Intro to Google Cloud Flashcards
Compute Service
Services related to virtual machines and computing resources
Storage
Services for data storage solutions
Big Data
Tools and services for handling large data sets
Machine Learning
Services and tools for building ML models
Application Services
Services for developing and running applications
IaaS
Infrastructure as a Service, raw compute, storage, and network capabilities
PaaS
Platform as a Service, code binding to infrastructure
Compute Engine
IaaS offering virtual machines
App Engine
PaaS offering for application deployment
Regions
Geographical areas with Google Cloud data centers
Zones
Subsections within regions for redundancy
europe-west2
Region example in London
europe-west2-a
Zone example within europe-west2 region
Resource redundancy
Ensuring continuous service by duplicating resources (prevent failure from natural disasters)
Multi-region
Resources spanning multiple regions for reliability
Spanner
Google Cloud’s globally distributed database
provenance
Record that describes entities and processes involved in influencing that resource
Hardware security chip
Chip designed for securing hardware
Secure boot stack
Ensuring correct software stack boots
Cryptographic signatures
Verification of software components
Premises security
Physical security measures for data centers
Encryption of inter-service communication
Encrypting communication between services
RPC
Remote Procedure Call, protocol for inter-service communication
U2F
Universal 2nd Factor, security key for user authentication
Encryption at rest
Encrypting stored data
Centrally-managed keys
Managing encryption keys centrally
Hardware encryption
Encryption support in physical storage devices
Google Front End
Google’s service for handling internet traffic securely
TLS connections
Transport Layer Security for encrypted connections
DoS protection
Protection against Denial of Service attacks
Intrusion detection
System for detecting unauthorized access
Reducing Insider risk
Measures to limit insider threats
U2F Security Keys
Physical security keys for user authentication
Per-second billing
Billing based on per-second usage
Discount for VM usage
Cost reduction for sustained VM usage
Custom VM
Customizable virtual machines for cost optimization
Budgets
Setting cost limits
Alerts
Notifications for reaching cost thresholds
Reports
Usage reports for services
Quotas
Limits on resources usage
Rate Quotas
Limits reset after a specific time
Allocation Quotas
Limits on number of resources per project