Chapter 10 - Security in Cloud Computing Flashcards

1
Q

What are the 3 types of cloud computing?

A

Infrastructure as a Service, Platform as a Service, Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IaaS

A

Ifrastructure as a Service - Provides virtualized computing resources. Third party hosts the servers with hypervisor running the VMs as a guests. Subscribers usually pay on a per-use basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS

A

Geared towards software development. Hardware and software hosted by provider. Develop without having to worry about hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SaaS

A

Provider supplies on-demand applications to subscribers . Offloads the need for patch management, compatability and version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Deployment Model - Public Cloud

A

Services provided over a network that is open for public to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud Deployment Model - Private Cloud

A

Cloud solely for use by one tenant; usually done in larger organziations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Deployment Model - Community Cloud

A

Cloud shared by several organizations, but not open to public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Deployment Model - Hybrid Cloud

A

A composition of two or more cloud deployment models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Carrier

A

Organization with responsibility of transferring data; akin to power distributor for electric grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Consumer

A

Aquires and uses cloud products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Provider

A

Purveyor of products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Broker

A

Manages use, performance and delivery of services as well as relationships between providers and subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud Auditor

A

independent assessor of cloud service an security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FedRAMP

A

regulatory effort regarding cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PCI DSS

A

Payment Card Industy Data Security Standard - Deals with debit and credit cards, but also has a cloud SIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted Computing Model

A

Attempts to resolve computer security problems through hardware enhancements as well as software modifications

17
Q

Roots of Trust (RoT)

A

Set of functions within TCM that are always trusted by the OS

18
Q

CloudInspect

A

Pen-testing application for AWS EC2 users

19
Q

CloudPassage Halo

A

Instant visibility and continuous protection for servers in any cloud

20
Q

Dell Cloud Manager

A

Cloud management tool

21
Q

Qualys Cloud Suite

A

Cloud management tool

22
Q

Cloud Threats & Attacks - Data Breach or Loss

A

Biggest threat; includes malicious theft, erasure or modification

23
Q

Cloud Threats & Attack - Shadow IT

A

IT systems or solutions that are developed to handle an issue but aren’t taken through proper approval chains

24
Q

Cloud Threats & Attack - Abuse of Cloud Resources

A

Another high threat (usuallly applies to IaaS and PaaS)

25
Q

Cloud Threats & Attacks - Insecure Interfaces and API

A

cloud services can’t function without them, but need to make sure they are secure

26
Q

Service Oriented Architecture

A

API that makes it easier for application components to cooperate and exchange information.

27
Q

Cloud Threats & Attacks - Insufficient Due Diligence

A

Moving an application without knowing the security differences

28
Q

Cloud Threats & Attacks - Shared Technology Issues

A

Multitenant environments that don’t provide proper isolation.

29
Q

Cloud Threats & Attacks - Unknown Risk Profiles

A

Subscribers simply don’t know what security provisions are made in the background.

30
Q

Cloud Threats & Attacks - Wrapping Attack

A

SOAP message intercepted and data in envelope is changed and sent/replayed.

31
Q

Cloud Threats & Attacks - Session Riding

A

CSRF under a different name; deals with cloud services instead of traditional data centers

32
Q

Cloud Threats & Attacks - Side Channel Attack

A

Using an existing VM on the same physical host to attack another. This is more broadly defined as using something other than the direct interface to attack a system.