Report on Complex Distributed System Control and Security Measures

Verified

Added on  2021/01/08

|7
|1025
|55
Report
AI Summary
This report provides an in-depth analysis of complex distributed systems, focusing on telecommunication, banking, and the internet. It explores the architecture, security measures, and vulnerabilities inherent in each system, including issues like modeling flaws, fraud, and vulnerability research. The report compares and contrasts these systems based on technological similarities and differences, as well as their respective management approaches. It highlights the importance of robust security protocols to defend against data loss and system failures. The conclusion emphasizes the need for proactive design and implementation of security measures to protect these critical systems from various types of attacks, ensuring their continued functionality and data integrity. References to relevant literature are also included.
Document Page
Complex Distribution System
Control
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
Document Page
INTRODUCTION
In today’s world it is very difficult to identify malicious attacks or vulnerability that can
cause harm so systems. These attacks can even harm complex distributed systems. Any damage
done by it will lead to failure of overall network. thus, it is very essential to control and defend
systems from vulnerabilities (Azar and Vaidyanathan, 2015). This report will describe three
distributed systems and various methods to defend it from attacks. Also, it will compare
similarity and differences between them.
Three distributed complex system
Telecommunication – it is a system which is used for connecting mobile, computer and internet
network. Usually, they are connected with a centralized server. it is a very complex system as
electrical waves are sent and received.
Banking – there is a centralized banking system which are used by large banks to perform their
operations. This system is highly secured as it contains data of large sets.
Internet – In modern world internet has emerged as highly complexed and advance distributed
computer system. Here, example can be taken is Google (Ruths and Ruths, 2014). It is a search
engine that consists of millions of website and webpages.
How well each system defend attack
1) the systems are protected with several types of security layer. The sever is secured with
advance protocols and allows user to interact with outside system. In case of any attack
immediate action is taken.
2) these systems are secured with high security measures and protocols. In this updated software
and applications are installed to defend it from attacks.
3) Google is highly protected from attacks. They are having their own security infrastructure and
protocols through which systems are defended. Besides this, it they have establish server in
different countries which are connected to each other.
Vulnerabilities of system- The above systems can suffer attack from different sources. It can
damage the entire network and can lead to loss of data. there are several types of vulnerabilities
that can occur. These are as follows :-
Modeling – It means flaws in internal controls, security procedure, etc. resulting in security
breaches. It can be categorized in two that is information and operational (Friedkin, 2015). It
affects system by causing data loss. Society is affected as the personal data of people is steal.
1
Document Page
Fraud- it refers to deception of practice in order to secure unlawful gain. Here, confidential data
and information is sold to companies. A fraud can be divided into two that is swindlers and
impersonators. The outcome of fraud to system will be improper security of data. entire system
has to designed to secure data. society will be affected as well as personal data is leaked.
Vulnerability research issues – this means that flaw in design, implementation or deployment
of system. The outcome of breach to system will that overall infrastructure has to be redesign
resulting in failure. It affects society as services will be interrupted.
Among fortune 500, AT&T belongs to telecommunication sector. So, they are having
system where all data is stored. They company can suffer from vulnerability of modeling. It can
damage their system and lead to data loss (Von Meier and et.al., 2014). Thus, to protect it
company must update their security software and applications. The data must be back up
frequently so in case of loss it can be retrieved. Moreover, any malicious activities or fraud must
be recognized quickly.
Comparison and contrast
Basis Telecommunication Banking Internet (Google )
Technological
similarities
The system is updated
with technological
advancement to
provide high quality
services.
In this systems are not
based on technology
but are upgraded
constantly.
System is highly
distributed in various
locations. They are
connected to
centralized server.
Differences It connects different
types of network in
large area.
The system can be
centralized or
distributed
It is a completely
different computer
system.
Vulnerabilities Vulnerability
modeling and research
issues can occur.
Fraud and
vulnerability
modeling are attacks
that needs to be
defended.
Here, any of above
vulnerability can
occur resulting in
system failure.
Management mobility The focus is on
providing high quality
Management is to
protect and secure
The overall business
is technology focused.
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
services without
interruptions.
financial transaction
and data of
consumers.
CONCLUSION
It can be concluded that distributed systems process large sets. It is very crucial to design
and implement security measures so that vulnerabilities can be defended. Each system has their
own method of defending attacks. There are different types of attack such as modeling, fraud,
etc. that can result in data loss, interruptions, etc.
3
Document Page
REFERENCES
Books and journals
Azar, A.T. and Vaidyanathan, S. eds., 2015. Chaos modeling and control systems
design (Vol. 581). Germany: Springer.
Friedkin, N.E., 2015. The problem of social control and coordination of complex systems in
sociology: A look at the community cleavage problem. IEEE Control Systems, 35(3), pp.40-51.
Ruths, J. and Ruths, D., 2014. Control profiles of complex networks. Science, 343(6177),
pp.1373-1376.
Von Meier, A. and et.al., 2014, February. Micro-synchrophasors for distribution systems.
In Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES (pp. 1-5). IEEE.
4
Document Page
5
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]