Exam Prep Flashcards

0
Q

What is commoditisation?

A

Resources are customisable, configurable and reconfigurable for any number of “measured services”. Resources are allocated dynamically in response to varying demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is multi tenancy?

A

Fundamental concept in CC. Resources are organised into multiple portions or “measured services” and allocated in the form of commodities dynamically between providers and consumers. (In demand service/elastic resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five essential characteristics of cloud computing as outlined by NIST?

A
  • On demand services
  • Broad network access
  • Resource Pooling
  • Rapid Elasticity
  • Measured service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is “On-demand service”?

A

Users can unilaterally provision resources from the providers as require without the need for human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is “Broad network access”

A

Capabilities are available over the network and can be accessed via standard means, E.g a thin client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “Resource Pooling”?

A

Providers resources are organised into pools and assigned and reassigned to consumers as required. Users do not know the physical location of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “Rapid elasticity”?

A

Resources can be elastically provisioned and released, sometimes automatically.
Scales quickly outward and inward
User perceives resourced as unlimited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “Measured service”?

A

Resource usage can be monitored and controlled providing transparency for the provider and consumer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the cloud deployment models?

A

Public
Private
Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Public cloud?

A

Provisioned for use by the general public.
On premises of the provider
Managed/owned by a business or government for example
Off site
Untrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Private cloud?

A

Provisioned for use by one organisation or consortium only
On site of organisation or provider
May be owned/managed by organisation or third party
Trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Community cloud?

A

Provisioned for use by a group of organisations with shared interests.
Managed/owned by one of the organisations or third party
On or off premises
Trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Hybrid Cloud?

A

Combination of any toe infrastructures (public, private, community) which are bound by standardised or proprietary technology, allowing data and app portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IaaS?

A

Infrastructure as a service: hardware platform only.
Provides: storage, networking, processing and essential resources
User does not control underplaying hardware
User can deploy arbitrary software, including OS
User controls software, storage, data, and some networking components (firewall etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is PaaS?

A

Platform as a service: users are given access to an IDE/API where they can develop apps in an environment controlled by the provider.
Users have no control over underlying cloud infrastructure
Users have control over apps and potential control over app hosting environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SaaS?

A

Software as a service: users are given access to a fully functional application.
No control over underlying infrastructure or software
Only minimal control over limited app configuration
Eg drop box

16
Q

What is a hypervisor?

A
  • Virtualisation platform that allows multiple os to run on one set of H/W
  • controls host resources
  • allocates resources to VMs
  • prevents VMs from distrusting each other
  • two types
17
Q

What is a type 1 Hypervisor?

A
  • Runs on “bare metal”. I.e directly on hardware
  • better performance then type 2
  • any VM problems are isolated
  • VMs run in top
18
Q

What is a type 2 Hypervisor?

A
  • Runs on top of host OS
  • Better control of policies than type 1
  • Any problems in host os affects whole infrastructure
19
Q

Why is a service orientated architecture/layer important?

A

Provides a unified way so different customers and providers can interact ( provide / demand ) with each other in a unified manner.

20
Q

Outsourcing vs cloud computing

A

Outsourcing is stand alone / CC Isn’t
Workloads are known with outsourcing not with CC
Workload placement is static with outsourcing not with CC
Data location known/ unknown
Outsourcing uses dedicated Hardware, CC does not.
Data replication isn’t allowed in outsourcing - unknown in CC
CC has multi tenancy and multi jurisdiction - outsourcing doesn’t

21
Q

What are the basic components of the reference architecture?

A

Horizontal: Hypervisor, Middleware, Service layer

Vertical: security, system administrator

22
Q

What are some security threats to Cloud Computing?

A
  • Data breaches, leaks and loss
  • malicious insiders
  • Traffic hijacking
  • Insecure APIs
23
Q

What is identity federation?

A

Allows users to authenticate with a central server and access resources from different providers without signing in to each.

  • Organisations don’t need legal agreements
  • allows single sign on
  • Central managed access control
  • easier credential management for all
  • vulnerable to single point if failure ( auth server )
  • eg Shibboleth
24
Q

What are the IAM components?

A

Authentication
Authorisation
Auditing

25
Q

What are the IAM Processes?

A
  • User management
  • Authentication management
  • Authorisation management
  • Access management
  • Access management
  • propagation of identity to resources
  • Monitoring and auditing
26
Q

SAML: Security assertion markup language Uses in FIDM and IAM?

A
  • Used to package users security credentials
  • Avoid duplication of credentials,attributes
  • Provides single sign on experience
27
Q

SPML: security provisioning markup language

Uses in FIDM and IAM?

A

Automatically provision user accounts with cloud services and automate the process of provisioning and deprovisioning

28
Q

XACML: eXtensabile access control markup language

Uses in FIDM and IAM?

A

Provision user accounts with appropriate privileges and manage entitlements

29
Q

OpenAuth uses in FIDM and IAM?

A

Allows cloud service X to access cloud service Y without disclosing credentials

30
Q

Criteria used to describe different deployment models?

A

Who owns the cloud: cloud customer itself or cloud provider;
Where the cloud is located: on-premise or off
Who operates/administrates the cloud: cloud customer itself or cloud provider;
To what users affiliation scope the cloud is intended to be used/accessed eg public, organisation, employee of org, general public

31
Q

New security threats the the cloud?

A

Accountability: who is responsible?
No security perimeter: no control over physical or network location
Larger attack surface: potential for more vulnerabilities
New side channels: you don’t know who’s VM shares physical machine with yours
Data security: is users data secure?
Lack of auditability: only provider has full access to logs etc

32
Q

Discuss the consumers concerns of security in CC

A

Loss of governance: relinquishes some control of infrastructure trust in provider is imperative
Compliance risk: the way in which the provider manages the infrastructure affects the consumers compliance to regulations
Malicious insiders: can they trust?
Data handling: data protection and secure deletion?
Isolation failure: exploiting VMs etc, leakage

33
Q

Discuss three reasons why IAM is fundamental for CC security

A

Allows dynamic trust boundaries
Manages access for diverse user groups
Meets the need for security elements AAA

34
Q

Steps in SSO

A
  1. User logs on to authentication server
  2. Authentication server returns users ticket
  3. User sends ticket to intranet server
  4. Intranet server sends ticket back to authentication server
  5. Authentication server sends back user credentials to intranet server
35
Q

Message flows in identity federation

A
  1. User enter authentication dialogue with IDP in same domain user provides attribute values associated with identity.
  2. Some attributes are provided by administrator in same domain
  3. Service provider, which user is trying to interact with, obtains Id, and associated permissions and info from the IDP in source domain
  4. SP opens session with user and enforces restrictions based on user’s ID
36
Q

Role of service provide and identity provider in FIDM

A

IDP: creates, maintains and manages user identity. Creates SAML assertions.

SP: controls access to a service or resources, consumes SAML assertions