Module 2

Secure Software Development (Computer Science)

Unit 10

From Distributed Computing to Microarchitectures

Learning Outcomes

  • Describe a variety of distributed systems, and the pattern in which they evolved.
  • Discuss the security attacks that distributed systems, in particular, are vulnerable to.
  • Understand the ways in which virtual systems need to be protected due to the specific nature of attacks on them.

e-Portfolio Component: Collaborative Discussion 2: Cryptography case study - TrueCrypt

  • A summary post was provided to the discussion forum. Link to the discussion forum's post: here

Reflection

  • Due to overlapping work commitments in Unit 11, I prioritized the development activities in this unit. Unfortunately, my initial design required revisions due to poor planning. Had I developed a comprehensive plan in Unit 9, I could have avoided unnecessary rework.

Phone

-

Address

Mumbai, India