90 STUDY GUIDE Flashcards
7111.01 IT Infrastructure
7111.02 IT Architecture
7111.03 Operating systems (OS)
7111.03 Operating systems (OS)
7111.04 Servers
7111.05 Network infrastructure
Network infrastructure
Purpose:
Connectivity: Establishes connections between various devices and servers for communication and data sharing.
Data transmission: Facilitates the smooth and swift data transmission between connected entities.
Security and control: Network infrastructure incorporates security measures to control access and protect data during transmission.
Examples:
>Switches
>Routers
>Firewalls
>Wireless access points (WAP)
7111.06 End-user devices
End-user devices
Purpose:
* Access to resources: End-user devices are the primary means for individuals to access organizational resources and applications.
* Productivity: These devices enable users to perform various tasks, including document creation, communication, and data analysis.
* Mobility: Allows users to access organizational resources remotely, promoting flexibility and mobility.
Examples:
Personal computers (PCs)
Laptops
Tablets
Smartphones
7111.07 Additional components
Middleware
Storage systems
Virtualization platforms
7111.08
Cloud Computing
Cloud computing is a popular term referring to a concept of computing where processing and storage are performed elsewhere over a network connection rather than locally. Cloud computing is often thought of as internet‐based computing or remote virtualization.
Some of the concepts in cloud computing are listed here:
Platform as a service (PaaS) is a cloud solution that provides all the aspects of a platform (the operating system and complete solution package). The cloud provider might provide virtual desktops so the organization can deploy their applications.
Software as a service (SaaS) provides on‐demand online access to specific software applications or suites without the need for local installation. SaaS can be implemented as a subscription service (for example, Microsoft Office 365).
Infrastructure as a service (IaaS): Users can access the underlying cloud infrastructure resources, such as virtual machines and other abstracted hardware and operating systems. Users can self‐provision their infrastructure from a console to build adaptable and customizable computer systems.
Cloud deployment models:
- A private cloud is a cloud service isolated from the internet within a corporate network. The private cloud is for internal use only. A virtual private cloud is a service offered by a public cloud provider that provides an isolated subsection of a public or external cloud for exclusive use by an organization internally. In other words, an organization outsources its private cloud to an external provider.
- A public cloud is a cloud service that is accessible to the public, typically over an internet connection. Public cloud services may require some form of subscription or pay-per-use or may be offered for free. Although an organization’s or individual’s data is usually kept separated and isolated from other customers’ data in a public cloud, the overall purpose and use of the cloud is the same for all customers.
- A hybrid cloud is a mixture of private and public cloud components. For example, an organization could host a private cloud for exclusive internal use but distribute some resources onto a public cloud for the public, business partners, customers, the external sales force, and so on.
- A community cloud is a cloud environment maintained, used, and paid for by a group of users or organizations for their shared benefit, such as collaboration and data exchange. This may allow for some cost savings compared to accessing private-public clouds independently.
7111.08 Cloud Computing (screenshot)
7111.09 Advantages of cloud computing
Advantages of cloud computing
- Cost reduction: One of the biggest advantages of using cloud computing is the reduction in hardware as well as software maintenance costs, as the cloud service providers make these investments.
- Backup and restore data: It is easy to back up and recover data stored on the cloud.
- Anytime, anywhere accessibility: Information stored on the cloud can be accessed anytime, anywhere in the world, leading to improved productivity for the company.
- Easy to deploy: Applications can be easily deployed globally in multiple geographic locations and the system can function quickly.
- Pay as you go: Companies can pay for the services as per their usage.
- Unlimited storage capacity: As the cloud offers unlimited storage capacity, businesses can easily scale resources up or down to increase or reduce the capacity as per the needs of the business.
- Agility: The cloud offers a range of cutting-edge technologies, enabling businesses to experiment and test new ideas.
7111.10 Disadvantages of cloud computing
Disadvantages of cloud computing
Although cloud computing services are on the rise, the risk exposure is also on the rise.
- Lack of good internet connection: As cloud services depend on internet connectivity, a good internet connection is a must to use these services, lack of which can hamper work.
- Loss of control: The cloud infrastructure is owned and managed by cloud service providers; therefore, the user has no control over the execution of the services.
- Vendor lock-in: One of the biggest security risks in cloud computing is the movement of services from one vendor to another. Not all vendors provide the same platform, which can make the movement of services difficult.
7111.11
Cloud Governance
Cloud governance
Managing cloud services is a shared responsibility between an organization and the cloud service provider. Developing cloud‐specific standards may enable organizations to increase interoperability and optimize cloud adoption while managing their risk appetite and tolerances. Ensuring that IT is aligned with the business objectives, sensitive data is protected, and risk is managed is challenging in any environment and even more complex in a third‐party arrangement.
Organizational policies must be developed or modified to address the process of outsourcing, managing, and terminating the use of cloud services. Organizations should include fundamental governance activities such as goal setting, policy, defining roles and responsibilities, and managing risk into the organization’s policies and practices when conducting business with technology providers.
Once data leaves an organization, it will have little control over the data. Therefore, the organization should choose wisely where its sensitive or critical data goes, how information processing facilities are accessed, how data is processed, what happens to the data, and how data is shared with third parties.
7111.11 Cloud governance (screen shot)
7111.12
Cloud security controls
Cloud security controls:
- ensure the availability of systems and data.
- maintain the integrity and the confidentiality of sensitive data in transit and at rest.
- include the cloud in security policies.
- restrict personal use of cloud storage and services.
- ensure data storage complies with applicable laws and regulations.
Cloud Service Provider’s Services
7111.13
Infrastructure Management
~Hardware and Software Management
~Network Management
Infrastructure management
Hardware and software management
- Provisioning: Setting up necessary hardware and software resources to support cloud-based services
- Maintenance: Regularly updating hardware and software to maintain optimal performance and security
Network management
- Traffic management: Monitoring and managing data traffic to prevent congestion and ensure smooth service delivery
- Security: Installing and managing firewalls, intrusion prevention systems (IPS), and other network security measures
- Connectivity: Ensuring uninterrupted network connectivity through redundant paths and failover mechanisms
Cloud Service Provider’s Services
7111.13
Data Security
~Encryption
~Access Control
Data security
Encryption
- Data at rest: Encrypting data stored in the cloud to prevent unauthorized access
- Data in transit: Encrypting data during transmission between the cloud and client devices
Access control
- Authentication: Implementing robust authentication mechanisms such as multifactor authentication (MFA)
- Authorization: Setting up access controls to restrict user access to only necessary data and services
Cloud Service Provider’s Services
7111.13
Data Backup and Recovery
~Backup strategies
~Disaster Recovery Planning
Data backup and recovery
Backup strategies
- Scheduled backups: Conducting regular backups of data according to a predetermined schedule
- Geo-redundancy: Storing backup data in geographically separate locations to prevent data loss due to regional disasters
Disaster recovery planning
- Disaster recovery: Developing and implementing plans to restore services in case of catastrophic failures
Cloud Service Provider’s Services
7111.13
Compliance and Legal Obligations
~Regulatory Compliance
~Legal Documentation
Compliance and legal obligations
Regulatory compliance
- Data protection laws: Adhering to data protection regulations such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act of 1996)
Legal documentation
- Service-level agreements (SLAs): Clearly defining service levels, responsibilities, and customer rights in legal documents
- Privacy policies: Outlining how customer data is handled, used, and protected