Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Vulnerabilities

Encyclopedia of Multimedia Technology and Networking, Second Edition
Flaws in a Lambda-Grid’s design, management, or operations that can be exploited to violate security policies and procedures.
Published in Chapter:
Implementing DWDM Lambda-Grids
Marlyn Kemper Littman (Nova Southeastern University, USA)
DOI: 10.4018/978-1-60566-014-1.ch089
Abstract
Unprecedented demand for ultrafast and dependable access to computing Grids contributes to the accelerating use of dense wavelength division multiplexing (DWDM) technology as a Lambda-Grid enabler. In the Lambda-Grid space, the DWDM infrastructure provisions dynamic lambdas or wavelengths of light ondemand to support terabyte and petabyte transmission rates; seamless access to large-scale aggregations of feature-rich resources; and extendible Grid and inter- Grid services with predictable performance guarantees (Boutaba, Golab, Iraqi, Li, & St. Arnaud, 2003). DWDM Lambda-Grids consist of shared network components that include interconnected federations of other Grids, dense collections of computational simulations, massive datasets, specialized scientific instruments, metadata repositories, large-scale storage systems, digital libraries, and clusters of supercomputers (Naiksatam, Figueira, Chiappari, & Bhatnagar, 2005). As a consequence of the convergence of remarkable advances in DWDM technology and high-performance computing, Lambda-Grids support complex problem resolution in fields that include seismology, neuroscience, bioinformatics, chemistry, and nuclear physics. This chapter begins with a discussion of Grid development and DWDM technical fundamentals. In the sections that follow, the role of the virtual organization (VO) in establishing and supporting DWDM Lambda-Grid initiatives; capabilities of the Globus Toolkit (GT) in facilitating Lambda-Grid construction; distinguishing characteristics of Lambda-Grid operations, architectures, and protocols; and major Web services (WS) specifications in the Lambda-Grid space are examined. Descriptions of DWDM Lambda- Grid initiatives and security challenges associated with DWDM Lambda-Grid implementations are presented. Finally, trends in DWDM Lambda-Grid research are introduced.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Proactive Information Security Strategy for a Secure Business Environment
Gaps or weaknesses in the design and implementation of safety or security measures which could be exploited accidentally or intentionally by a threat.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Threats in Public and Private Organizations: Evidence From Romania
Gaps or weaknesses in the design and implementation of safety or security measures which could be exploited accidentally or intentionally by a threat.
Full Text Chapter Download: US $37.50 Add to Cart
Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11
In cybersecurity, a vulnerability is a weakness that permits an attacker to diminish a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry
These make a system more prone to attack by a threat, or make an attack more likely to have some success or impact. For example, for fire, a vulnerability would be the presence of inflammable materials (e.g., paper).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR