Question

In: Computer Science

Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...

Explain in at least a paragraph

  • What are the risks associated with a pervasive security infrastructure?
  • What are the reasons for NOT having such infrastructure?
  • What are the alternatives?

Solutions

Expert Solution

In the context of network security, As the name suggests that the pervasive infrastructure is where the resources are shared among the group in a network. For example, In a network, at the physical layer, a physical medium is shared among people in a wired or wireless network. If security architecture is too werak then it can affect the data link layer and network layer too. There are too many risks using this architecture like congestion in the network, some users request the same server a time. While a server can serve all request at the same time but the pervasive infrastructure is unable to send the responses at the same time because of congestion which will lead to Denial of Service. Another risk is related to network security. Since the resources are shared so the same security architecture is shared among all the users. So the eavesdropping at a local access point can lead to high risk in security. Any hacker can grab such kind of eavesdropping in the network using a local access point. These are the reasons why pervasive infrastructure is not preferred. The Alternatives to pervasive infrastructure could be Nomadic and Ubiquitous infrastructure. In Nomadic infrastructure, the networks are about to plug and play type where randomness is very high, while in ubiquitous infrastructure, the security is based on global access.  


Related Solutions

What is Cloud Infrastructure? Explain in a short paragraph.
What is Cloud Infrastructure? Explain in a short paragraph.
In 2/3 paragraph explain what are some risks associated with a newly developed mobile application and...
In 2/3 paragraph explain what are some risks associated with a newly developed mobile application and what should we do about it?
n 2/3 paragraph explain what are some risks associated with a newly developed mobile application in...
n 2/3 paragraph explain what are some risks associated with a newly developed mobile application in terms of financial and market risk and what should we do about it?
n 2/3 paragraph explain what are some risks associated with a newly developed mobile application in...
n 2/3 paragraph explain what are some risks associated with a newly developed mobile application in terms of financial and market risk and what should we do about it?
what are pervasive controls? provide an example of at least three?
what are pervasive controls? provide an example of at least three?
Give at least 3 things that are digital security risks. What is a virus, a worm,...
Give at least 3 things that are digital security risks. What is a virus, a worm, and a trojan horse? Give an example of each one. What is https? How do you use it?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
explain audit risks associated with external auditor
explain audit risks associated with external auditor
Explain the risks and benefits associated with holding inventory
Explain the risks and benefits associated with holding inventory
Describe the major Information Security risks that you see associated with the move to this Microservices...
Describe the major Information Security risks that you see associated with the move to this Microservices strategy for Web Services. You should name and describe each risk that you estimate its likelihood and consequence and then describe a possible control for the risk and describe using tabular form
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT