Cloud Computing terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

confidentiality

the characteristic of something being made accessible only to authorized parties, i.e access is restricted to data in transit and storage

2
New cards

integrity

characteristic of not having been altered by an unauthorized party, i.e if a cloud consumer can guarantee their data that is transmitted matches the data received by the cloud service

3
New cards

authenticity

characteristic of something provided by an authorized source, login fornms, http auth and digest, X.509 certificates, customm methods.

it is non repudiable (can’t deny actions or communications once they are completed) (i.e, actions are uniquely linked to an authorized source)

4
New cards

availability

accesible during certain times

5
New cards

authorization

decides if you have access to a resource

methods: access controls for URL

secure objects and methods

access control lists

6
New cards

measure security

through presence of confidentiality, integrity, authenticity, availability

7
New cards

measure lack of security

through threats, risks, vulnerabilities

8
New cards

threat

security violation that can challenge defenses in an attemtp to break security or cause harm

attacks occur when threats are carried out

9
New cards

vulnerability

weakness that can be exploited because it lacks sufficient security controls or security controls are overcome by an attack

caused by
config deficiencies

policy weaknesses

user errors

hardware/firmware flaws

software bugs

poor security architecture

10
New cards

risk

possibility of loss or harm from doin something

measured according to threat levels and num of vulnerabilities

two metrics to determine

probability of a thhreat that can exploit vulnerabilities

expectation of loss on the resource being comprimised

11
New cards

security controls

countermeasures to prevent/respond to security threats to reduce/avoid risk

12
New cards

security mech

defensive framework that protects it resources

13
New cards

security policies

rules and regulations for security.

defines how regulations and rules are implemented

and how controls and mechanisms are used

14
New cards

support of improving security

controls, mechanisms, policies

15
New cards
16
New cards

hash function

a mathematical function that convert an input value into a compressed numerical value. It takes in data of an arbitrary length and outputs one of a fixed length.

17
New cards

public key infrastructure

framework of encryption and cybersecurity that protects communications between server and client

made up of digital certificates

certifcate authority

registration authority

18
New cards

digital cert

eletronic id for websites

19
New cards

certificate auth (CA)

digitally signed by third party CA like verisign, comodo

20
New cards

Registration auth (RA)

authorized by CA to provide digital certs to users on a case by case access

21
New cards

hardening

process of stripping unneccesary software to limit vulnerabilities that can be exploited

removing redundant programs

closing unnneded ports

disabling unused services, internal root accs, guast access

22
New cards

SSO

mechanism by which architectures with multiple services allow user to transition from one service to another while maintaining authentication

23
New cards

serverless computing

model where cloud provider dynamically manages the allocation and provisioning of servers

devs only write and deploy code

resources allocated upon demand, build for compute time consumed

eliminates need for server management, scaling, patchiing

24
New cards

S3

object storage for imagesam videos, docs. it is scalable and durable

25
New cards

API GATEWAY

manages API

26
New cards

Lambda

runs code wihout provisioning or managing servers. supoorts multi languages

27
New cards

dynamo db

NoSQL db for high performance apps. low latency