In a distributed system, one must consider many possible security risks. To mitigate these risks there are a number of strategies that can be employed: Encryption algorithms that protect data in transit and at rest. Firewalls that limit access to specific ports/cables.