In theDistributed Computing Environment, many processors/nodes remain active in system at any moment,
coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own
code, sometimes ownindependent task, but at the same time there will still be sharing of some common
resources and information. One of the main themes of recent research in distributed computing is "locality"
(as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability
becomes a major issues.
Computing security is, at its core, more than a technical issue. It is a fundamental business challenge.
Managers have plenty of security alternatives, but have very little real guidance on making intelligent
decisions about them. Today's distributed, multi-vendor, Internet-connected environments encompass more
insecure systems and networks than ever before.
Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense
framework for cost-effective computer security. The first step to understand security is to know what the
potential risks are, or more specifically, to determine the type and level of security risks for the
organizations. Security risks are unique to each organization because they are dependent on the nature of
the business and the environment in which the organization operates. Security risk is determined by
identifying the assets that need to be protected.