Flashcards on Cloud Security V4

Click on the flashcard to see the answer


What is cloud security?

Cloud security refers to the set of policies, controls, procedures, and technologies used by cloud service providers and cloud customers to protect the data, applications, and infrastructure associated with cloud computing.

What kind of security risks are associated with cloud computing?

Cloud computing faces security risks from data breaches, data loss, account or service traffic hijacking, insecure application program interfaces (APIs), denials of service, and malicious insiders.

What are the components of a cloud security framework?

A cloud security framework includes identification and classification of assets and risks, risk assessment and analysis, implementation of security measures, assessment of the effectiveness of measures, and management of security operations and processes.

What is a virtual private cloud (VPC)?

A virtual private cloud (VPC) is a private, isolated part of a public cloud infrastructure that is designed to provide enhanced security and control.

What is multi-factor authentication?

Multi-factor authentication is a security process in which a user provides two or more different forms of identification to verify their identity.

What is encryption in the context of cloud security?

Encryption is the process of converting data into a coded language to prevent unauthorized access during transmission or storage.

What is a security incident response plan?

A security incident response plan is a set of procedures to be followed when a security incident occurs. It outlines the steps to be taken to detect, contain, and mitigate the impact of an incident.

What is two-factor authentication?

Two-factor authentication is a security process in which a user provides two different forms of identification to verify their identity, typically a password or PIN and a physical token, such as a smart card or security token.

What is access control in the context of cloud security?

Access control refers to the processes and procedures used to limit access to resources and data in a cloud environment. It involves the use of authentication, authorization, and accounting mechanisms to enforce security policies.

What is a firewall?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

What is data loss prevention?

Data loss prevention (DLP) refers to the strategy and tools used to prevent the loss or theft of sensitive data. It involves the identification, monitoring, and control of data at rest, in use, and in motion.

What is a cloud access security broker (CASB)?

A cloud access security broker (CASB) is a security software tool or service that sits between cloud service users and cloud service providers to monitor activity and enforce security policies.

What is network segmentation?

Network segmentation is the process of dividing a computer network into smaller subnetworks, or segments, to improve performance and security.

What is a security audit?

A security audit is a systematic evaluation of an organization's information systems, technology, and processes to assess their vulnerability to security threats, identify weaknesses, and recommend controls to mitigate risks.

What is a security control?

A security control is a mechanism or procedure designed to enforce a security policy, protect assets from threats, and prevent unauthorized access or use.

What is cloud security?

Cloud security refers to the set of policies, controls, procedures, and technologies used by cloud service providers and cloud customers to protect the data, applications, and infrastructure associated with cloud computing.

What kind of security risks are associated with cloud computing?

Cloud computing faces security risks from data breaches, data loss, account or service traffic hijacking, insecure application program interfaces (APIs), denials of service, and malicious insiders.

What are the components of a cloud security framework?

A cloud security framework includes identification and classification of assets and risks, risk assessment and analysis, implementation of security measures, assessment of the effectiveness of measures, and management of security operations and processes.

What is a virtual private cloud (VPC)?

A virtual private cloud (VPC) is a private, isolated part of a public cloud infrastructure that is designed to provide enhanced security and control.

What is multi-factor authentication?

Multi-factor authentication is a security process in which a user provides two or more different forms of identification to verify their identity.

What is encryption in the context of cloud security?

Encryption is the process of converting data into a coded language to prevent unauthorized access during transmission or storage.

What is a security incident response plan?

A security incident response plan is a set of procedures to be followed when a security incident occurs. It outlines the steps to be taken to detect, contain, and mitigate the impact of an incident.

What is two-factor authentication?

Two-factor authentication is a security process in which a user provides two different forms of identification to verify their identity, typically a password or PIN and a physical token, such as a smart card or security token.

What is access control in the context of cloud security?

Access control refers to the processes and procedures used to limit access to resources and data in a cloud environment. It involves the use of authentication, authorization, and accounting mechanisms to enforce security policies.

What is a firewall?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

What is data loss prevention?

Data loss prevention (DLP) refers to the strategy and tools used to prevent the loss or theft of sensitive data. It involves the identification, monitoring, and control of data at rest, in use, and in motion.

What is a cloud access security broker (CASB)?

A cloud access security broker (CASB) is a security software tool or service that sits between cloud service users and cloud service providers to monitor activity and enforce security policies.

What is network segmentation?

Network segmentation is the process of dividing a computer network into smaller subnetworks, or segments, to improve performance and security.

What is a security audit?

A security audit is a systematic evaluation of an organization's information systems, technology, and processes to assess their vulnerability to security threats, identify weaknesses, and recommend controls to mitigate risks.

What is a security control?

A security control is a mechanism or procedure designed to enforce a security policy, protect assets from threats, and prevent unauthorized access or use.

Share


Login to Save


Share



Login to Save


Explore Other Decks


Made for Grade 7

Information Technology: Objects in Electronic Spreadsheets


View Deck
Made for Grade 8

The French Revolution


View Deck
Made for Grade 8

Thinking Outside the Box


View Deck

Explore More