06 Flashcards
____________ is the one demand delivery of IT resources and applications across the internet
Cloud Computing
___________ is how you implement cloud in your business
Deployment methods
In a ___________ the cloud infrastructure is provisioned for exclusive use by a single organization comprised of multiple consumers
Private Cloud
In aq ___________ the cloud infrastructure is provisioned for open use by the public and may be owned /operated by a business, academic, or government organization or both.
Public Cloud
A _____________ exists when multiple organizations share a common concern, such as specific security requirements
community cloud
A _____________ consists of the combination of two or more cloud deployment models
____________ where additional processing is handled outside the standard cloud infrastructure
Hybrid Cloud
Cloud Bursting
____________ is how you utilize the cloud
service model
_____________ Is the customers use of applications running from a cloud provider but they have no control over the infrastructure
SaaS Software as a service
____________ is when a client creates their own applications or software but uses programming languages and tools supported by the cloud provider. The client has no control over the infrastructure
Paas Platform as a Service
_______________ is the provisioning of processing, storage, and networks to a customer
Infrastructure as a service Iaas
_____________ is the analysis and practice of concealing information and sensitive data
Cryptography
______________ encrypts data, hiding contents from unauthorized users
Confidentiality
______________ Provides checksums and supports digital signatures
Integrity
_______________ Credential checks ensure availability to authorized users while denying access to unauthorized users
Availability
_______________ When user accounts are assigned a password, that password is hashed and stored in the system , whe the same account tries to login the password they enter is hashed and compared to the one stored in the database. If it matches their let in.
Password Authentication
______________ by hashing certain installed files, such as an executable, a user is assured that file has not been changed or replaced by another
File Verification
_____________ Is a technique of providing confidentiality by converting ordinary data into ciphertext, which is unintelligible
Encryption
____________ uses a single key to encrypt and decrypt the data. Both the sender and receiver must have a copy of the same key
Symmetric Encryption
____________ Uses a different key for encryption than decryption. Based on a one-way function where the same key used for encryption of the data cannot be used for decryption of the data.
Asymmetric encryption
To be sure a sender is who they say they are ________________ are used.
digital signatures
Verifying identity and if the user is allowed to a space is achieved through _________________
digital certificates
_______________ is the protection of the network devices, data, and users, in essence the network as a whole entity
network security
A _________ is defined as something that has the potential to damage the network, to include data, hosts, or users.
Network threat
Common network threats are?
Hardware failures
Access
Malware
Social engineering
Denial of service