Review - Section 4 and 5 Flashcards

Memorization of some of the key terms/ideas from Chapters 13-15

1
Q

Cloud Computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broad Network Access

A

Computing capabilities are available over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Resource Pooling

A

Provider’s computing resources are pooled to serve multiple consumers using a multitenant model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rapid Elasticity

A

Computing capabilities can be elastically provisioned and released. Computing capabilities are scaled rapidly, commensurate with consumer’s demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Measured Service

A

Cloud computing provides a metering system that continuously monitors resource consumption and generated reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure-as-a-Service (IaaS)

A

Capability provided to provision processing, storage, networks, and other fundamental computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Platform-as-a-Service (PaaS)

A

Capability provided to deploy onto the cloud infrastructure consumer-created/acquired applications created using programming languages, libraries, services, and tools supported by the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software-as-a-Service (SaaS)

A

Capability provided to use the provider’s applications running on a cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public Cloud Model

A

The cloud infrastructure is provisioned for open use by the general public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Private Cloud

A

The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers. Two variations of private cloud: on-premise, externally hosted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On-Premise Private Cloud

A

Aka internal cloud; hosted by an organization within its own data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Externally Hosted Private Cloud

A

Hosted external to an organization and is managed by a third-party organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Community Cloud

A

The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hybrid Cloud

A

The cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Storage Security

A
  • Process of applying information security principles and practices within the domain of storage network technologies
  • Focuses on securing access to information by implementing safeguards or controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Security Framework

A
Built to achieve four security goals:
○ Confidentiality
○ Integrity
○ Availability
○ Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Triad

A

Defines risk in terms of threats, assets, and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assets

A
  • Information is the most important asset

* Others include: hardware, software, and network infrastructure

19
Q

Threats

A
  • Potential attacks that can be carried out on an IT infrastructure.
  • Can be classified as active or passive
20
Q

Passive Attacks

A
  • Attempts to gain unauthorized access into the system

* Threats to confidentiality of information

21
Q

Active Attacks

A
  • Data modification and DoS attacks

* Threats to data integrity and availability

22
Q

Defense in Depth

A

Implementing security controls at each access point of every access path.

23
Q

Attack surface

A

The various entry points that an attacker can use to launch an attack.

24
Q

Attack vector

A

A step or series of steps necessary to complete an attack.

25
Q

Work factor

A

The amount of time and effort required to exploit an attack vector.

26
Q

Control Measure Types

A

Technical, Non-technical

27
Q

Control Measure Categories

A

Preventive, Corrective, Detective

28
Q

Storage Security Domains

A
  • Application access
  • Management access
  • Backup, replication, and archive
29
Q

Storage Infrastructure Management

A

Key to ensuring business continuity

30
Q

Accessibility

A

The availability of a component to perform its desired operation during a specified time period.

31
Q

Capacity

A

The amount of storage infrastructure resources available.

32
Q

Capacity Monitoring

A

Ensures uninterrupted data availability and scalability by averting outages before they occur.

33
Q

Performance Monitoring

A

Evaluates how efficiently different storage infrastructure components are performing and helps to identify bottlenecks.

34
Q

Availability Management

A

Involves all availability-related issues for components or services to ensure that service levels are met.

35
Q

Capacity Management

A

Goal is to ensure adequate availability of resources based on their service level requirements.

36
Q

Performance Management

A

Ensures the optimal operational efficiency of all components.

37
Q

Security Management

A

Key objective is to ensure confidentiality, integrity, and availability of information in both virtualized and nonvirtualized environments.

38
Q

Reporting

A

Involves keeping track and gathering information from various components and processes.

39
Q

Enterprise Management Platform (EMP)

A

A suite of applications that provides an integrated solution for managing and monitoring an enterprise storage infrastructure.

40
Q

Information Lifecycle Management

A

A proactive strategy that enables an IT organization to effectively manage the information throughout its lifecycle.

41
Q

Storage Tiering

A

A technique of establishing a hierarchy of different storage type (tiers).

42
Q

Intra-Array Storage Tiering

A

The process of storage tiering within a storage array.

43
Q

Inter-Array Storage Tiering

A

The process of storage tiering between storage arrays.