Page 606 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 606

Grid computing can also vary greatly in the computational capacity
               from moment to moment. Work packets are sometimes not returned,

               returned late, or returned corrupted. This requires significant
               reworking and causes instability in the speed, progress,
               responsiveness, and latency of the project as a whole and with
               individual grid members. Time-sensitive projects might not be given
               sufficient computational time to finish by a specific chronological
               deadline.


               Grid computing often uses a central primary core of servers to manage
               the project, track work packets, and integrate returned work segments.
               If the central servers are overloaded or go offline, complete failure or
               crashing of the grid can occur. However, usually when central grid
               systems are inaccessible, grid members complete their current local
               tasks and then regularly poll to discover when the central servers come
               back online. There is also a potential risk that a compromise of the
               central grid servers could be leveraged to attack grid members or trick

               grid members into performing malicious actions instead of the
               intended purpose of the grid community.


               Peer to Peer

               Peer-to-peer (P2P) technologies are networking and distributed
               application solutions that share tasks and workloads among peers.

               This is similar to grid computing; the primary differences are that
               there is no central management system and the services provided are
               usually real time rather than as a collection of computational power.
               Common examples of P2P include many VoIP services, such as Skype,
               BitTorrent (for data/file distribution), and Spotify (for streaming

               audio/music distribution).
               Security concerns with P2P solutions include a perceived inducement

               to pirate copyrighted materials, the ability to eavesdrop on distributed
               content, a lack of central control/oversight/management/filtering, and
               the potential for services to consume all available bandwidth.




                             Cryptographic systems are covered in detail in Chapter 6,

                  “Cryptography and Symmetric Key Algorithms,” and Chapter 7,
   601   602   603   604   605   606   607   608   609   610   611