Cloud Computing Final Chapter Review Sheets

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Capacity Planning

1 / 254

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

255 Terms

1

Capacity Planning

The process of determining how much can be produced to meet future demands, with strategies like lead, lag, and match.

New cards
2

Lead capacity planning strategy

adds capacity before the demand increases

New cards
3

Lag capacity strategy planning

adds capacity after the demand increases, when the IT resource reaches full strategy

New cards
4

Match capacity planning strategy

adds capacity incrementally to align closely with demand changes

New cards
5

Cost Reduction

Strategies aimed at lowering IT expenses and aligning IT costs with business performance.

New cards
6

Organizational Agility

The ability of an organization to effectively respond to internal and external changes for success.

New cards
7

scaling

IT resources need _____ beyond predictions to adapt to business changes.

New cards
8

Clustering

Interconnected IT resources functioning as one system to decrease system failure rates and enhance availability.

New cards
9

Grid computing

Distributed computing system that connects multiple computers to work together on solving complex problems.

New cards
10

Virtualisation

Creates virtual instances of physical IT resources

New cards
11

Cloud

A remote IT resource provision environment that can be privately owned and offers metered access.

New cards
12

Scaling

The ability of IT resources to handle increased or decreased usage demands through horizontal and vertical scaling.

New cards
13

Horizontal scaling

(out and in) adding or removing identical resources

New cards
14

Vertical scaling

(up and down) increasing or decreasing resource capacity

New cards
15

Cloud Service

Any IT resource within a cloud made remotely accessible and offered through published APIs.

New cards
16

On-premise

IT resources located within an organization's premises that can interact with cloud-based resources.

New cards
17

Mitigation

Using legal contracts and SLAs to reduce risks and address potential issues in cloud computing.

New cards
18

Data Compliance

Following rules on data storage, access, and security to ensure compliance and benefit from cost-effective usage features.

New cards
19

Defined Roles

Specific responsibilities assigned to individuals and organizations within the cloud computing ecosystem.

New cards
20

Cloud provider

An organization/entity that offers cloud-based IT resources and services to customers

New cards
21

Cloud consumer

Any organization/individual that utilizes cloud-based IT resources provided by a cloud provider.

New cards
22

Cloud Service Owner

The legal entity/person who holds ownership rights over a particular cloud service

New cards
23

Cloud Resource Administrator

Individuals/organizations tasked with managing and administering cloud-based IT resources

New cards
24

Cloud Auditor

An external entity responsible for conducting independent assessments of cloud environments to evaluate security controls, privacy impacts, and performance

New cards
25

Cloud Broker

An intermediary entity that manages and negotiates cloud services on behalf of cloud consumers, providing services such as service intermediation, aggregation, and arbitrage

New cards
26

Cloud Carrier

A provider of wire-level connectivity between cloud consumers and cloud providers, often assumed by network and telecommunication providers

New cards
27

Organisational boundary

The extent to which an organization extends its trust into the cloud environment when utilizing cloud-based IT resources.

New cards
28

Characteristics of organizational boundary

on-demand usage, measured usage, ubiquitous access, multitenancy, resiliency, elasticity, resource pooling

New cards
29

Cloud Delivery Models

Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) models for cloud services.

New cards
30

Infrastructure-as-a-Service (IaaS)

Provides virtualised computing resources over the internet

New cards
31

Platform-as-a-Service (PaaS)

Provides a platform allowing customers to develop, run, and manage applications without dealing with the underlying infrastructure.

New cards
32

Software-as-a-Service (SaaS)

Delivers software applications over the internet on asubscription basis

New cards
33

Cloud Deployment Models

Public, Private, Community, and Hybrid Cloud models based on ownership, size, and access characteristics.

New cards
34

Public cloud

A cloud environment accessible to the general public, owned and operated by a third-party cloud provider.

New cards
35

Private cloud

A cloud environment owned and operated by a single organization, providing centralized access to cloud resources within the organization.

New cards
36

Community Cloud

Similar to a public cloud, but with access restricted to a specific community of cloud consumers, often sharing common interests or requirements

New cards
37

Hybrid Cloud

Combines multiple cloud deployment models, such as public and private clouds, to meet specific business needs and requirements

New cards
38

Variations

Different configurations/architectures within cloud deployment that offer additional flexibility and customization options for cloud computing environments

New cards
39

Virtual Private Cloud

A self-contained cloud environment hosted and managed by a public cloud provider, exclusively available to a cloud consumer

New cards
40

Inter-Cloud

An architecture cloud deployment model connecting two or more clouds

New cards
41

Cloud Computing

Relies on network connectivity for accessing IT resources, with most clouds being Internet-enabled for ubiquitous access.

New cards
42

Internet Service Provider (ISP)

A company that provides individuals/organizations with access to the Internet and related services like email, web hosting, and online storage.

New cards
43

Tier 1, Tier 2, Tier 3

Different levels of network providers in the Internet topology, with Tier 1 being international cloud providers overseeing vast networks.

New cards
44

Tier 1

International cloud providers overseeing vast networks; cloud consumers and providers can establish direct connections through tier 1 providers

New cards
45

Tier 2

Includes large regional providers interconnected with Tier 1

New cards
46

Tier 3

Includes local ISPs linked to Tiers 2 and 1

New cards
47

Packet Switching

Connectionless method fundamental for data transmission, where routers process and forward packets individually to manage network traffic efficiently.

New cards
48

Latency

Time for a packet to travel, increases with nodes and loads

New cards
49

Quality of Service (QoS)

Operates on a "best effort" basis, affected by latency and dynamic routing, impacting packet speeds based on network conditions.

New cards
50

Dynamic routing

Impacts packet speeds, and varies with network conditions

New cards
51

Virtualization

Process of creating virtual versions of computers and networks to simplify IT by abstracting physical resources into virtual components for easier allocation and control.

New cards
52

Transport Layer Protocol

Includes TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) for standardized communication guiding data packets across the Internet.

New cards
53

Virtualisation layer

Operational tools based on virtualisation platforms.

New cards
54

Hypervisor

Virtualization software managing virtual machines and resources, essential for allocation and usage management, on the physical (hardware) layer

New cards
55

Multitenant Technology

Allows multiple users to access the same application logic simultaneously, ensuring user isolation, data security, and scalability.

New cards
56

Tenants can customise

user interface, business process (rules & logic), data model (include, exclude, rename fields), access control rights

New cards
57

Multitenant applications ensure

user isolation, data tier isolation , data security, recovery, scalability, application upgrades, metered usage

New cards
58

Web Services

Utilized for complex web-based service logic, with SOAP-based services using WSDL, XML Schema, SOAP, and UDDI for defining APIs and messaging formats.

New cards
59

REST services

Web services that use standard HTTP methods to access and manage resources, making it easy to interact with cloud applications.

New cards
60

Service Agents

Catch messages during runtime to enable dynamic event-driven operations and service integration.

New cards
61

Kind of service agents

active and passive agents

New cards
62

Active Agent

Modify messages

New cards
63

Passive Agent

Read messages for monitoring

New cards
64

Service Middleware

Evolved from MOM platforms, includes ESB for service brokerage and routing, and orchestration platforms for workflow execution within cloud environments.

New cards
65

Containerisation

Packaging apps for easy and consistent running.

New cards
66

Container architecture

Container, container engine, container build file, container image, pods

New cards
67

Container

Light-weight software packages that have all of the necessary elements to run in any cloud environment. It is an executable instance of a container image

New cards
68

Container engine

A specialised software for container management

New cards
69

Container build file

Specifies application requirements

New cards
70

Container image

An unchangeable, read-only image used for container deployment.

New cards
71

Pods

Groups of containers that share resources and the same IP address, allowing multiple isolated applications to run together.

New cards
72

Information Security

Involves techniques, technologies, regulations, and behaviors to protect computer systems and data

New cards
73

3 terms that measure security

  1. Confidentiality - to ensure that information is accessible only to those authorized toaccess it.

  2. Integrity - to ensure that the information is accurate and complete and has not been tampered with.

  3. Availability - to ensure that authorized users have access to the information and associated assets when needed.

New cards
74

3 terms to measure insecurity

1. Vulnerability - a weakness in the system that can be exploited by threats.

2. Threat - a potential cause of an unwanted incident, which may result in harm to a system or organization.

3. Risk - the potential for loss/damage/destruction of an asset as a result of a threat exploiting a vulnerability

New cards
75

3 terms to establish safeguards to improve security

1. Security Measures - countermeasures to prevent or respond to threats.

2. Security Mechanisms - components of defensive frameworks protecting IT resources.

3. Security Policies - a set of rules and regulations for security and define implementation and enforcement of security measures

New cards
76

Threat Agent

Entities that are capable of carrying out attacks

New cards
77

Types of threat agents

Anonymous attack, trusted attack, malicious service agent, malicious insider

New cards
78

Anonymous Attacker

Attacks from outside the cloud trusted boundary.

New cards
79

Trusted Attacker

Misuses authorized access inside the cloud trusted boundary.

New cards
80

Malicious Service Agent

External cloud service provider that messes with cloud traffic.

New cards
81

Malicious Insider

Past employee that causes harm with pre-existing cloud access.

New cards
82

Common threats in cloud-based environments

Traffic eavesdropping, malicious intermediary threat, resource overload, insufficient authorisation, overlapping trust boundaries, virtualisation attacks, container attacks, DoS (Denial of Service) attacks

New cards
83

Traffic Eavesdropping

Occurs when a malicious service agent sneakily listens in on data going to or within the cloud to steal information.

New cards
84

Malicious Intermediary Threat

Occurs when a malicious service agent sneakily reads and modifies messages

New cards
85

Resource Overload

Excessive demands on virtual servers leading to service outages.

New cards
86

Insufficient Authorization

Occurs when wrong or broad access allows attackers to get into protected data

New cards
87

Virtualization Attacks

Exploiting vulnerabilities in the virtualization layer to gain unauthorized access and lets attackers take control and see confidential data

New cards
88

Container Attacks

Exploiting vulnerabilities and tampering in containerized applications (in the software that controls containers)

New cards
89

Overlapping trust boundaries

In a multi-tenant cloud environment can lead to data leakage and unauthorized access across different tenants

New cards
90

Denial of Service (DoS) Attacks

Occurs when too many requests overwhelm the cloud, making it crash and causing major trouble

New cards
91

Potential errors

flawed implementations, security policy disparity, contracts & SLAs, risk management

New cards
92

Logical Network Perimeter

A virtual boundary to isolate cloud-based IT resources from the wider communication network

New cards
93

Why is the Logical Network Perimeter implemented?

To isolate IT resources in a cloud from non-authorised users, non-users, cloud consumers and to control the bandwidth available to isolated IT resources

New cards
94

Key components (devices) used in the Logical Network Perimeter

Virtual firewall (active filter of network traffic to and from isolated network) and virtual network (utilised VLANS that isolates the network environment within the data centre infrastructure)

New cards
95

Virtual Server

A form of virtualisation software imitating a physical server

New cards
96

Cloud storage device mechanism

A storage system designed for cloud use, where capacity is allocated in fixed increments.

New cards
97

Cloud storage levels

blocks, files, datasets, objects

New cards
98

Files

A cloud storage level that is a collection of data grouped into files located in folders

New cards
99

Blocks

The lowest level of cloud storage closest to the hardware; the smallest unit of data individually accessible

New cards
100

Dataset

A cloud storage level that is a sets of data are organized into a table-based, delimited, or record format.

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 637 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 4637 people
... ago
5.0(1)
note Note
studied byStudied by 82 people
... ago
5.0(2)
note Note
studied byStudied by 92 people
... ago
5.0(1)
note Note
studied byStudied by 109 people
... ago
5.0(3)
note Note
studied byStudied by 635 people
... ago
5.0(3)

Explore top flashcards

flashcards Flashcard (65)
studied byStudied by 59 people
... ago
5.0(2)
flashcards Flashcard (206)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (120)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (87)
studied byStudied by 74 people
... ago
4.5(2)
flashcards Flashcard (57)
studied byStudied by 70 people
... ago
5.0(1)
flashcards Flashcard (102)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 23 people
... ago
4.9(8)
flashcards Flashcard (51)
studied byStudied by 2 people
... ago
5.0(1)
robot