Google's trusted infrastructure

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Cloud Service Provider (CSP)

A company that offers cloud computing services, including infrastructure, platforms, and software over the internet.

2
New cards

Zero-Trust Security Model

A security framework where all users, devices, and systems must be authenticated and authorized before accessing the network, ensuring isolation of customer data.

3
New cards

Secure Low-Level Infrastructure

The physical security measures in place at data centers, including surveillance, biometric identification, and unique server identities.

4
New cards

Automation in Security

The use of automated systems to check for software updates, detect issues, and authenticate credentials, reducing human error in security processes.

5
New cards

Encryption at Rest

A security practice that encrypts stored data not actively in use to protect it from unauthorized access.

6
New cards

Private IP Address Space

A network configuration that isolates cloud infrastructure from the public internet, enhancing security against cyber attacks.

7
New cards

Operational Security

Measures taken to protect operations and employee information, including verified code libraries, multi-factor authentication, and monitoring for threats.

8
New cards

Identity and Access Management

A framework that ensures employees have access only to the data and resources necessary for their job functions.

9
New cards

Security Protocols

Procedures and practices implemented to safeguard systems, including regular updates, security reviews, and threat monitoring.

10
New cards

Cybercrime Defense

Strategies and measures that cloud service providers can adopt to enhance their security posture against cyber threats.