Chapter 10 - Security in Cloud Computing Flashcards

1
Q

What are the 3 types of cloud computing?

A

Infrastructure as a Service, Platform as a Service, Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IaaS

A

Ifrastructure as a Service - Provides virtualized computing resources. Third party hosts the servers with hypervisor running the VMs as a guests. Subscribers usually pay on a per-use basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS

A

Geared towards software development. Hardware and software hosted by provider. Develop without having to worry about hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SaaS

A

Provider supplies on-demand applications to subscribers . Offloads the need for patch management, compatability and version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Deployment Model - Public Cloud

A

Services provided over a network that is open for public to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud Deployment Model - Private Cloud

A

Cloud solely for use by one tenant; usually done in larger organziations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Deployment Model - Community Cloud

A

Cloud shared by several organizations, but not open to public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Deployment Model - Hybrid Cloud

A

A composition of two or more cloud deployment models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Carrier

A

Organization with responsibility of transferring data; akin to power distributor for electric grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Consumer

A

Aquires and uses cloud products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Provider

A

Purveyor of products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Broker

A

Manages use, performance and delivery of services as well as relationships between providers and subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud Auditor

A

independent assessor of cloud service an security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FedRAMP

A

regulatory effort regarding cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PCI DSS

A

Payment Card Industy Data Security Standard - Deals with debit and credit cards, but also has a cloud SIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted Computing Model

A

Attempts to resolve computer security problems through hardware enhancements as well as software modifications

17
Q

Roots of Trust (RoT)

A

Set of functions within TCM that are always trusted by the OS

18
Q

CloudInspect

A

Pen-testing application for AWS EC2 users

19
Q

CloudPassage Halo

A

Instant visibility and continuous protection for servers in any cloud

20
Q

Dell Cloud Manager

A

Cloud management tool

21
Q

Qualys Cloud Suite

A

Cloud management tool

22
Q

Cloud Threats & Attacks - Data Breach or Loss

A

Biggest threat; includes malicious theft, erasure or modification

23
Q

Cloud Threats & Attack - Shadow IT

A

IT systems or solutions that are developed to handle an issue but aren’t taken through proper approval chains

24
Q

Cloud Threats & Attack - Abuse of Cloud Resources

A

Another high threat (usuallly applies to IaaS and PaaS)

25
Cloud Threats & Attacks - Insecure Interfaces and API
cloud services can't function without them, but need to make sure they are secure
26
Service Oriented Architecture
API that makes it easier for application components to cooperate and exchange information.
27
Cloud Threats & Attacks - Insufficient Due Diligence
Moving an application without knowing the security differences
28
Cloud Threats & Attacks - Shared Technology Issues
Multitenant environments that don't provide proper isolation.
29
Cloud Threats & Attacks - Unknown Risk Profiles
Subscribers simply don't know what security provisions are made in the background.
30
Cloud Threats & Attacks - Wrapping Attack
SOAP message intercepted and data in envelope is changed and sent/replayed.
31
Cloud Threats & Attacks - Session Riding
CSRF under a different name; deals with cloud services instead of traditional data centers
32
Cloud Threats & Attacks - Side Channel Attack
Using an existing VM on the same physical host to attack another. This is more broadly defined as using something other than the direct interface to attack a system.