06 Flashcards
____________ is the one demand delivery of IT resources and applications across the internet
Cloud Computing
___________ is how you implement cloud in your business
Deployment methods
In a ___________ the cloud infrastructure is provisioned for exclusive use by a single organization comprised of multiple consumers
Private Cloud
In aq ___________ the cloud infrastructure is provisioned for open use by the public and may be owned /operated by a business, academic, or government organization or both.
Public Cloud
A _____________ exists when multiple organizations share a common concern, such as specific security requirements
community cloud
A _____________ consists of the combination of two or more cloud deployment models
____________ where additional processing is handled outside the standard cloud infrastructure
Hybrid Cloud
Cloud Bursting
____________ is how you utilize the cloud
service model
_____________ Is the customers use of applications running from a cloud provider but they have no control over the infrastructure
SaaS Software as a service
____________ is when a client creates their own applications or software but uses programming languages and tools supported by the cloud provider. The client has no control over the infrastructure
Paas Platform as a Service
_______________ is the provisioning of processing, storage, and networks to a customer
Infrastructure as a service Iaas
_____________ is the analysis and practice of concealing information and sensitive data
Cryptography
______________ encrypts data, hiding contents from unauthorized users
Confidentiality
______________ Provides checksums and supports digital signatures
Integrity
_______________ Credential checks ensure availability to authorized users while denying access to unauthorized users
Availability
_______________ When user accounts are assigned a password, that password is hashed and stored in the system , whe the same account tries to login the password they enter is hashed and compared to the one stored in the database. If it matches their let in.
Password Authentication
______________ by hashing certain installed files, such as an executable, a user is assured that file has not been changed or replaced by another
File Verification
_____________ Is a technique of providing confidentiality by converting ordinary data into ciphertext, which is unintelligible
Encryption
____________ uses a single key to encrypt and decrypt the data. Both the sender and receiver must have a copy of the same key
Symmetric Encryption
____________ Uses a different key for encryption than decryption. Based on a one-way function where the same key used for encryption of the data cannot be used for decryption of the data.
Asymmetric encryption
To be sure a sender is who they say they are ________________ are used.
digital signatures