Professional Documents
Culture Documents
sample 2 PROTECTING A DISTRIBUTED SYSTEM
sample 2 PROTECTING A DISTRIBUTED SYSTEM
CYBERATTACKS
SUBMITTED BY :
MOHAMED NAUFAL H (911520104027)
ATHIL MOHIDEEN S (911520104006)
AL FAHAD A (911520104003)
KARTHI KUMAR S(911520014019)
FIDEL CASTRO K(911520104014)
CYBERATTACKS
INTRODUCTION:
Distributed systems are composed of multiple
independent nodes that communicate and coordinate over a
network. They offer advantages such as scalability, fault
tolerance, and availability, but they also pose significant
challenges for security and protection from cyberattacks. In
this article, you will learn some basic concepts and best
practices for securing and protecting a distributed system from
malicious actors
REFERENCES :
[1] https://www.tutorialspoint.com/Distributed-Systems
[2]https://www.geeksforgeeks.org/types-of-cyber-
attacks/?ref=lbp
[3]https://www.linkedin.com/advice/3/how-do-you-secure-
protect-distributed-system-from-
cyberattacks#:~:text=The%20first%20step%20to%20secure,p
ermissions%20based%20on%20predefined%20policies.
[4]https://www.linkedin.com/pulse/how-secure-your-
distributed-system-system-design-us