Chap 8 cloud computing Flashcards

1
Q

Cloud Computing

A

delivery of computing services.
services include
1. servers
1. storage
1. databases
1. networking, software

delivered over the internet (“the cloud”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Computing mechanism

A
  • instead of owning and managing physical servers/ infrastructure
  • users can access resources on-demand from cloud service providers.
  • enables users and organizations to rely on external providers for storing, processing, and accessing their data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cloud computing capabilities

A
  • Offers high configuration and economy of scale
  • ensures data and services are always available
  • provides scalable infrastructure for applications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Computing - Key Characteristics

A

1.On-demand self-service:
1. Broad network access:
1. Resource pooling: ** Cloud providers pool and dynamically allocate resources to serve multiple users
1. Rapid elasticity: Cloud resources can be scaled up or down quickly and automatically to meet changing demands
1
Measured service:** Cloud computing resources are typically metered users to pay only for the resources they consume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Computing - Advantages

A
  1. Scalability
  2. Cost-effectiveness:
  3. Flexibility
  4. Accessibility:
  5. Reliability and resilience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Cloud Service Models

A
  1. Infrastructure as a Service (IaaS)
  2. Platform as a Service (PaaS)
  3. Software as a Service (SaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Computing - Issues

A

**New security and privacy problems
**
* can have malicious system admins who could tamper with VMs
* violate confidentiality and integrity.
*
**consumer’s loss of control. **

The consumer relies on the provider to ensure data security and privacy, resource availability, and monitoring/repairing of services.

Trusting a third party requires taking risks. The need for trust arises only in risky situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Taxonomy of Fear

A

specific concerns related to cloud computing security:

  • Confidentiality:
  • Fear of loss of control over data.
  • Integrity:
  • Availability:
  • Would cloud scale well-enough? cloud providers argue their downtime compares well with cloud user’s own data centers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Security as a Service (SecaaS)

A

segment of the SaaS

  • provision of security applications and services via the cloud.
  • can be delivered either to cloud-based infrastructure and software, or from the cloud to the customers’ on-premise systems.
  • designed to enhance the security posture of cloud-based environments and protect data, applications, and infrastructure from various cyber threats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Computing Security - Key Aspects (of SecaaS)

A

Security Tools and Services: Examples include firewall-as-a-service, intrusion detection and prevention systems (IDPS), secure web gateways
Managed Security Services: monitor, detect, and respond to security incidents on behalf of their clients.
Compliance and Governance: helping organizations adhere to standards and regulations. may provide tools for audit logging, compliance reporting, and policy enforcement.
Scalability and Flexibility: organizations to scale security resources up or down based on their needs.
Cost-Effectiveness: By leveraging SECaaS, organizations can avoid the upfront costs of purchasing and maintaining on-premises security infrastructure.
Integration with Cloud Providers: This integration enables centralized security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Computing Security (General Issues Summary)

A

Cloud computing introduces new security and privacy problems.
*
There is a necessity for solutions to protect data and process it securely within the cloud.
*
Even when the cloud provider is deemed honest, there’s a risk from malicious system administrators who could tamper with virtual machines (VMs), compromising confidentiality and integrity.
*
Cloud environments are susceptible to traditional data security issues related to confidentiality, integrity, availability, and privacy, in addition to facing some additional attacks specific to the cloud model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Services: SECaaS (Categories & Specific Offerings)

A
  1. Identity and access management
  2. Data loss prevention
  3. Web security
  4. E-mail security
  5. Security assessments
  6. Intrusion management
  7. Security information and event management
  8. Encryption
  9. Business continuity and disaster recovery
  10. Network security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Range of Security Tools and Services Offered by Providers:

A
  1. Firewall-as-a-Service (FWaaS): Cloud-based firewalls controlling network traffic based on rules.
    1.** intrusion Detection and Prevention Systems (IDPS):** Tools monitoring activities for malicious behavior and alerting/blocking threats.
    1. Secure Web Gateways (SWG): Solutions filtering and inspecting web traffic against threats like malware, phishing, malicious URLs.
    1. Email Security: Services protecting against email threats (spam, phishing, malware, spoofing).
    1. Endpoint Security: Solutions securing endpoints (laptops, desktops, mobile devices) by detecting/preventing malware, unauthorized access, data breaches.
    1. Data Encryption: Tools for encrypting data at rest and in transit.
    1. Identity and Access Management (IAM): Services managing user identities, access rights, and authentication for secure access.
    **1. Security Information and Event Management (SIEM): **Platforms collecting, analyzing, and correlating security events/logs to detect and respond to incidents.
    1. Vulnerability Management: Tools scanning for and remediating vulnerabilities in software, systems, and configurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How Does Cloud Security Work? (Shared Responsibility Model)

A

security duties are divided between the user and the (CSP)

Infrastructure as a Service (IaaS):
Your responsibility: You secure your data, applications, virtual network controls, operating system, and user access.

CSP responsibility: The cloud provider secures compute, storage, and physical network, including all patching and configuration.

Platform as a Service (PaaS):
Your responsibility: You secure your data, user access, and applications.

CSP responsibility: The cloud provider secures compute, storage, physical network, virtual network controls, and operating system.

Software as a Service (SaaS):
Your responsibility: You are responsible for securing your data and user access.

CSP responsibility: The cloud provider secures compute, storage, physical network, virtual network controls, operating system, applications, and middleware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly