Are Some RISC-Based Clusters More Secure Than Others?

ثبت نشده
چکیده

In February 2004, TechWise Research published a paper entitled: Total Cost of Ownership for Entry-Level and Mid-Range Clusters. That paper showed that HP OpenVMS/AlphaServer clusters average fewer hours of security-related downtime than IBM AIX/pSeries and Sun Solaris/Sun Fire clusters. TechWise Research decided to conduct a follow-up study to probe specifically into the area of cluster security. The purpose was to better understand the differences between HP, IBM and Sun cluster security costs, and the possible reasons why HP has an advantage over IBM and Sun in this area. The results from this follow-up research are summarized in this paper. For this study, TechWise collected and/or analyzed data from four sources. First, availability data from the February 2004 study were examined in more detail, specifically in the area of crashes caused by security-related incidents. Second, we conducted follow-up executive telephone interviews with respondents from the February 2004 study. These in-depth discussions provided further insight into information regarding security issues and availability differences between the three types of clusters. Quotes and comments from respondents are included in this paper. Third, TechWise Research performed a detailed analysis of the CERT® Coordination Center's database that tracks security vulnerabilities and threats. TechWise Research reviewed all the alerts that were issued between January 1, 2000 and December 31, 2003 to identify the number of security patches that have been released for HP OpenVMS, IBM AIX and Sun Solaris. Lastly, TechWise Research studied the Common Vulnerabilities and Exposures (CVE) database that was developed by the MITRE Corporation. This database was started in 1999 to provide standardized names and descriptions for information security vulnerabilities and exposures. Overall Results: The findings show that HP OpenVMS clusters average the fewest hours of security-related downtime, followed by Sun Solaris, and then by IBM AIX clusters which had the most. The difference between the cluster brands is significant. Sun and IBM clusters average three and five hours more of additional security-related downtime per year, respectively, compared to HP clusters. For many companies, the cost per hour of downtime is measured in the tens, if not hundreds of thousands of dollars. Over a three-year period, HP OpenVMS/AlphaServer clusters have the potential to save companies up to one million dollars, just in security costs, compared to Sun Solaris/Sun Fire and IBM AIX/pSeries clusters. These savings do not take into account any costs suffered when hackers corrupt or steal confidential information. TechWise Research identified several …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

In wireless sensor networks, sensing driven nature of data generation and uneven cluster sizes result in unbalanced data traffic load among clusters. Clusters in which the event generation rate is high and/or clusters that have more members than others suffer from congestion and data loss which negatively affect the accuracy of the collected data. In addition, the cluster heads of such clusters...

متن کامل

پهنه‌بندی پیوسته هدایت الکتریکی- اسیدیته خاک بر اساس خوشه‌بندی فازی برای دشت قم

Electrical conductivity and acidity of soil are the most important chemical factors of soil for agriculture. The nature of soil is in such a way that its change has a continuous form. The method that can take into account this continuity will be able to show a better picture of change in soil characteristics. Objectives of this research are to investigate the relations between measured electric...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

Special Rumen Microbiology

Bacteria make up about half of the living organisms inside of the rumen. However, they do more than half of the work in the rumen. The bacteria work together. Some breakdown certain carbohydrates and proteins which are then used by others. Some require certain growth factors, such as B-vitamins, which are made by others. Some bacteria help to clean up the rumen of others’ end products, such as ...

متن کامل

Special Rumen Microbiology

Bacteria make up about half of the living organisms inside of the rumen. However, they do more than half of the work in the rumen. The bacteria work together. Some breakdown certain carbohydrates and proteins which are then used by others. Some require certain growth factors, such as B-vitamins, which are made by others. Some bacteria help to clean up the rumen of others’ end products, such as ...

متن کامل

Persistent K-Means: Stable Data Clustering Algorithm Based on K-Means Algorithm

Identifying clusters or clustering is an important aspect of data analysis. It is the task of grouping a set of objects in such a way those objects in the same group/cluster are more similar in some sense or another. It is a main task of exploratory data mining, and a common technique for statistical data analysis This paper proposed an improved version of K-Means algorithm, namely Persistent K...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004