11 Flashcards
Cloud computing:
Model to provide access to a shared pool of resource
Cloud computing characteristics:
- Network access
- On-demand service
- Measured service
- Resource pooling
- Elasticity
Cloud service models:
- SaaS
- PaaS
- IaaS
Reference architecture:
Tool to describe what cloud services provide using a framework of reference
Reference architecture objectives:
- Understand cloud services as a conceptual model
- Understand cloud services with a technical reference
- Analyze reference
Cloud security threats:
- Immoral cloud computing
- Insecure interfaces
- Malicious insiders
- Sharing issues
- Data loss
- Account hijacking
- Unknown risks
Cloud data protection models:
- Multi-instance
- Multi-tenant
Multi-instance:
Each subscriber has their own DBMS
Multi-tenant:
Tenants share a predefined environment using tags
Cloud Security as a Service (SecaaS) categories of service:
- Access management
- Intrusion management
- Event management
- Web security
- E-mail security
- Network security
OpenStack:
Open-source cloud OS to manage virtual private servers
Keystone services:
- Identity
- Token
- Service catalog
- Policies
Nova services:
- Control VMs
- Manage lifecycles
- Manage machines
- On-demand computing
Generations of IoT:
- Information Technology (IT)
- Operational Technology (OT)
- Personal Technology
- Sensor/Actuator Technology
IoT device components:
- Sensor
- Actuator
- Microcontrollers
- Transceiver
- Radio-frequency identification (RFID)
Sensor:
Measures something and delivers it as an electric signal
Actuator:
Interacts with the environment
Microcontroller:
Provides smart device capabilities
Transceiver:
Sends and receives data
Radio-frequency Identifier (RFID):
Uses radio waves to identify items
IoT security requirements:
- Communication security
- Data security
- Service security
- Security policies
- Security audit
- Authentication and authorization
Gateway security functions:
- Configuration
- Updates
- Maintenance
- Privacy
- Authentication
IoT model levels:
- Embedded systems
- Fog/Edge network
- Core network
- Data center
Security capabilities of IoT model levels:
- Role-based security
- Tamper detection
- Data protection
- Protocol protection
MiniSec features:
- Authentication
- Confidentiality
- Replay protection
- Freshness
- Low energy
- Resilient to lost message