1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the Cloud?
An abstraction of compute, storage, and network infrastructure that delivers IT resources over the internet.
On-demand Self-service
The ability to manage and provision resources from a resource pool based on user needs.
SaaS (Software-as-a-Service)
A cloud service model where full applications are hosted and managed by a service provider, accessible via the internet.
IaaS (Infrastructure-as-a-Service)
A cloud service model that provides fundamental computing infrastructure such as compute, network, and storage that consumers can configure and manage.
Public Cloud
Cloud infrastructure made available to the general public but owned by a service provider.
Private Cloud
Cloud infrastructure available exclusively to one organization.
Data Breaches
Unauthorized access where data is copied, viewed, transmitted, or deleted.
Cloud Migration Issues
Challenges faced when moving data and applications to the cloud, often due to resistance to change existing functioning systems.
Network Segmentation
Dividing the cloud network into separate segments to enhance security.
Insider Threats
Security risks posed by trusted employees
Why use the cloud?
Organizations use the cloud for scalability, cost savings, accessibility, and disaster recovery.
cloud deployment methods
Deployment methods include public, private, hybrid, and community clouds, each suited for different organizational needs.
Challenges of Cloud Computing
Challenges include data security, compliance, integration with existing systems, and managing service provider relationships.
Data Encryption
The process of converting data into a coded format to prevent unauthorized access.
Access Controls
Policies and technologies that limit who can view or use resources in the cloud.
Regular Security Audits
Scheduled evaluations to assess the security measures and compliance of cloud services.
Firewall Protection
Use of network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules.
Broad network access
Cloud services are accessible over the network through standard mechanisms, promoting use across various platforms.
Resource pooling
service provider computing resources are pooled together in order to meet the needs of various consumers based on demand
Rapid elasticity
Resources can be quickly scaled up or down to meet fluctuating demand.
Measured service
Cloud systems automatically control and optimize resource use by leveraging metering capabilities.
Open Source
Applications developed using open-source code are vulnerable.
Hackers inject code in the Git repo to create backdoors.
PaaS: Platform-as-a-Service
Host provides development and storage platforms with tools for development
VPN
Secure data transmissions between two networks
Data breaches, Cloud Migration issues, insider threats, open source
Cloud security challenges
Network
Collection of connected computers and devices that communicate with each other
Node
Each individual device on a network
IP Address
A unique identifier for a node
Modem
A device that connects the ISP link at your home
Router
Connects two or more IP networks (a.k.a a gateway)
Wireless Access Point
Allows Wi-Fi access
Service
Types of services on a network
Domain Name System
A system that translates human domain names into IP addresses
Topology
The way nodes are arranged on a network
Examples of topology
star, bus, ring, and mesh
Protocol
Standards for how data is transmitted over a network
Internet of Things
A network of physical devices
Local Area Network
Locally connected nodes
Wide Area Network
Nodes connected on a wider network plus connected locally
Internet
Globally connected nodes
Examples of domains
User, Workstation, LAN, WAN, App, and Remote Access
Network security
protection of networking infrastructure from attacks using security mechanisms
primary types of hackers
Recreational, Opportunistic, Professional
Cybersecurity
Protecting critical systems and sensitive information
issues related to networking
Communication, identity theft, privacy, and terrorism
Operating System
Interface between user and computer hardware that manages computer hardware and software
OS functionalities
Resource, process, storage, memory, and privacy management
Shell
Outermost layer of OS that interacts with users
Kernel
Interface between OS and hardware
System Software
Manages drivers, hardware, and OS
App Software
Specific user applications for specific tasks