1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Infrastructure as a Service (IaaS)
delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model
Platform as a Service (PaaS)
supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model
Software as a Service (SaaS)
A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online.
Anything as a Service (XaaS)
refers to cloud services beyond SaaS, PaaS, and IaaS. XaaS includes a wide assortment of services that can be delivered via the cloud, such as communications, databases, desktops, storage, security, and more. the cloud provider typically manages all the resources keeping everything operational and up to date.
Public Cloud
services are available from third-party companies such as Amazon, Google, Microsoft, and Apple. They provide similar services to anyone willing to pay for them.
Community Cloud
A cloud that is open only to specific organizations that have common concerns.
Private Cloud
serves only one customer or organization and can be located on the customer's premises or off the customer's premises
Hybrid Cloud
includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability
Cloud service providers
companies that provide software, data storage, and other services via the internet
Managed service provider (MSP)
Similar to an MSSP, however instead of focusing only on security services it provides any It services that an organization needs.
managed security service provider (MSSP)
A third-party vendor that provides security services for smaller companies.
on-premises vs off-premises
on-prem: the organization retains complete control over all the cloud-based resources, including any data.
off-prem: The CSP has responsibility for maintaining the cloud-based resources
Fog computing
similar to edge computing, but it uses a network close to the device and may have multiple nodes sensing and processing data within the network.
Edge Computing
The practice of storing and processing data close to the devices that generate and use the data.
Thin client
A computer with enough resources to boot and connect to a server to run specific applications or desktops.
Container virtualization
runs services or applications within isolated containers or application cells. The containers don't host an entire operating system. Instead, the host's operating system and kernel runt he service or app within each of the containers.
Micro services/API
code modules designed to do one thing well. They are typically small code modules that receive a value and respond with a value.
Infrastructure as Code
Refers to managing and provisioning data centers with code that defines virtual machines.
Software Defined Networking (SDN)
uses virtualization technologies to route traffic instead of using hardware routers and switches
Software-defined visibility (SDV)
Refers to the technologies used to view all network traffic.
Serverless Architecture
A cloud computing execution model in which the cloud provider allocates machine resources on demand, taking care of the servers on behalf of their customers.
Services integration
The connection of infrastructure and software elements to provide specific services to a business entity, SIAM, many different SPs working together in a single-business IT organization
Resource Policies
Assigning permissions to cloud resources, can be difficult since the cloud is always running.
Transit Gateway
In cloud computing, a virtual router deployed to facilitate connections between VPC subnets and VPN gateways.
Virtualization
a popular technology used within data centers. It allows you to host one or more virtual systems, or virtual machines, on a single physical system.
Virtual Machine Sprawl Avoidance
occurs when an organization has many VMs that aren't appropriately managed. Most organizations have specific policies in place to ensure physical servers are kept up to date and personnel only make changes to these servers after going through a change management process.
VM Escape Protection
A security exploit that enables a hacker/cracker to gain access to the primary hypervisor and its created virtual machines. Prevented with release patches.