Module 2
Secure Software Development (Computer Science)
Unit 10
From Distributed Computing to Microarchitectures
Learning Outcomes
- Describe a variety of distributed systems, and the pattern in which they evolved.
- Discuss the security attacks that distributed systems, in particular, are vulnerable to.
- Understand the ways in which virtual systems need to be protected due to the specific nature of attacks on them.
e-Portfolio Component: Collaborative Discussion 2: Cryptography case study - TrueCrypt
- A summary post was provided to the discussion forum. Link to the discussion forum's post: here
Reflection
- Due to overlapping work commitments in Unit 11, I prioritized the development activities in this unit. Unfortunately, my initial design required revisions due to poor planning. Had I developed a comprehensive plan in Unit 9, I could have avoided unnecessary rework.