- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (27)
Compute Services - VMs, such as Windows, Linux servers or Containers, APIS, etc.
Storage services, such as objects, files, databases, etc.
Networking services, such as networks, establishing secure connections between the cloud provider and your company
Analytics services - such as visualizing telemetry and performance data,
BI.
COMPUTER SCIENCE
Verified answer
COMPUTER SCIENCE
Verified answer
COMPUTER SCIENCE
Verified answer
COMPUTER SCIENCE
Verified answer
Recommended textbook solutions
Upgrade to remove ads
Only CA$44.99/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (29)
Cloud Computing Service Models
→ Software as a Service (SaaS)
→ Platform as a Service (PaaS)
→ Infrastructure as a Service (IaaS)
Application Hardening
→ Secure Coding
→ OWASP
→ CERT Secure Coding
Standards
→ Application Configuration Baselining
→ Operating System Patch Management
→ Application Patch Management
Host Security Permissions
Read:
- RW → Read Write
- L → List
Modify:
-X
Software as a Service Model (SaaS)
The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure
SaaS
Provider:
→ Application
→ Middleware
→ Operating System
→ Hardware
→ Network
→ Facility
Consumer:
→ User
Platform as a Service Model (PaaS)
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider
Infrastructure as a Service Model (IaaS)
The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications
IaaS
Provider:
→ Hardware
→ Network
→ Facility
Consumer:
→ User
→ Application
→ Middleware
→ Operating System
Cloud Delivery Models
1) Private
2) Public
3) Community
4) Hybrid
Private cloud
The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (ie business units)
*** Under most circumstances, is owned by the organization and they act as both the provider and the consumer. They have an advantage in not needing to put their data on the Internet
Public cloud
The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider.
*** Examples include webmail and online document sharing/collaboration.
Community cloud
The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns
*** The key to distinguishing between this and other types of cloud delivery is that it serves a similar group. There must be joint interests and limited enrollment.
PaaS
Provider:
→ Middleware
→ Operating System
→ Hardware
→ Network
→ Facility
Consumer:
→ User
→ Application
Hybrid Cloud
The cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability
→ Usually amalagamation of private and public clouds
Type I Hypervisor Model
Also known as "bare metal". Is independent of the operating system and boots before the OS
.
Type II Hypervisor Model
Also known as hosted, is dependent on the operating system and cannot boot until the OS is up and running. It needs the OS to stay up so that it can boot
.
Snapshots
Allow you to take an image of a system at a particular point in time
→ Contain a copy of the virtual machine settings, information on all virtual disks attached, and the memory stat of the machine at the time
Snapshots can be used for:
Virtual machine cloning, allowing the machine copied once (or multiple times) for testing
Patch Compatibility
Needs to be factored in before systems are updated.
With VMware:
→ releases are based on the code from the immediately preceding update
→ compatibility
is assumed to have the same compatibility as the preceding update release
Host Availability
Topic that needs to be addressed in the Service Level Agreement (SLA) with any vendor with whom you contact for cloud services.
Elastacity
Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand
Security Control Testing (SCT)
Often includes interviews, examinations, and testing of systems to look for weaknesses
Sandboxing
Involves running apps in restricted memory areas
→ By doing so, it is possible to limit the possibility of an app's crash, allowing a user to
access another app or the data associated with it.
Multitenancy
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines
→ A flaw in implementation could compromise security
Laws and Responsiblities
The consumer retains the ultimate responsibility for compliance
Direct-attached storage (DAS)
Refers to a digital storage system directly attached to a server or workstation, without a storage network in between
→ Mainly used to differentiate non-networked storage from the concepts of a storage area network (SAN) and network-attached storage (NAS)
Network-attached storage (NAS)
Is
file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients
→ not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements
Storage Area network (SAN)
Is a dedicated network that provides access to consolidated, block-level data storage.
SANs are primarly used to:
enhance storage devices such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers that the devices appear like locally attched
Sets with similar termsVirtualization and Networking
200 terms
riverplate95
UHD - EIS 3302 - Chapter 3
65 terms
joshfranklin2013
Cloud Essentials Certification Test
55 terms
Mario_Price
BUS311 Chapter 3
25 terms
carlacuizon
Sets found in the same folderChapter 3: Understanding Devices and Inf…
84 terms
Anita_Hanjhaab
Chapter 1: Measuring and Weighing Risk
48 terms
Anita_Hanjhaab
Chapter 2: Monitoring and Diagnosing Networks
22 terms
Anita_Hanjhaab
Chapter 4: Access Control, Authentication, and Aut…
68 terms
Anita_Hanjhaab
Other sets by this creatorC# Design Patterns
3 terms
Anita_Hanjhaab
C# .NET Test
51 terms
Anita_Hanjhaab
PHY 211: Reading Quizzes 18-21, 14-16
13 terms
Anita_Hanjhaab
Reading Quizzes 9-11
15 terms
Anita_Hanjhaab
Verified questionsCOMPUTER SCIENCE
The value of 4! is a) 9 b) 24 c) 41 d) 120
Verified answer
COMPUTER SCIENCE
What do you think will happen when the operands to the integer division or remainder operations are negative? Consider each of the following cases and try to predict the result. Then try them out in Python. Recall the magic formula $a=(a / / b)(b)+(a \% b)$. (a) -10 // 3 (b) -10 % 3 (c) 10 // -3 (d) 10 % -3 (e) -10 // -3
Verified answer
COMPUTER SCIENCE
This symbol marks the beginning of a comment in Python. a. & b. * c. ** d. #
Verified answer
COMPUTER SCIENCE
The beginning of a template is marked by a(n) _______.
Verified answer
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Other Quizlet setsMIS Test 3 (Final)
81 terms
mikehahn9
Domain 1 PDF
12 terms
jokerswildjsn6
IS 300 Test 2
80 terms
Suspekti
MIS FINAL
58 terms
arlenett_
Related questionsQUESTION
Why did Hastings regret going public as early as he did?
15 answers
QUESTION
State the name of the Act that controls the storage of personal information and describe one legal implication for Animated World Books if this data is stolen
11 answers
QUESTION
Cloud computing provides a simple way to access servers, storage, databases, and a broad set of application services over the internet. You own the network-connected hardware required for these services and Amazon Web Services provisions what you need.
2 answers
QUESTION
What is a perpetual usage licence?
6 answers