Cloud Security
CIA Security Model
Security Architecture
Security Issues
Monitoring Issues
100

This occurs when an unauthorized third-party maliciously gains access to data at rest in a cloud infrastructure or data in transit for compromising its integrity.

What is a Data Breach?

100

This is what CIA stands for when it comes to cloud computing. 

What is Confidentiality, Integrity, and Availability?

100

This is a service-oriented security mechanism for protecting the user layer of the cloud computing ecosystem.

What is Security-as-a-Service?

100

This issue is a critical challenge is cloud computing as regulations on storage, usage, management and access to individual information vary across the world.

What is Privacy?

100

These are information that have close connections with the name or address of any individual which could be used to identify or locate people or information that can be potentially correlated with the other information to identify an individual.

What are Personally Identifiable Information (PII)?

200

Those with a high-level of access to potentially private, sensitive information and critical systems leading to a serious data breach are referred to as this.

What are malicious insiders?

200

This refers to the ability to share sensitive data between a number of users without violating the privileges granted by the data owner to each of the targeted user

What is Data Confidentiality?

200

This is an application used by cloud consumers to access their subscribed services anywhere and at any time.

What is a standard web browser?

200

This is used for securing data in transmission while making sure it reaches the correct destination. 

What is the secure socket layer (SSL)?

200

This is a proprietary monitoring solution for Amazon Web Services (AWS).

What is Amazon CloudWatch?

300

This is a stealthy computer network attack in which multiple assault code are injected into a vulnerable system at entry points while participating in a targeted network such that certain malicious individuals gain unauthorized access and remain undetected over a long period of time.

What are advanced persistent threats?

300

This characteristic indicates that rightful owners of data, in this case, cloud service consumers, can seamlessly gain access to their data, and they are not denied access erroneously or due to malicious attacks by any entity.

What is Data Availability?

300

Transport Layer Security (TLS) and Same Origin Policy (SOP) are both policies proposed for this.

What is Browser Security?

300

These are responsible for the monitoring, evaluation and demonstration of the degree of compliance with regulatory requirements, coordination of external auditing and internal policy requirements in addition to the customers' business and organization's objectives.

What are Cloud Service Providers (CSP)?

300

This system leverages on RESTful Web Services to provide monitoring services.

What is Cloud Management System (CMS)?

400

This involves the stealing and using of the account details of a legitimate user for disreputable purposes using techniques like fraud and phishing.

What is Account Hijacking?

400

This refers to the process of ensuring that cloud users' data is protected from unauthorized modification, thus assuring that the stored data has not been manipulated in any way by any unauthorized parties.

What is Data Integrity?

400

This is the primary objective of an access control mechanism due to wide range of accessibility to cloud data via the internet.

What is User Authentication?

400

This is a typical attack aimed at injecting a malicious service performance module into a legitimate instance of a virtual machine.

What is a Cloud Malware Injection Attack?

400

This Monitoring System is an open source monitoring solution developed for private clouds.

What is Private Cloud Monitoring Systems (PCMONS)?

500

These are exploitable program bugs in the operating system that can be exploited by attackers to gain full access to the host computer.

What are System Vulnerabilities?

500

This can lead to unauthorized third party or administrators gaining remote access to administer customer cloud services and can cause intentional damage to their data sources.

What is poor access and identity management procedures?

500

This authentication standard is commonly available and a more reliable authentication scheme than the password login verification check. It uses an IF-MAP standard to authorize users in real-time communication between the cloud provider and the consumer.

What is the Trusted Platform Module (TPM)?

500

This kind of attack causes the server's hardware resources to become completely exhausted such that the same hardware system is unable to perform any intended tasks.

What is a flooding attack?

500

This system is a composite and comprehensive cloud monitoring solution resulting from a rich integrated set of monitoring solutions.

What are Flexible Automated Cloud Monitoring Slices (Flex-ACMS)?