Distributed Systems and Endpoint Security
Computing
Host/terminal model - users could be physically distributed but all function,
activity, data and resources reside on a single centralized system
Client/Server Model - users operate independent, fully functional desktop
computers
Distributed architectures - prone to vulnerabilities - because desktops can
contain sensitive information - distributed in the desktop environment - need
malware, security controls, etc
Cloud based
Hypervisor is a virtual machine monitor VMM is the component of
virtualization that creates, manages, and operates the virtual machine - the
computer running the hypervisor is known as the host OS - guest OS's are
OS's running within a hypervisor supported virtual machine
Type 1 Hypervisor is native or bare-metal - there is no host OS - hypervisor
installs directly onto the hardware - allows for maximization of the hardware
resources while eliminating risk or resource reduction caused by the OS
Type II Hypervisor - is a hosted hypervisor - standard regular OS is present on
the hardware and the hypervisor is installed as another software application
Cloud storage - idea of using storage capacity provided by the cloud vendor
Elasticity - refers to the flexibility of virtualization and cloud solutions to
expand or contract based on need
PaaS - concept of providing a computing platform and software solution stack
as a virtual or cloud based service
SaaS - provides on-demand online access to specific software applications or
suites without the need for local install
IaaS - provides on-demand operating solutions with complete outsourcing
options - utility or metered computing services, administrative task
automation, dynamic scaling, policy implementation, management services,
managed/filtered Internet