1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cloud Service Provider (CSP)
A company that offers cloud computing services, including infrastructure, platforms, and software over the internet.
Zero-Trust Security Model
A security framework where all users, devices, and systems must be authenticated and authorized before accessing the network, ensuring isolation of customer data.
Secure Low-Level Infrastructure
The physical security measures in place at data centers, including surveillance, biometric identification, and unique server identities.
Automation in Security
The use of automated systems to check for software updates, detect issues, and authenticate credentials, reducing human error in security processes.
Encryption at Rest
A security practice that encrypts stored data not actively in use to protect it from unauthorized access.
Private IP Address Space
A network configuration that isolates cloud infrastructure from the public internet, enhancing security against cyber attacks.
Operational Security
Measures taken to protect operations and employee information, including verified code libraries, multi-factor authentication, and monitoring for threats.
Identity and Access Management
A framework that ensures employees have access only to the data and resources necessary for their job functions.
Security Protocols
Procedures and practices implemented to safeguard systems, including regular updates, security reviews, and threat monitoring.
Cybercrime Defense
Strategies and measures that cloud service providers can adopt to enhance their security posture against cyber threats.