Ist Midterm

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

What is the Cloud?

An abstraction of compute, storage, and network infrastructure that delivers IT resources over the internet.

2
New cards

On-demand Self-service

The ability to manage and provision resources from a resource pool based on user needs.

3
New cards

SaaS (Software-as-a-Service)

A cloud service model where full applications are hosted and managed by a service provider, accessible via the internet.

4
New cards

IaaS (Infrastructure-as-a-Service)

A cloud service model that provides fundamental computing infrastructure such as compute, network, and storage that consumers can configure and manage.

5
New cards

Public Cloud

Cloud infrastructure made available to the general public but owned by a service provider.

6
New cards

Private Cloud

Cloud infrastructure available exclusively to one organization.

7
New cards

Data Breaches

Unauthorized access where data is copied, viewed, transmitted, or deleted.

8
New cards

Cloud Migration Issues

Challenges faced when moving data and applications to the cloud, often due to resistance to change existing functioning systems.

9
New cards

Network Segmentation

Dividing the cloud network into separate segments to enhance security.

10
New cards

Insider Threats

Security risks posed by trusted employees

11
New cards

Why use the cloud?

Organizations use the cloud for scalability, cost savings, accessibility, and disaster recovery.

12
New cards

cloud deployment methods

Deployment methods include public, private, hybrid, and community clouds, each suited for different organizational needs.

13
New cards

Challenges of Cloud Computing

Challenges include data security, compliance, integration with existing systems, and managing service provider relationships.

14
New cards

Data Encryption

The process of converting data into a coded format to prevent unauthorized access.

15
New cards

Access Controls

Policies and technologies that limit who can view or use resources in the cloud.

16
New cards

Regular Security Audits

Scheduled evaluations to assess the security measures and compliance of cloud services.

17
New cards

Firewall Protection

Use of network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules.

18
New cards

Broad network access

Cloud services are accessible over the network through standard mechanisms, promoting use across various platforms.

19
New cards

Resource pooling

service provider computing resources are pooled together in order to meet the needs of various consumers based on demand

20
New cards

Rapid elasticity

Resources can be quickly scaled up or down to meet fluctuating demand.

21
New cards

Measured service

Cloud systems automatically control and optimize resource use by leveraging metering capabilities.

22
New cards

Open Source

Applications developed using open-source code are vulnerable.
Hackers inject code in the Git repo to create backdoors.

23
New cards

PaaS: Platform-as-a-Service

Host provides development and storage platforms with tools for development

24
New cards

VPN

Secure data transmissions between two networks

25
New cards

Data breaches, Cloud Migration issues, insider threats, open source

Cloud security challenges

26
New cards

Network

Collection of connected computers and devices that communicate with each other

27
New cards

Node

Each individual device on a network

28
New cards

IP Address

A unique identifier for a node

29
New cards

Modem

A device that connects the ISP link at your home

30
New cards

Router

Connects two or more IP networks (a.k.a a gateway)

31
New cards

Wireless Access Point

Allows Wi-Fi access

32
New cards

Service

Types of services on a network

33
New cards

Domain Name System

A system that translates human domain names into IP addresses

34
New cards

Topology

The way nodes are arranged on a network

35
New cards

Examples of topology

star, bus, ring, and mesh

36
New cards

Protocol

Standards for how data is transmitted over a network

37
New cards

Internet of Things

A network of physical devices

38
New cards

Local Area Network

Locally connected nodes

39
New cards

Wide Area Network

Nodes connected on a wider network plus connected locally

40
New cards

Internet

Globally connected nodes

41
New cards

Examples of domains

User, Workstation, LAN, WAN, App, and Remote Access

42
New cards

Network security

protection of networking infrastructure from attacks using security mechanisms

43
New cards

primary types of hackers

Recreational, Opportunistic, Professional

44
New cards

Cybersecurity

Protecting critical systems and sensitive information

45
New cards

issues related to networking

Communication, identity theft, privacy, and terrorism

46
New cards

Operating System

Interface between user and computer hardware that manages computer hardware and software

47
New cards

OS functionalities

Resource, process, storage, memory, and privacy management

48
New cards

Shell

Outermost layer of OS that interacts with users

49
New cards

Kernel

Interface between OS and hardware

50
New cards

System Software

Manages drivers, hardware, and OS

51
New cards

App Software

Specific user applications for specific tasks