Lecture 5 Flashcards

Cloud Database Security

1
Q

What is a cloud database? (!!)

A

It is a database that runs on the internet, which allows companies to manage their data without the need for on-premise physical servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of cloud databases? (!!)

A

-Public: using shared public services.

-Private: a cloud environment dedicated to one organization. could be on or off-premise.

-Hybrid: combining both public and private cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 advantages of cloud databases? (!!)

A

-Scalability: scales up/down on demand.

-Low cost: no need for hardware.

-Accessibility: can be accessed from anywhere.

-Managed services: database is managed by provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 4 challenges to cloud databases: (!!)

A

-Security concerns: data is in the providers hands.

-Internet reliance: internet inconsistency can effect connectivity to the cloud.

-Vendor Lock-in: hard to switch providers.

-Complaince risk: makes compliance more complicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is cloud database security? (!!)

A

The strategies and tools designed to protect data in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the shared responsibility model of cloud security: (!!)

A

The security responsibility is shared between both the cloud service provider and the customer, where:
-The CSP handles the security of hardware, network, and infrastructure.
-The customer secures data, applications, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 4 best practices in cloud database security? (!!)

A

-Encryption.
-Access Control.
-Regular Auditing.
-Multi-Factor Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List 3 advanced tools for cloud database security:

A

System Information and Event Management tools (SIEM): analysis logs and responds to potential threats.

Intrusion Detection Systems (IDS): detects and alerts for suspicious activity.

Backup and Disaster Recovery Planning tools: ensures up-to-date automated backups of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Talk about some future trends in cloud database security: (!!)

A

Cloud security is evolving and some future trends are machine learning, zero trust architecture, and confidential computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the “Zero Trust Architecture (ZTA)”? (!!)

A

it is a modern principle of never trusting anything without verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List 3 key features of the zero trust architecture: (!!)

A

-Continuous Verification.

-Micro-segmentation: network is segmented to limit access to sensitive data.

-Least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is confidential computing? (!!)

A

Confidential computing is using hardware to keep data protected and encrypted while it’s being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What makes confidential computing different than homomorphic encryption?

A

1- Homomorphic encryption relies on encryption techniques, whereas confidential computing uses security hardware.

2- Homomorphic encryption processes data while its encrypted, but confidential computing processes data in plaintext but using secure hardware.

3- Homomorphic is slower, confidential computing is faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 benefits to confidential computing?

A

-Data protection in use.
-More trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly