Virtually True
Sell me some Cloud
Defining Moment in History
I Have to P
Defense Against the Dark Arts
100
Software used to virtualize Desktop and Server Machines
What is VMware (or Oraclebox)
100
This is generally considered the most basic cloud model. It generally replaces physical servers with cloud based virtual machines.
What is Infrastructure as a Service (Iaas)
100
The right data, at an acceptable speed is there when you need it
What is Availability
100
This P can be your greatest challenge. Without this pesky P, you might actually be able to implement predictable security.
What are People
100
Having multiple layers of security is called
What is layering or Defense in Depth
200
Network Resources that can be increased and decreased as needed are considered this?
What is scalable/elastic/dynamically allocated
200
This cloud service is all about applications hosted in the cloud
What is Software as a Service (SaaS)
200
Data is unchanged (how you left it)
What is Integrity
200
This P helps to fix known problems in software and hardware
What is Patching
200
Nessus is used for what
What is Network Scanning?
300
Name 2 of 5 key cloud attributes (as discussed in class)
What is Shared; Broad Network Access/Internet; Scaleable and Elastic; On Demand self service; measured service
300
If you need to build applications or mobile apps in large quantity, you could have your own development servers or you could you this type of service model
What is Platform as a Service (Paas)
300
Only authorized people have access to the data
What is Confidentiality
300
Organizations must make both paper and technical versions of this P for it to be a successful countermeasure
What is Policy
300
This is what the textbook security architecture uses to prevent outsiders getting to the inside of the network
What is a DMZ?
400
NIST SP 500-291 provides what?
What a Definition of Cloud Computing
400
Though we don't like our kids to be hyper, we need this kind of hyper as a intermediary between the physical Hardware and virtualized machines
What is a Hypervisor
400
Networks and Data can be protected through these three Security Countermeasures (must answer 2 correctly)
What is Technology; Policy and Practice; People
400
This P can provide the keys to the Kingdom...the longer and more complex the better!
What are Passwords
400
Giving an account the smallest amount of privileges necessary to complete the functions is called the concept of
What is Least Privilege
500
As we used them in the exercise, Amazon EC2 and HP Cloud were examples of what type of Service Model?
What is Infrastructure as a Service
500
Though not your Real Estate agent, this function brings all of the cloud players together
What is a Cloud Broker?
500
These are the three information states (must answer 2 of 3 correctly)
What is Transmission; storage; processing
500
These 2 Ps tend to go together when using firewalls or Access Control Lists to prevent traffic flow
What are ports and protocols
500
Name 4 of 5 tradeoffs to security (as discussed in class)
What is Speed; Complexity; Cost; Ease of Use; Operations
M
e
n
u