1/19
Flashcards covering key concepts related to security patterns in cloud computing.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What are security patterns in cloud computing?
Essential practices and design strategies aimed at mitigating security risks associated with cloud services and infrastructures.
What is the Hardware Level Security Pattern?
An attacker gains physical access to an employee’s laptop and attempts to tamper with the hardware.
What is a Trusted Platform Module (TPM)?
A specialized hardware component designed to enhance the security of computing devices.
What is the role of TPM in data encryption?
TPM securely generates and stores encryption keys, ensuring secure operations like encryption and decryption.
What is BitLocker?
A full-disk encryption feature included with certain versions of Microsoft Windows.
What happens if an attacker steals a disk protected by TPM?
The data will be protected by encryption, and the encryption keys are securely stored on the device.
What is VM Platform Encryption?
The use of encryption mechanisms to encrypt virtual machines and their associated data at rest or in transit.
What is Cloud Resource Access Control?
Managing and restricting who or what can access cloud resources, and what operations they can perform.
What does IAM stand for in cloud security?
Identity and Access Management.
What is meant by 'Geo Tagging'?
The process of adding geographical location information to data to enforce location-based access restrictions.
How do 'Regular Backups' contribute to data security?
They ensure that critical data can be restored without major loss if accidental deletion or corruption occurs.
What is Data Loss Prevention (DLP)?
Solutions that prevent accidental or malicious deletion, modification, or exfiltration of sensitive data.
What is a 'Trusted Cloud Resource Pool'?
A collection of cloud resources designed with enhanced security measures for trusted execution environments.
What does MFA stand for in the context of authentication?
Multi-Factor Authentication.
What is the purpose of encryption in cloud environments?
To ensure that data is unreadable to unauthorized users.
What is the scenario described for a Data Level Security Pattern?
An attacker exploits a misconfigured storage bucket, gaining unauthorized access to sensitive customer data.
What are the three types of backups mentioned?
Full Backup, Incremental Backup, and Differential Backup.
What is one method for detecting data breaches?
Set up alerts for suspicious activities such as abnormal login attempts.
What is Secure Cloud Interface?
Protected gateways that enable users or applications to interact with cloud services securely.
What is the Zero Trust Model?
A security model that requires verification from everyone trying to access resources in a network.