Chapter 10 Flashcards

Cloud and Virtualization Security (62 cards)

1
Q

Oversubscription

A

When demand exceeds available supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multitenancy

A

Many users sharing resources in the same cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On Demand Self-Service Computing

Benefits of the Cloud

A

Cloud resources are available when and where you need them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scalability

Benefits of the Cloud

A

A principle of application resilience that says that applications should be designed so that computing resources they require may be incrementally added to support increasing demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Elasticity

Benefits of the Cloud

A

A principle of system resilience, which says that systems should be able to automatically provision resources to scale when necessary and then automatically deprovision those resources to reduce capacity (and cost) when it is no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Measured Service

Benefits of the Cloud

A

Everything you do in the cloud is measured by the provider. You pay exactly for what is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agility and Flexibility

Benefits of the Cloud

A

The speed to provision cloud resources and the ability to use them for short periods of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Service Providers

Cloud Roles

A

The firms that offer cloud computing services to their customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Consumers

Cloud Roles

A

The organizations and individuals that purchase cloud services from cloud service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Partners

Cloud Roles

A

Also known as Cloud Brokers. Organizations that offer ancillary products or services that support or integrate with the offerings of a cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Auditors

Cloud Roles

A

Independent organizations that provide third-party assessments of cloud services and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Carriers

Cloud Roles

A

Serve as the intermediaries that provide the connectivity that allows the delivery of cloud services from providers to consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure as a Service (IaaS)

Cloud Service Models

A

A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software as a Service (SaaS)

Cloud Service Models

A

A derivative of platform as a service that provides on-demand online access to specific software applications or suites without the need for local installation (or even local hardware and operating system requirements in many cases).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Platform as a Service (Paas)

Cloud Service Models

A

A cloud service model in which the consumer can deploy tools using a platform but does not manage or control any of the underlying cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Function as a Service (FaaS)

Cloud Service Models - PaaS

A

An example of platform-as-a-service (PaaS) computing that allows customers to upload their own code functions to the provider; the provider will then execute those functions on a scheduled basis, in response to events, and/or on demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Serverless Computing Environments

FaaS

A

An approach that does not expose customers to the actual server instances executing their code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Managed Service Providers (MSPs)

`

A

Services organizations that provide information technology as a service to their customers. MSPs may handle an organization’s IT needs completely, or they may offer focused services such as network design and implementation, application monitoring, or cloud cost management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Managed Security Service Providers (MSSPs)

A

When MSPs offer security services, they are called MSSPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Public Cloud

Cloud Deployment Models

A

Deploy infrastructure and then make it accessible to any customers who wish to take advantage of it in a multitenant model. A cloud delivery model available to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Private Cloud

Cloud Deployment Models

A

A cloud delivery model owned and managed internally. Provisioned to be used by a single customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Community Cloud

Cloud Deployment Models

A

Cloud delivery model in which the infrastructure is shared by organizations with something in common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hybrid Cloud

Cloud Deployment Models

A

Any cloud delivery model that combines two or more of the other delivery model types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bursting

Cloud Deployment Models

A

Leveraging public cloud capacity when demand exceeds the capacity of private cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cloud Bursting
Moving the execution of an application to the cloud on an as-needed basis.
26
Centralized Approach
Refers to security management where all detection, monitoring, and decision-making functions are controlled from a single location.
27
Decentralized Approach
An approach that reduces single points of failure by spreading technology components across multiple providers.
28
Shared Responsibility Model
An operating environment that divides responsibilities between one or more service providers and the customers’ own cybersecurity teams.
29
Responsibility Matrix
A chart that shows the common division of responsibilities between customers and vendors in IaaS, PaaS, and SaaS environments.
30
Edge Computing
An approach that seeks to address the issue of sensors in remote location with poor connectivity by placing some processing power on the remote sensors, allowing them to preprocess data before shipping it back to the cloud.
31
Fog Computing
A concept that uses Internet of Things (IoT) gateway devices that are located in close physical proximity to the sensors. The sensors don't have processing power, but they send data to their local gateway device that performs preprocessing before sending it to the cloud.
32
Virtualization Technology
Emulating one or more physical computers on the same host.
33
Hypervisor
This software helps virtual machines share and use the physical hardware of a computer efficiently. It makes sure each virtual machine gets the resources it needs, like memory and processing power, without interfering with others.
34
Type I Hypervisor
Also known as bare-metal hypervisors. A hypervisor that provides virtualization by running directly on bare-metal hardware.
35
Type II Hypervisor
A hypervisor that provides virtualization by running as an application supported by a host operating system.
36
Containerization
A method of isolating applications and their dependencies into self-contained units called containers.
37
Container ## Footnote Containerization
A method of packaging applications and their dependencies into isolated environments. This ensures that applications run consistently across different systems, regardless of the underlying infrastructure.
38
Block Storage ## Footnote Cloud Storage Resources
Allocates large volumes of storage for use by virtual server instance(s).
39
Elastic Block Storage (EBS) service ## Footnote Cloud Storage Resources
Samething as block storage just that it's offered by AWS.
40
Object Storage ## Footnote Cloud Storage Resources
Provides customers with the ability to place files in buckets and treat each file as an independent entity that may be accessed over the web or through the provider’s API. ## Footnote AWS Simple Storage Service (S3) as an example of this.
41
What are three key security considerations when working with cloud storage?
-Set Permissions Properly -Consider high availability and durability options -Use encryption to protect sensitive data
42
Software-defined network (SDN)
A network that is controlled and configured using code and software.
43
Software-defined visibility (SDV)
A code-defined visibility infrastructure.
44
Security Groups
A feature that defines permissible network traffic.
45
Segmentation
The process of dividing a network into smaller sections (segments or subnets) to improve performance, reduce congestion, and enhance security by isolating traffic. This can be done using VLANs, routers, or firewalls.
46
Vritual Private Clouds (VPCs)
A “datacenter in the cloud,” a VPC is used in Infrastructure as a Service (IaaS) environments as the network that is defined for an organization as their cloud environment.
47
Transit Gateway
Allow the direct interconnection of cloud VPCs with on premises VLANs for hybrid cloud operations.
48
VPC endpoint
Allow the connection of VPCs to each other using the cloud provider's secure network backbone.
49
Infrastructure as Code (IaC)
The process of managing and provisioning computer data centers through machine-readable definition files.
50
Microservices
Cloud service offerings that provide very granular functions to other services, often through a function- as- a- service model. These microservices are designed to communicate with each other in response to events that take place in the environment.
51
Data Sovereignty
A principle that states that data is subject to the legal restrictions of any jurisdiction where it is collected, stored, or processed.
52
Virtual Machine (VM) Escape
The process of breaking out of the constraints of a virtual machine environment to attack or compromise the host system or software.
53
Virtual machine (VM) sprawl
An issue that occurs when virtual machine users create virtual machine instances and then forget about them or abandon them, leaving them to accrue costs and accumulate security issues over time.
54
Resource Reuse
Occurs when cloud providers take hardware resources that were originally assigned to one customer and reassign them to another customer.
55
API Inspection
A technology that scrutinizes API requests for security issues.
56
Secure Web Gateways (SWGs)
Protects organizations from web-based threats by filtering and inspecting internet traffic before allowing access. It acts as a checkpoint between users and the internet, enforcing security policies to block malicious content, prevent data breaches, and ensure compliance.
57
Auditability
Cloud computing contracts that should include language guaranteeing the right of the customer to audit cloud service providers.
58
Cloud Access Security Brokers (CASBs)
Software tools that serve as intermediaries between cloud service users and providers.
59
Inline CASB solutions
Cloud Access Security Broker solutions that physically or logically reside in the connection path between the user and the service.
60
API-Based CASB Solutions
Cloud Access Security Broker solutions that do not interact directly with the user but rather interact directly with the cloud provider through the provider’s API.
61
Resource Policies
Policies offered by cloud providers that customers use to limit the actions that users of their accounts may take.
62
Hardware Security Modules (HSMs)
Special purpose computing devices that manage encryption keys and also perform cryptographic operations in a highly efficient manner.