7.2 Operating System Security P2 Flashcards

1
Q

What is involved in Cloud Computing Security?

A

Hosting your system(s) virtually
Securing the OS within the cloud
What is the cloud? - what is the benefits?
What are the extra challenges?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the benefits of cloud?

A

Productivity gains supported by economies of scale for all enterprises
Data centres that provide cost-effective, secure & sustainable computing power
Increased accessibility for SMEs to computing resources coupled by a standardised interface usage
Efficient scaling of resources
Resources concentration
Timely access to updates & defaults
Effective audit & evidence gathering useful in forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are potential challenges for cloud computing security?

A
What data is it?
Who controls it?
Who has responsibility for what?
What should be in the SLA?
Compatibility & common standards between cloud providers
Can one 'harden' your cloud services
SMEs and security - the corporation / SME still has responsibility for security
Data protection rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does BYOD & cloud computing hardening involve?

A

Technology
Processes
Responsibility
Existing guidance seems to be focused on larger organisations with all the resources, practices, processes
Gaps in provision for SMEs - security dictated by SLAs & sharing responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the OS security practicalities?

A

Camera phones
BYOD policies… practical issues
Dynamic state (all change, new tech, processes, capabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly