performance
4Classification level: for internal use only
The system must maintain a high level of performance even under heavy loads
Speed is critical to providing a good user experience
Reliability
5Classification level: for internal use only
The system must accurately store, retrieve, and edit data under stress
Unlike availability and performance, reliability builds positive user experiences in the
long run rather than just in the moment
Vertical Scaling
6Classification level: for internal use only
Up/Down scaling
Adding resources to (or removing resources from) a single node
For example adding more memory or more CPUs
Vertical Scaling
7Classification level: for internal use only
PRO
Easy to implement in any architecture
Low license cost
Low maintainance cost
CONTRA
High scaling cost
Limited upgradeability
High failure risk
Horizontal Scaling
8Classification level: for internal use only
Out/In Scaling
Adding more nodes to (or removing nodes from) a system
For example adding more servers
Horizontal Scaling
9Classification level: for internal use only
PRO
Low scaling cost
Unlimited upgradeability
Increases fault tolerance
CONTRA
Requires apropriate architecture
High license cost
High maintainance cost
10
Architecture is the complex or carefully
designed structure of the required system
Classification level: for internal use only
Components
11Classification level: for internal use only
Infrastructure
Hosting
Monitoring
Operation
Data storage
Webserver
Software Design and Implementation
12
The goal of architecture is to
minimize the human resource required
to build and maintain the required system
Classification level: for internal use only
Services
14Classification level: for internal use only
decouple functionality and think about each part of the system as its own service
each service has its own distinct functional context
complementary services decouples the operation of those pieces from one another
establish clear relationships between the service, environment and consumer
Redundancy
15Classification level: for internal use only
handle failure gracefully using redundancy
ensuring that multiple copies are running simultaneously can secure against the
failure
remove single points of failure
service redundancy is creating a shared-nothing architecture
each node is able to operate independently of one another
new nodes can be added without special conditions or knowledge
Caching
16Classification level: for internal use only
locality of reference principle: recently requested data is likely to be requested again
typically faster than the original data source
 A global cache where all the nodes use the same single cache space
 A distributed cache where each of its nodes own part of the cached data
Load Balancing
17Classification level: for internal use only
allows multiple nodes to transparently service the same function in a system
handle a lot of simultaneous connections and route those connections to one of the
nodes
allowing the system to scale by adding nodes
Queues
18Classification level: for internal use only
effective management of writes
achieving performance and availability requires building asynchrony into the system
19
What is security?
Classification level: for internal use only
Cyber Security
Classification level: for internal use only
protection of people, processes, and technology in an organization
People
21Classification level: for internal use only
Users must understand and comply with basic data security principles
 like choosing strong passwords
 being wary of attachments in email
 backing up data
Processes
22Classification level: for internal use only
Organizations must have a framework for how they deal with both attempted and
successful cyber attacks
A framework explains how to identify attacks, protect systems, detect and respond to
threats, and recover from successful attacks
https://www.nist.gov/cyberframework
Technology
23Classification level: for internal use only
Providing security tools needed to protect from cyber attacks
Three main entities must be protected
 endpoint devices like computers, smart devices, and routers;
 networks;
 and the cloud
Informationsecurity
Classification level: for internal use only
Protection of confidentiality, integrity and availability of computer system data
Data security
Data safety
Data privacy
Application security
25Classification level: for internal use only
software vulnerabilities in applications and application programming interfaces
(APIs)
authentication or authorization
integrity of code and configurations
mature policies and procedures
Cloud security
26Classification level: for internal use only
building and hosting secure applications in cloud environments
securely consuming third-party cloud applications
“Cloud” simply means that the application is running in a shared environment
Cryptography
27Classification level: for internal use only
ensure data confidentiality and integrity
validate the authenticity of data
Infrastructure security
28Classification level: for internal use only
protection of internal and extranet networks, labs, data centers, servers, desktops,
and mobile devices
Incident response
29Classification level: for internal use only
monitors and investigates potentially malicious behavior
incident response plan for containing the threat and restoring the status quo
preserve evidence for forensic analysis and potential prosecution
Vulnerability management
30Classification level: for internal use only
scanning an environment for weak points and prioritizing remediation based on risk
finding a vulnerability in advance can save you the catastrophic costs of a breach
Any Questions ? Björn Wendland
31Classification level: for internal use only

More Related Content

What's hot

Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.skarthi j
 
Firewall network security Systems - VRS Tech
Firewall network security Systems - VRS TechFirewall network security Systems - VRS Tech
Firewall network security Systems - VRS TechVRS Technologies
 
Security Operations
Security OperationsSecurity Operations
Security Operationsankitmehta21
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 

What's hot (7)

Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 
Firewall network security Systems - VRS Tech
Firewall network security Systems - VRS TechFirewall network security Systems - VRS Tech
Firewall network security Systems - VRS Tech
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Crime security.
Crime security.Crime security.
Crime security.
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Gradution Project
Gradution ProjectGradution Project
Gradution Project
 

Similar to Scalable Architecture and Security

Presentation of ditributed system
Presentation of ditributed systemPresentation of ditributed system
Presentation of ditributed systemgoogle
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingHaseeb Rehman
 
distributed os.ppt
distributed os.pptdistributed os.ppt
distributed os.pptbanu236831
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and servicesJas Preet
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud IRJET Journal
 
Distributed Systems- Characterization & Design.ppt
Distributed Systems- Characterization & Design.pptDistributed Systems- Characterization & Design.ppt
Distributed Systems- Characterization & Design.pptSELVAVINAYAGAMG
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 

Similar to Scalable Architecture and Security (20)

Cloud Design Patterns
Cloud Design PatternsCloud Design Patterns
Cloud Design Patterns
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
Presentation of ditributed system
Presentation of ditributed systemPresentation of ditributed system
Presentation of ditributed system
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
 
distributed os.ppt
distributed os.pptdistributed os.ppt
distributed os.ppt
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Ch18
Ch18Ch18
Ch18
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Segmentation on azure platform
Segmentation on azure platformSegmentation on azure platform
Segmentation on azure platform
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Distributed Systems- Characterization & Design.ppt
Distributed Systems- Characterization & Design.pptDistributed Systems- Characterization & Design.ppt
Distributed Systems- Characterization & Design.ppt
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Recently uploaded

Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 

Scalable Architecture and Security

  • 2. 2 Scalability is the property of a system to handle a growing amount of work by adding resources to the system Classification level: for internal use only
  • 3. Availability 3Classification level: for internal use only The system should be available for use as much as possible Uptime percentage has the most immediate effect on user experience It doesn’t matter how useful a system is if no one can access it
  • 4. Performance 4Classification level: for internal use only The system must maintain a high level of performance even under heavy loads Speed is critical to providing a good user experience
  • 5. Reliability 5Classification level: for internal use only The system must accurately store, retrieve, and edit data under stress Unlike availability and performance, reliability builds positive user experiences in the long run rather than just in the moment
  • 6. Vertical Scaling 6Classification level: for internal use only Up/Down scaling Adding resources to (or removing resources from) a single node For example adding more memory or more CPUs
  • 7. Vertical Scaling 7Classification level: for internal use only PRO Easy to implement in any architecture Low license cost Low maintainance cost CONTRA High scaling cost Limited upgradeability High failure risk
  • 8. Horizontal Scaling 8Classification level: for internal use only Out/In Scaling Adding more nodes to (or removing nodes from) a system For example adding more servers
  • 9. Horizontal Scaling 9Classification level: for internal use only PRO Low scaling cost Unlimited upgradeability Increases fault tolerance CONTRA Requires apropriate architecture High license cost High maintainance cost
  • 10. 10 Architecture is the complex or carefully designed structure of the required system Classification level: for internal use only
  • 11. Components 11Classification level: for internal use only Infrastructure Hosting Monitoring Operation Data storage Webserver Software Design and Implementation
  • 12. 12 The goal of architecture is to minimize the human resource required to build and maintain the required system Classification level: for internal use only
  • 13. Services 14Classification level: for internal use only decouple functionality and think about each part of the system as its own service each service has its own distinct functional context complementary services decouples the operation of those pieces from one another establish clear relationships between the service, environment and consumer
  • 14. Redundancy 15Classification level: for internal use only handle failure gracefully using redundancy ensuring that multiple copies are running simultaneously can secure against the failure remove single points of failure service redundancy is creating a shared-nothing architecture each node is able to operate independently of one another new nodes can be added without special conditions or knowledge
  • 15. Caching 16Classification level: for internal use only locality of reference principle: recently requested data is likely to be requested again typically faster than the original data source  A global cache where all the nodes use the same single cache space  A distributed cache where each of its nodes own part of the cached data
  • 16. Load Balancing 17Classification level: for internal use only allows multiple nodes to transparently service the same function in a system handle a lot of simultaneous connections and route those connections to one of the nodes allowing the system to scale by adding nodes
  • 17. Queues 18Classification level: for internal use only effective management of writes achieving performance and availability requires building asynchrony into the system
  • 18. 19 What is security? Classification level: for internal use only
  • 19. Cyber Security Classification level: for internal use only protection of people, processes, and technology in an organization
  • 20. People 21Classification level: for internal use only Users must understand and comply with basic data security principles  like choosing strong passwords  being wary of attachments in email  backing up data
  • 21. Processes 22Classification level: for internal use only Organizations must have a framework for how they deal with both attempted and successful cyber attacks A framework explains how to identify attacks, protect systems, detect and respond to threats, and recover from successful attacks https://www.nist.gov/cyberframework
  • 22. Technology 23Classification level: for internal use only Providing security tools needed to protect from cyber attacks Three main entities must be protected  endpoint devices like computers, smart devices, and routers;  networks;  and the cloud
  • 23. Informationsecurity Classification level: for internal use only Protection of confidentiality, integrity and availability of computer system data Data security Data safety Data privacy
  • 24. Application security 25Classification level: for internal use only software vulnerabilities in applications and application programming interfaces (APIs) authentication or authorization integrity of code and configurations mature policies and procedures
  • 25. Cloud security 26Classification level: for internal use only building and hosting secure applications in cloud environments securely consuming third-party cloud applications “Cloud” simply means that the application is running in a shared environment
  • 26. Cryptography 27Classification level: for internal use only ensure data confidentiality and integrity validate the authenticity of data
  • 27. Infrastructure security 28Classification level: for internal use only protection of internal and extranet networks, labs, data centers, servers, desktops, and mobile devices
  • 28. Incident response 29Classification level: for internal use only monitors and investigates potentially malicious behavior incident response plan for containing the threat and restoring the status quo preserve evidence for forensic analysis and potential prosecution
  • 29. Vulnerability management 30Classification level: for internal use only scanning an environment for weak points and prioritizing remediation based on risk finding a vulnerability in advance can save you the catastrophic costs of a breach
  • 30. Any Questions ? Björn Wendland 31Classification level: for internal use only