Review - Section 4 and 5 Flashcards
Memorization of some of the key terms/ideas from Chapters 13-15
Cloud Computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Broad Network Access
Computing capabilities are available over the network.
Resource Pooling
Provider’s computing resources are pooled to serve multiple consumers using a multitenant model.
Rapid Elasticity
Computing capabilities can be elastically provisioned and released. Computing capabilities are scaled rapidly, commensurate with consumer’s demand.
Measured Service
Cloud computing provides a metering system that continuously monitors resource consumption and generated reports.
Infrastructure-as-a-Service (IaaS)
Capability provided to provision processing, storage, networks, and other fundamental computing resources.
Platform-as-a-Service (PaaS)
Capability provided to deploy onto the cloud infrastructure consumer-created/acquired applications created using programming languages, libraries, services, and tools supported by the provider.
Software-as-a-Service (SaaS)
Capability provided to use the provider’s applications running on a cloud infrastructure.
Public Cloud Model
The cloud infrastructure is provisioned for open use by the general public.
Private Cloud
The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers. Two variations of private cloud: on-premise, externally hosted.
On-Premise Private Cloud
Aka internal cloud; hosted by an organization within its own data centers.
Externally Hosted Private Cloud
Hosted external to an organization and is managed by a third-party organization.
Community Cloud
The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns.
Hybrid Cloud
The cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
Storage Security
- Process of applying information security principles and practices within the domain of storage network technologies
- Focuses on securing access to information by implementing safeguards or controls
Information Security Framework
Built to achieve four security goals: ○ Confidentiality ○ Integrity ○ Availability ○ Accountability
Risk Triad
Defines risk in terms of threats, assets, and vulnerabilities.