CS6262 Lecture 18 - Cloud Computing & VM Monitoring

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards
What is the general definition of cloud computing?
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services
2
New cards
What is a key feature of cloud computing regarding resource provisioning?
Resources can be rapidly provisioned and require low management overhead
3
New cards
Why is the cloud computing industry considered complex?
It represents a large ecosystem of many models, vendors, and markets
4
New cards
What core technology is central to cloud computing and discussed in cloud security?
Virtualization
5
New cards
What are the five essential characteristics of cloud computing?
On-demand self-service, broad network access, resource pooling, rapid elasticity, measured service
6
New cards
What does Software as a Service (SaaS) enable a customer to do?
Use a provider's applications running on a cloud infrastructure, accessible through thin clients like web browsers
7
New cards
What does Platform as a Service (PaaS) enable a consumer to do?
Deploy consumer-created applications onto the cloud infrastructure using programming languages and tools supported by the provider
8
New cards
What does Infrastructure as a Service (IaaS) enable a consumer to do?
Provision processing, storage, networks, and other computing resources and deploy/run arbitrary software including operating systems and applications
9
New cards
What is a private cloud?
A cloud infrastructure operated solely for an organization, managed by the organization or a third party, on-premise or off-premise
10
New cards
What is a community cloud?
A cloud infrastructure shared by several organizations supporting a specific community with shared concerns
11
New cards
What is a public cloud?
A cloud infrastructure made available to the general public or a large industry group, owned by an organization selling cloud services
12
New cards
What is a hybrid cloud?
A composition of two or more cloud deployment models
13
New cards
Which cloud service model is associated with risks like data security, data locality, and unauthorized access?
Software as a Service (SaaS)
14
New cards
Which cloud service model is associated with risks like SOA-related issues and API-related issues?
Platform as a Service (PaaS)
15
New cards
Which cloud service model is associated with risks like virtual machine security and hypervisor security?
Infrastructure as a Service (IaaS)
16
New cards
Why is security considered a primary concern in cloud computing?
Because users do not manage the cloud environment directly and multiple organizations may share the same infrastructure
17
New cards
Why is cloud security challenging despite simple primitives and functions?
Because these primitives and functions are replicated thousands of times, creating massive complexity
18
New cards
Why is it easier to manage testing and security patches in cloud computing?
Most systems use the same software, simplifying updates
19
New cards
How does cloud computing simplify recovery?
Identical systems can be quickly set up for rapid recovery
20
New cards
What is a primary challenge regarding trust in cloud computing?
Users must rely on cloud providers who directly administer the environment
21
New cards
Why is lack of physical control a security concern in cloud computing?
Users cannot directly manage or inspect the computing resources they use
22
New cards
What are some security advantages of cloud provisioning services?
Rapid reconstitution of services and greater data availability through multiple data centers
23
New cards
What is the main security challenge of cloud provisioning services?
If the provisioning service is compromised, the impact can be highly disruptive
24
New cards
What is one security advantage of cloud data storage services?
Data can be fragmented and dispersed, increasing resilience
25
New cards
How does cloud storage improve data confidentiality?
Data can be encrypted at rest and in transit
26
New cards
What is a security challenge related to multi-tenant cloud storage?
Data from multiple organizations may reside on the same storage server
27
New cards
Why can the location of cloud storage servers be a security concern?
Different countries may have different regulations
28
New cards
What is a main security advantage of cloud processing infrastructure?
The master copy of a program can be secured and replicated throughout the environment
29
New cards
What are some security challenges in cloud processing infrastructure?
Multiple applications can run on the same hardware and isolation is difficult
30
New cards
How do cloud support services enhance security?
They provide on-demand security controls for customer applications
31
New cards
What is a network security challenge in cloud computing?
Creating security zones is difficult because applications share resources
32
New cards
What are some legal and regulatory challenges for cloud security?
International privacy laws, subpoenas, and data ownership issues
33
New cards
Why is isolation important in cloud security?
Multiple organizations use the same environment, requiring strong isolation protection
34
New cards
What are additional risks related to cloud infrastructure security?
Attacker interest due to scale and reliance on secure hypervisors
35
New cards
What challenge arises when an organization uses a public cloud in terms of security policies?
Reconciling internal network security policies with external cloud policies
36
New cards
Why is controlling software versions difficult in a public cloud using SaaS?
Customers cannot control what software or version is used
37
New cards
What is the recommended method to protect data security in the cloud?
Encrypt data at rest and encrypt access to resources
38
New cards
What percentage of cloud service providers encrypt data in transit?
Close to 90%
39
New cards
What percentage of cloud service providers encrypt data at rest?
Only about 10%
40
New cards
What is PII in cloud security?
Personally identifiable information that can identify an individual
41
New cards
What should customers negotiate with cloud providers to ensure data protection?
A security service level agreement (SLA)
42
New cards
How can customers verify that cloud providers meet agreed security levels?
By obtaining proof that SLAs have been satisfied
43
New cards
Which compliance standards must cloud providers consider for healthcare and payment data?
HIPAA and PCI
44
New cards
Name some foundational technologies supporting cloud computing.
Virtualization, grid technology, service-oriented architectures, distributed computing, broadband networks
45
New cards
What does virtualization involve with regard to hardware and operating systems?
Creating virtual machines using existing hardware and operating systems
46
New cards
What is the role of a hypervisor in virtualization?
Acts as a Virtual Machine Manager
47
New cards
Which type of hypervisor is installed directly on hardware?
Type 1 hypervisor
48
New cards
Which type of hypervisor emulates system devices and runs under a host OS?
Type 2 hypervisor
49
New cards
Why is virtualization considered critical for cloud computing?
It separates applications from hardware and allows multiple VMs to run on one machine
50
New cards
What is the purpose of a security virtual machine in virtualization?
To provide isolated security analysis and monitoring
51
New cards
Why is memory analysis essential for virtual machine security?
Memory reveals current runtime state including processes and decrypted data
52
New cards
What is virtual machine introspection?
Analyzing a VM’s memory from an external security VM
53
New cards
What distinguishes active monitoring from passive monitoring?
Active monitoring is event-driven and can stop attacks before execution
54
New cards
What is the goal of Secure In-VM Monitoring (SIM)?
To combine security of out-of-VM monitoring with performance of in-VM monitoring
55
New cards
How does SIM achieve high performance?
By accessing memory at native speed without switching to the hypervisor
56
New cards
What mechanism does SIM use for switching control?
Entry Gate and Exit Gate
57
New cards
What hardware feature does SIM use in the invocation checker?
Last Branch Recording (LBR)
58
New cards
How does SIM protect its address space?
Through hypervisor memory protection
59
New cards
How does SIM achieve native-speed memory access?
By reading memory directly without hypervisor interception
60
New cards
How does the performance of SIM compare to out-of-VM monitoring?
SIM is significantly faster