8.7. Summary

It is important to explore the security requirements of a distributed software system as part of the design process. Some large research projects have had security cut from their budget on the grounds that it is separable, a specialist field, and can be added later. Retrofitting security may not be possible without major redesign. A risk analysis should therefore be carried out as part of the design process of a distributed system. For example, UK Government edict is that electronic health records will be transferred across networks. Threats may be from journalists, insurance companies, estranged family members. Penetration might be by interested parties walking into hospitals, undetected among legitimate visitors, rather than by ...

Get Operating Systems: Concurrent and Distributed Software Design now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.