7 - Cloud Security and Governance Flashcards

1
Q

Security concerns

A

Loss of control
Lack of trust
Multitenancy

MTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalling

(3 firewalls)

A

Main firewall
then border systems route to DMZ
DMZ contains app servers

3 firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIDS

A

Network Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS: Purpose

A

Monitors local traffic for irregular activity.

Eg port scans, ddos, exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIDS: Speed

A

Quite slow as must inspect every packet and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Volumetric Attacks

A

Use massive traffic. Easy to generate

Impact: Blocks access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocol Attacks

A

Exploit weaknesses in L3 and L4 protocols

Impact: All processing capacity consumed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Attacks

A

Exploit L7 weaknesss. Sophisticated and challenging to identify

Impact: Exhaust resources by monopolising processes and transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS scrubbing

A

Traffic goes to high bandwidth scrubber before legitimate traffic is allowed back

Expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HIDS

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIDS: Purpose

A

Monitors server state for unusal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data segmentation

A

Separating data by sensitivity. High sensitivity data would require full system breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Responding to attacks

A

Cut off intruder
Identify atack vector
Wipe server and start over with patch
Launch server again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat model

A

Helps in analysing a security problem, design mitigation and solutions.

Identify threats
Rank
Choose strategies
Build solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker model: Questions to consider

A

insider vs outsider?
single vs collaborator?

What motivates them?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Governance

A

The act of defining, monitoring and auditing rules, guidelines, policies and processes about security.

17
Q

Security issues with cloud computing

A

No direct control over hardware and thus data
Files might not be deleted
Machine could be compromised without knowledge
In public cloud cannot audit physical machines

18
Q

Security benefits of cloud computing

A

Servers held in a secure location - intrusion difficult
always up to date
Dedicated security teams & DDOS protections