INTRODUCTION In today’s world it is very difficult to identify malicious attacks or vulnerability that can cause harm so systems. These attacks can even harm complex distributed systems. Any damage done by it will lead to failure of overall network. thus, it is very essential to control and defend systems from vulnerabilities (Azarand Vaidyanathan,2015). This report will describe three distributed systems and various methods to defend it from attacks. Also, it will compare similarity and differences between them. Three distributed complex system Telecommunication –it is a system which is used for connecting mobile, computer and internet network. Usually, they are connected with a centralized server. it is a very complex system as electrical waves are sent and received. Banking– there is a centralized banking system which are used by large banks to perform their operations. This system is highly secured as it contains data of large sets. Internet –In modern world internet has emerged as highly complexed and advance distributed computer system. Here, example can be taken is Google (Ruths and Ruths, 2014). It is a search engine that consists of millions of website and webpages. How well each system defend attack 1) the systems are protected with several types of security layer. The sever is secured with advance protocols and allows user to interact with outside system. In case of any attack immediate action is taken. 2) these systems are secured with high security measures and protocols. In this updated software and applications are installed to defend it from attacks. 3) Google is highly protected from attacks. They are having their own security infrastructure and protocols through which systems are defended. Besides this, it they have establish server in different countries which are connected to each other. Vulnerabilities of system-The above systems can suffer attack from different sources. It can damage the entire network and can lead to loss of data. there are several types of vulnerabilities that can occur. These are as follows :- Modeling –It means flaws in internal controls, security procedure, etc. resulting in security breaches. It can be categorized in two that is information and operational (Friedkin,2015). It affects system by causing data loss. Society is affected as the personal data of people is steal. 1
Fraud-it refers to deception of practice in order to secure unlawful gain. Here, confidential data and information is sold to companies. A fraud can be divided into two that is swindlers and impersonators. The outcome of fraud to system will be improper security of data. entire system has to designed to secure data. society will be affected as well as personal data is leaked. Vulnerability research issues –this means that flaw in design, implementation or deployment of system. The outcome of breach to system will that overall infrastructure has to be redesign resulting in failure. It affects society as services will be interrupted. Among fortune 500, AT&T belongs to telecommunication sector. So, they are having system where all data is stored. They company can suffer from vulnerability of modeling. It can damage their system and lead to data loss (Von Meierand et.al.,2014). Thus, to protect it company must update their security software and applications. The data must be back up frequently so in case of loss it can be retrieved. Moreover, any malicious activities or fraud must be recognized quickly. Comparison and contrast BasisTelecommunicationBankingInternet (Google ) Technological similarities The system is updated withtechnological advancementto providehighquality services. In this systems are not basedontechnology butareupgraded constantly. Systemishighly distributed in various locations.Theyare connectedto centralized server. DifferencesItconnectsdifferent typesofnetworkin large area. Thesystemcanbe centralizedor distributed Itisacompletely differentcomputer system. VulnerabilitiesVulnerability modeling and research issues can occur. Fraudand vulnerability modelingareattacks thatneedstobe defended. Here,anyofabove vulnerabilitycan occurresultingin system failure. Management mobilityThefocusison providing high quality Managementisto protectandsecure Theoverallbusiness is technology focused. 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
serviceswithout interruptions. financialtransaction anddataof consumers. CONCLUSION It can be concluded that distributed systems process large sets. It is very crucial to design and implement security measures so that vulnerabilities can be defended. Each system has their own method of defending attacks. There are different types of attack such asmodeling,fraud, etc. that can result in data loss, interruptions, etc. 3
REFERENCES Books and journals Azar,A.T.andVaidyanathan,S.eds.,2015.Chaosmodelingandcontrolsystems design(Vol. 581). Germany: Springer. Friedkin, N.E., 2015. The problem of social control and coordination of complex systems in sociology: A look at the community cleavage problem.IEEE Control Systems,35(3), pp.40-51. Ruths, J. and Ruths, D., 2014. Control profiles of complex networks.Science,343(6177), pp.1373-1376. Von Meier, A. and et.al.,2014, February. Micro-synchrophasors for distribution systems. InInnovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES(pp. 1-5). IEEE. 4