From Distributed Computing to Microarchitectures
Unit 10
Welcome to Week 10, in which we will consider the variety of system architectures which exist today,
from
monolithic deployments to
microservices,
virtualisation, and
containers.
We will gain an appreciation of the reasons why the architectures have evolved in the manner that they have and recognise the security problems which can become problematic in each.
As we have increasingly moved towards more
distributed modes of
operation, the surface which can be attacked increases.
Intelligent techniques to protect the data that is being transported across these systems is needed, further increasing the drive for system security.
The content this week continues to examine the importance of developing secure software, this time from the perspective of distributed systems and the specific challenges which come from operating in a remote manner.
Security techniques are therefore expanded this week through the consideration of encryption, for example, and the patterns used to distribute encryption keys, in addition to the nature of attacks that are specific to virtualised environments.
This week helps to bring the module content to a more timely and relevant mode of operation, that of being distributed