Question

In: Computer Science

Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...

Explain in at least a paragraph

  • What are the risks associated with a pervasive security infrastructure?
  • What are the reasons for NOT having such infrastructure?
  • What are the alternatives?

Solutions

Expert Solution

In the context of network security, As the name suggests that the pervasive infrastructure is where the resources are shared among the group in a network. For example, In a network, at the physical layer, a physical medium is shared among people in a wired or wireless network. If security architecture is too werak then it can affect the data link layer and network layer too. There are too many risks using this architecture like congestion in the network, some users request the same server a time. While a server can serve all request at the same time but the pervasive infrastructure is unable to send the responses at the same time because of congestion which will lead to Denial of Service. Another risk is related to network security. Since the resources are shared so the same security architecture is shared among all the users. So the eavesdropping at a local access point can lead to high risk in security. Any hacker can grab such kind of eavesdropping in the network using a local access point. These are the reasons why pervasive infrastructure is not preferred. The Alternatives to pervasive infrastructure could be Nomadic and Ubiquitous infrastructure. In Nomadic infrastructure, the networks are about to plug and play type where randomness is very high, while in ubiquitous infrastructure, the security is based on global access.  


Related Solutions

what are pervasive controls? provide an example of at least three?
what are pervasive controls? provide an example of at least three?
Give at least 3 things that are digital security risks. What is a virus, a worm,...
Give at least 3 things that are digital security risks. What is a virus, a worm, and a trojan horse? Give an example of each one. What is https? How do you use it?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
explain audit risks associated with external auditor
explain audit risks associated with external auditor
Explain the risks and benefits associated with holding inventory
Explain the risks and benefits associated with holding inventory
Describe the major Information Security risks that you see associated with the move to this Microservices...
Describe the major Information Security risks that you see associated with the move to this Microservices strategy for Web Services. You should name and describe each risk that you estimate its likelihood and consequence and then describe a possible control for the risk and describe using tabular form
What is behavioral economics? Explain your answer in at least a paragraph.
What is behavioral economics? Explain your answer in at least a paragraph.  How is it different than standard economic theory? Explain your answer in at least a paragraph. 
what could be the Impact of the blockchain on critical infrastructure security ?
what could be the Impact of the blockchain on critical infrastructure security ?
what are the main Risks associated with Trading Derivatives ?
what are the main Risks associated with Trading Derivatives ?
Explain the risks associated with investing in Corporate Bonds, are they the same risk as for...
Explain the risks associated with investing in Corporate Bonds, are they the same risk as for Government Bonds? Why does a bond’s face or par value differ from its market value? Why is the Required Return such an important concept in finance? Explain the efficient markets hypothesis and why it is important to share prices Describe what is meant by systematic risk and unsystematic risk. How is this distinction related to an investment’s beta? Estimate an investor’s required rate of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT