Cloud Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the basic components of cloud security, and what do they aim to protect?

A

Confidentiality, Integrity (data and origin), and Availability are the basic components of cloud security. They aim to protect data, resources, and access in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four types of security attacks, and how do they compromise security?

A

The four types of security attacks are:

Interruption (attacks on availability)
Interception (attacks on confidentiality)
Modification (attacks on integrity)
Fabrication (attacks on authenticity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the classes of security threats in the cloud, and how do they affect security?

A

Classes of threats in the cloud include Disclosure, Deception, Disruption, and Usurpation. They impact security by compromising privacy, modifying data, causing disruptions, and impersonating entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the relationship between policies and mechanisms in cloud security?

A

Policies define what is and isn’t allowed in a system, while mechanisms enforce these policies. If policies conflict, discrepancies can create security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the primary goals of security in the cloud, and what do they aim to achieve?

A

The primary goals of security in the cloud are Prevention (preventing security policy violations), Detection (detecting violations), and Recovery (stopping attacks, assessing and repairing damage, and maintaining functionality).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What role do trust and assumptions play in cloud security?

A

Trust and assumptions underlie all aspects of security, from defining unambiguous policies to mechanisms that enforce policies and supporting mechanisms that work correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of mechanisms in cloud security, and how do they work?

A

The types of mechanisms include secure mechanisms (precisely define a set of reachable states) and broad mechanisms (define a set of secure states).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the stages of assurance in cloud security, and what do they involve?

A

Assurance involves Specification (requirements analysis and functionality statement), Design (how the system meets the specification), and Implementation (creating programs/systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What operational issues are important in cloud security, and how do they impact decision-making?

A

Operational issues include Cost-Benefit Analysis (determining the cost-effectiveness of security measures), Risk Analysis (evaluating what and how much to protect), and Legal and Customary considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What human issues can affect cloud security, and what challenges do they introduce?

A

Human issues in cloud security include Organizational Problems (power, responsibility, and financial benefits) and People Problems (addressing outsiders, insiders, and social engineering).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do security attacks compromise the security of information, and what are the four types of security attacks?

A

Security attacks compromise information security. The four types of attacks are Interruption (attacks on availability), Interception (attacks on confidentiality), Modification (attacks on integrity), and Fabrication (attacks on authenticity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the classes of threats in cloud security, and what types of security issues do they represent?

A

Classes of threats in cloud security include Disclosure (privacy issues), Deception (modification, spoofing, repudiation of origin, denial of receipt), Disruption (modification), and Usurpation (modification, spoofing, delay, denial of service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do policies and mechanisms interact in cloud security, and what can discrepancies in policies lead to?

A

Policies define “security” for a system, and mechanisms enforce policies. If policies conflict, discrepancies may create security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the primary goals of security in the cloud, and what do they aim to achieve?

A

The primary goals of security in the cloud are Prevention (preventing security policy violations), Detection (detecting violations), and Recovery (stopping attacks, assessing and repairing damage, and maintaining functionality).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do trust and assumptions underlie security in the cloud, and what do they relate to in terms of policies and mechanisms?

A

Trust and assumptions underlie all aspects of security in the cloud. They relate to unambiguously partitioning system states and ensuring that policies correctly capture security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two types of mechanisms in cloud security, and how do they relate to reachable and secure states?

A

The two types of mechanisms are secure mechanisms (precisely define a set of reachable states) and broad mechanisms (define a set of secure states).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What stages are involved in assurance in cloud security, and what does each stage entail?

A

Assurance involves Specification (requirements analysis and functionality statement), Design (how the system meets the specification), and Implementation (creating programs/systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What operational issues are important in cloud security, and what considerations are involved in these issues?

A

Operational issues include Cost-Benefit Analysis (determining the cost-effectiveness of security measures), Risk Analysis (evaluating what and how much to protect), and Legal and Customary considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the human issues that can impact cloud security, and what challenges do they introduce?

A

Human issues in cloud security include Organizational Problems (power, responsibility, and financial benefits) and People Problems (addressing outsiders, insiders, and social engineering).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What threats and challenges are introduced by virtualization in cloud security, and what are some potential vulnerabilities associated with hypervisors?

A

Virtualization introduces threats and challenges, including resource isolation. Hypervisor vulnerabilities may include shared clipboard technology, keystroke logging, virtual machine backdoors, and ARP poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Data Life Cycle Management?

A

Data Life Cycle Management involves managing data throughout its entire lifecycle, from creation and storage to processing, archiving, and eventual disposal or deletion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the key security considerations in Data Life Cycle Management?

A

The key security considerations include confidentiality, integrity, and availability of data, as well as compliance with regulations and secure data handling practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the significance of the research article titled “Hey, You, Get Off of My Cloud!”?

A

The research article explores information leakage in third-party compute clouds, specifically Amazon EC2, and investigates the practicality of cross-VM attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the motivation behind the attack model in cloud security research?

A

The motivation is to study the practicality of mounting cross-VM attacks in existing third-party compute clouds, such as Amazon EC2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the assumptions of the threat model in cloud security research?

A

The threat model assumes that the provider and infrastructure are trusted, does not consider attacks that rely on subverting administrator functions, and focuses on non-provider-affiliated malicious parties and their potential victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Amazon EC2, and how does it work?

A

Amazon EC2 is a scalable, pay-as-you-go compute capacity service in the cloud that allows customers to run different operating systems within virtual machines. It offers various instance types, regions, and availability zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the primary goal of Cloud Cartography in cloud security research?

A

The primary goal is to map the cloud service’s infrastructure to understand instance placement, verify co-residency, map IP address ranges, and assess security implications.

27
Q

How is network probing used to determine co-residency in a cloud environment?

A

Network probing involves identifying public servers hosted in Amazon EC2, verifying co-residency by analyzing network characteristics, and using external and internal probes to gain insights into instance placement.

28
Q

What methods are used to determine co-residency of instances in a cloud environment?

A

Methods for determining co-residency include matching Dom0 IP addresses, measuring small packet round-trip times, and identifying numerically close internal IP addresses.

29
Q

Why is privileged user access a security concern in cloud computing?

A

Privileged user access is a security concern because sensitive data processed outside the enterprise bypasses traditional in-house controls, and customers must trust their cloud providers to manage and secure their data.

30
Q

Why is regulatory compliance and audit important in cloud computing?

A

Regulatory compliance and audit are important because cloud providers need to undergo scrutiny to ensure data security and legal compliance. Customers need assurance that their data remains secure and compliant with regulations.

31
Q

Why is data location a critical issue in cloud computing?

A

Data location is critical because cloud data centers may be located in different jurisdictions with varying regulations. Legal implications, responsibility for compliance, and data sovereignty issues arise from data stored across borders.

32
Q

Why is data segregation a concern in the cloud?

A

Data segregation is a concern because data in the cloud is typically in a shared environment alongside data from other customers. Proper segregation is crucial to prevent data leakage and ensure data privacy.

33
Q

What is the significance of recovery in cloud computing?

A

Recovery is essential in cloud computing to ensure data and service availability in case of disasters. It involves determining recovery point objectives (RPO) and recovery time objectives (RTO) for data and services.

34
Q

Why is investigative support challenging in cloud computing?

A

Investigative support is challenging in the cloud because logging and data for multiple customers may be co-located, making it difficult to investigate inappropriate or illegal activities.

35
Q

What factors may necessitate switching cloud providers in the long term?

A

Factors for switching cloud providers may include contract changes, provider bankruptcy, service shutdown, decreased quality, and business disputes. Vendor lock-in is a potential problem.

36
Q

What is virtualization, and how does it work in cloud computing?

A

Virtualization involves running multiple virtual machines (VMs) on a single physical machine. In cloud computing, it enables resource isolation and efficient use of hardware.

37
Q

Why is access control and identity management crucial in cloud computing?

A

Access control and identity management are essential to ensure the security of cloud resources and prevent identity theft. They help authenticate users and services based on credentials and characteristics.

38
Q

What are some common security concerns in cloud application security?

A

Common security concerns include injection attacks, cross-site scripting, flooding, DNS poisoning, metadata spoofing, and insecure communication channels in cloud-based applications.

39
Q

What is Data Life Cycle Management?

A

Data Life Cycle Management involves managing data throughout its entire lifecycle, from creation and storage to processing, archiving, and eventual disposal or deletion.

40
Q

What are the key security considerations in Data Life Cycle Management?

A

The key security considerations include confidentiality, integrity, and availability of data, as well as compliance with regulations and secure data handling practices.

41
Q

What is the topic “Verifying Co-residency Check” about?

A

Verifying Co-residency Check involves determining whether two instances in a cloud environment are co-resident on the same physical machine.

42
Q

What is the “Effective Co-residency Check” in cloud computing?

A

The Effective Co-residency Check is a method to determine if two instances are co-resident based on factors like close internal IP addresses and short communication times.

43
Q

How can co-residence be caused in cloud computing?

A

Co-residence can be achieved by strategies such as brute-force placement and leveraging placement locality in the cloud.

44
Q

What are the key security issues discussed in cloud computing?

A

The key security issues in cloud computing include trust and dependence on providers, securing loosely-coupled collaborations, and the challenges of loosely-coupled systems.

45
Q

What is the role of a broker in the cloud marketplace?

A

A broker in the cloud marketplace helps customers select the best cloud provider, safeguard customer interests, and monitor services.

46
Q

What is the “INTRODUCTION” in the context of cloud computing?

A

The introduction provides an overview of the rapid growth of cloud services and the need for a middleman or intelligent broker to assist customers in selecting cloud providers.

47
Q

: What are the objectives of the research in cloud service provider selection?

A

The objectives include selecting a trustworthy and competent collaboration service provider, minimizing access risk, formulating a heuristic for minimal excess privilege, and creating a secure collaboration framework.

48
Q

What is the primary objective of “Objective - I”?

A

The primary objective of “Objective - I” is to create a framework (SelCSP) for selecting a trustworthy and competent collaboration service provider.

49
Q

What is the objective of “Objective II”?

A

The objective of “Objective II” is to select requests from anonymous users to minimize access risk and security uncertainty due to information sharing.

50
Q

What is the purpose of “Objective III” in cloud computing?

A

“Objective III” aims to formulate a heuristic for solving the IDRM problem, ensuring minimal excess privilege is granted.

51
Q

What is the goal of “Objective IV” in cloud computing?

A

The goal of “Objective IV” is to create a distributed secure collaboration framework that dynamically detects and removes access conflicts using only local information.

52
Q

What is the primary focus of “Causing Co-residence” in cloud computing?

A

“Causing Co-residence” focuses on strategies for achieving co-residence between instances in the cloud, such as brute-force placement and leveraging placement locality.

53
Q

Why is “Leveraging Placement Locality” important in cloud environments?

A

Leveraging placement locality is important to improve the chances of achieving co-residence with specific target instances in the cloud.

54
Q

How does “Exploiting Co-residence” affect cloud security?

A

Exploiting Co-residence” discusses how cross-VM attacks can lead to information leakage and the potential risks involved in cloud security.

55
Q

What challenges are addressed in “Security Issues in Cloud Computing”?

A

“Security Issues in Cloud Computing” discusses challenges related to securing loosely-coupled collaborations in cloud environments and the limitations of existing authentication/authorization mechanisms.

56
Q

What is the main topic of “Broker for Cloud Marketplace” in cloud computing?

A

“Broker for Cloud Marketplace” focuses on the role of brokers in the cloud marketplace, helping customers select suitable cloud providers.

57
Q

What are the objectives of the research on cloud service provider selection?

A

The objectives include selecting a trustworthy and competent collaboration service provider, minimizing access risk, formulating a heuristic for minimal excess privilege, and creating a secure collaboration framework.

58
Q

What is the key challenge discussed in “SaaS Cloud-based Collaboration”?

A

A key challenge is securing loosely-coupled collaborations in cloud environments, especially in the context of SaaS-based cloud collaboration.

59
Q

What is the primary focus of “Types of collaboration in multi-domain/cloud systems”?

A

The primary focus is on exploring tightly-coupled and loosely-coupled collaborations in multi-domain/cloud systems and the associated challenges.

60
Q

What is the main objective discussed in “Objective I” related to cloud computing?

A

The main objective is to create a framework for selecting a trustworthy and competent collaboration service provider.

61
Q

What challenges are addressed in “Security Issues in Cloud Computing”?

A

“Security Issues in Cloud Computing” discusses challenges related to securing loosely-coupled collaborations, trust issues, and limitations in authentication/authorization mechanisms in cloud environments.

62
Q

How does “Exploiting Co-residence” affect cloud security?

A

“Exploiting Co-residence” explores how cross-VM attacks can lead to information leakage and the potential security risks in cloud environments.

63
Q

What is the role of “Leveraging Placement Locality” in cloud security?

A

“Leveraging Placement Locality” focuses on optimizing co-residence with target instances by taking advantage of the placement locality in cloud environments.

64
Q

Why is “Causing Co-residence” relevant in cloud security?

A

“Causing Co-residence” discusses strategies for achieving co-residence in the cloud, which can be important for various cloud security assessments.

65
Q

How does “Effective Co-residency Check” help in cloud security?

A

“Effective Co-residency Check” involves using a quiet and reliable check to determine if two instances are co-resident in a cloud environment.