Section 13 - Cloud Computing Flashcards
This is defined as a way of offering on-demand services that extend the traditional capabilities of a computer or a network out into the internet.
Cloud Computing
For cloud computing to gain its intended cost savings and efficiencies though, it relies heavily on the concept of…?
virtualization
Through this numerous logical servers can be placed on a single physical server.
virtualization
*** this can help us reduce the amount of physical space, power and cooling that’s needed inside your data center.
What is the one key benefit to cloud computing?
The ability to dynamically provision memory and CPU resources
** other benefits include decreased cost, increased scalability and unlimited elasticity.
This allows providers to fully integrate the storage, network and servers without having to perform hardware changes.
Hyper-converged infrastructure
** this relies on software and virtualization technology to perform all of the needed integrations which can be managed from a single interface or device
This allows a cloud provider to offer a fully desktop operating system to an end user from a centralized server.
VDI
Virtual Desktop Infrastructure
*** this is beneficial because if it is exploited by an attacker, it can be destroyed as soon as the user logs off. This destroys an attacker from remaining persistent on the end user’s desktop.
When we look at numerous logical servers being stored on a single physical server, we have to consider a way to keep the data confidential and separated from the other logical servers too. To do this, we use…?
Secure Enclaves
Secure Volumes
Secure Enclaves utilizes two distinct areas that the data may be stored and accessed from. Each enclave can be accessed by the proper processor. This is a technique that’s used by…?
Microsoft Azure
Secure Volumes is a method of keeping data at rest, secure from prying eyes. When data on the volume is needed, a secure volume is mounted and it’s properly decrypted to allow that access. Once the volume is no longer needed, it’s encrypted again and unmounted from the virtual server. This is the same concept that’s used by…?
BitLocker (on a Windows laptop)
Filevault (on a Macbook)
There are four different types of cloud. What are they?
Public
Private
Hybrid
Community
The most common type of cloud architecture is the…?
public cloud
Under this cloud method, a service provider makes resources available to the end user over the internet.
public cloud
*** Google Drive is an example of this
This cloud services requires that a company creates its own cloud environment that only it can utilize as an internal enterprise resource to manage its cloud. This means the organization is responsible for the design, implementation and operation of the cloud resources and the servers that host them.
Private Cloud
** For example, the US government runs a private cloud for use by different organizations within the government. Generally, this option is chosen when security is more important to the organization than cost.
This cloud service solution combines the benefit of both the public cloud and the private cloud options. Under this architecture, some resources are developed and operated by the organization itself like a private cloud would be, but the organization can also utilize the publicly-available resources or outsource services to another service provider like a public cloud does!
Hybrid Cloud
Under this cloud model, the resources and costs are shared among several different organizations who have a common service need. This is similar to taking several private clouds and connecting them together.
Community Cloud
Cloud computing also comes as four different types of services. These are?
Software as a Service
Infrastructure as a Service
Platform as a Service
Security as a Service
With this cloud service, you’re going to be provided with a complete solution. This includes the hardware, the operating system, the software, the applications, everything that’s needed for that service to be delivered.
Software as a Service
*** Office 365 for Microsoft is an example of this
With this cloud service, you get the benefit of dynamic allocation of additional resources known as elasticity but you don’t have to deal with the headache of long-term commitments and contracts, buying the hardware, and installing the underlying operating systems.
Infrastructure as a Service
*** you’re given everything you need to run a server, including the power, the space, the cooling, the network, the firewall, the physical servers and the virtualization layer.
Under this cloud service, the third party vendor will provide your organization with all the hardware and software needed for a specific service to operate.
Platform as a Service
*** in addition to everything given under Infrastructure as a Service, you also receive the operating system and the infrastructure software (infrastructure software includes things like an Apache web server, a MySQL database, programming languages, etc.)
This allows smaller organizations that don’t have the necessary security skills to essentially outsource them to some larger company. This is cheaper than hiring a team of cybersecurity professionals.
Security as a Service
One of the first security services that began to be offered in the cloud was…?
anti-malware products
*** this is helpful because instead of installing a traditional antivirus or anti-malware program on your desktop or server, the client was instead configured to utilize the cloud to provide these protections which removed the need for installing one on your end client.
One of the most effective forms of Security as a Service solutions is found in the form of…?
- anti-spam products = these products allow all of the organization’s email to be routed through this cloud server first in order to detect any malware or spam.
- vulnerability scanning = these scanners always remain up to date and the hardware/software needed to conduct the scan is provided to you.
- sandboxing = utilizes separate virtual networks to allow security professionals to test suspicious or malicious files.
- content filtering = allows the ability to create policies such as time limits, categories of content that should be blocked, as well as reporting to see any users who attempt to access the websites on your block list