Security in Cloud Computing Flashcards

1
Q

What is PaaS and what does it provide?

A

Platform as a Service (Paas):
Geared towards software development
Hardware and software hosted by provider
Provides ability to develop without having to worry about hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IaaS and what does it provide?

A

Infrastructure as a Service (IaaS):
Provides virtualized computing resources
Third party hosts the servers with hypervisor running the VMs as guests
Subscribers usually pay on a per-use basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SaaS and what does it provide?

A

Software as a Service (SaaS):
Provider supples on-demand applications to subscribers
Offloads the need for patch management, compatability and version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tool would you use to conduct Multi-Cloud Environments auditing?

A

ScoutSuite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tool would you use to conduct AWS Cloud Environment auditing?

A

Prowler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tool would you use to conduct AWS exploitation?

A

Pacu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 4 type of cloud deployment models.

A
  1. Public Cloud (Services on cloud open to public)
  2. Private Cloud (Single tenant cloud environment)
  3. Community Cloud (Cloud shared by number of organisations, but not open to public)
  4. Hybrid Cloud (Combination of multiple cloud deployment models)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cloud carrier?

A

An intermediary that provides connectivity and transport of cloud services from Cloud Providers to Cloud Consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cloud broker?

A

Manages use, performance and delivery of services as well as relationships between providers and subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is FedRAMP?

A

Cyber security risk management program regarding cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by a Trusted Computing Model?

A

To resolve and harden computer security risks via hardware enhancements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the biggest threat faced in Cloud Computing?

A

Data Breach or Loss - Malicious theft, erasure or modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by the term “Shadow IT”?

A

System or solutions that is developed but haven’t been through proper approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which 2 cloud service models does “Abuse of Cloud Resources” usually applies to?

A
  1. IaaS
  2. PaaS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Cloud Computing, what is the biggest issue faced with APIs?

A

Insecurity of Interfaces and APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of an attack is a Wrapping Attack?

A

Man-In-The-Middle that targets Cloud Environments (Typically SOAP messages).

17
Q

What is mean by a Session Riding attack?

A

Same as CSRF, but is targetted mainly at cloud technologies.

18
Q

What is meant by a Side Channel Attack?

A

Attacking a system without using the direct interface e.g. using a VM to attack another VM that’s on the same physical server.

19
Q

What is a VDI?

A

Virtual Desktop Infrastructure

20
Q

What is meant by serverless architecture

A

Users do not need to spend time tuning systems, as the cloud service is responsible to scaling the capacity for demand.

Valid Concerns with this architecture:
- Dependency on the cloud service provider
- Protection of endpoint security
- Limited disaster recovery options