Computer Networking > QUESTIONS & ANSWERS > CCSP - Certified Cloud Security Professional - All Domains (All Answered Fall 2022) (All)

CCSP - Certified Cloud Security Professional - All Domains (All Answered Fall 2022)

Document Content and Description Below

CCSP - Certified Cloud Security Professional - All Domains (All Answered Fall 2022) Anything-as-a-Service >>>>Anything-as-a-service, or "XaaS," refers to the growing diversity of services available... over the Internet via cloud computing as opposed to being provided locally, or on premises. Apache CloudStack >>>>An open source cloud computing and Infrastructure as a Service (IaaS) platform developed to help Infrastructure as a Service make creating, deploying, and managing cloud services easier by providing a complete "stack" of features and components for cloud environments. Cloud Administrator >>>>This individual is typically responsible for the implementation, monitoring, and maintenance of the cloud within the organization or on behalf of an organization (acting as a third party). Cloud App (Cloud Application) >>>>Short for cloud application, cloud app is the phrase used to describe a software application that is never installed on a local computer. Instead, it is accessed via the Internet. Cloud Application Architect >>>>Typically responsible for adapting, porting, or deploying an application to a target cloud environment. Cloud Application Management for Platforms (CAMP) >>>>A specification designed to ease management of applications — including packaging and deployment — across public and private cloud computing platforms. Cloud Architect >>>>He or she will determine when and how a private cloud meets the policies and needs of an organization's strategic goals and contractual requirements (from a technical perspective). Cloud Backup Service Provider >>>>A third-party entity that manages and distributes remote, cloud-based data backup services and solutions to customers from a central data center. Cloud Backup Solutions >>>>Enable enterprises or individuals to store their data and computer files on the Internet using a storage service provider rather than storing the data locally on a physical disk, such as a hard drive or tape backup. Cloud Computing >>>>A type of computing, comparable to grid computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud Computing Accounting Software >>>>Accounting software that is hosted on remote servers.Cloud Computing Reseller >>>>A company that purchases hosting services from a cloud server hosting or cloud computing provider and then re-sells them to its own customers. Cloud Database >>>>A database accessible to clients from the cloud and delivered to users on demand via the Internet. Cloud Data Architect >>>>Ensures the various storage types and mechanisms utilized within the cloud environment meet and conform to the relevant SLAs and that the storage components are functioning according to their specified requirements. Cloud Developer >>>>Focuses on development for the cloud infrastructure itself. This role can vary from client tools or solutions engagements, through to systems components. Cloud Enablement >>>>The process of making available one or more of the following services and infrastructures to create a public cloud-computing environment: cloud provider, client, and application. Cloud Management >>>>Software and technologies designed for operating and monitoring the applications, data, and services residing in the cloud. Cloud management tools help to ensure a company's cloud computing-based resources are working optimally and properly interacting with users and other services. Cloud Migration >>>>The process of transitioning all or part of a company's data, applications, and services from on-site premises behind the firewall to the cloud, where the information can be provided over the Internet on an on-demand basis. Cloud OS >>>>A phrase frequently used in place of Platform as a Service (PaaS) to denote an association to cloud computing. Cloud Portability >>>>The ability to move applications and its associated data between one cloud provider and another — or between public and private cloud environments. Cloud Provider >>>>A service provider who offers customers storage or software solutions available via a public network, usually the Internet. Cloud Provisioning >>>>The deployment of a company's cloud computing strategy, which typically first involves selecting which applications and services will reside in the public cloud and which will remain on-site behind the firewall or in the private cloud. Cloud Server Hosting >>>>A type of hosting in which hosting services are made available to customers on demand via the Internet. Rather than being provided by a single server or virtual server, cloud server hosting services are provided by multiple connected servers that comprise a cloud.Cloud Services Broker (CSB) >>>>Typically a third-party entity or company that looks to extend or enhance value to multiple customers of cloud-based services through relationships with multiple cloud service providers. Cloud Storage >>>>The storage of data online in the cloud, wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Cloud Testing >>>>Load and performance testing conducted on the applications and services provided via cloud computing — particularly the capability to access these services — in order to ensure optimal performance and scalability under a wide variety of conditions. Desktop-as-a-service >>>>A form of virtual desktop infrastructure (VDI) in which the VDI is outsourced and handled by a third party. Enterprise Application >>>>The term used to describe applications — or software — that a business would use to assist the organization in solving enterprise problems. Eucalyptus >>>>An open source cloud computing and Infrastructure as a Service (IaaS) platform for enabling private clouds. FIPS 140-2 >>>>Primary goal is to accredit and distinguish secure and well-architected cryptographic modules produced by private sector vendors who seek to have their solutions and services certified for use in regulated industries that collect, store, transfer, or share data that is deemed to be "sensitive" but not classified. Hybrid Cloud Storage >>>>A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider. Mobile Cloud Storage >>>>A form of cloud storage that applies to storing an individual's mobile device data in the cloud and providing the individual with access to the data from anywhere. NIST SP 800-53 >>>>Its primary goal and objective is to ensure that appropriate security requirements and security controls are applied to all U.S. Federal Government information and information management systems. Online Backup >>>>Leverages the Internet and cloud computing to create an attractive off-site storage solution with little hardware requirements for any business of any size. Personal Cloud Storage >>>>A form of cloud storage that applies to storing an individual's data in the cloud and providing the individual with access to the data from anywhere.Platform as a Service (PaaS) >>>>A way for customers to rent hardware, operating systems, storage, and network capacity over the Internet from a cloud service provider. Private Cloud Project >>>>Enable their IT infrastructure to become more capable of quickly adapting to continually evolving business needs and requirements. Private Cloud Storage >>>>A form of cloud storage where the enterprise data and cloud storage resources both reside within the enterprise's data center and behind the firewall. Public Cloud Storage >>>>A form of cloud storage where the enterprise and storage service provider are separate and the data is stored outside of the enterprise's data center. Software as a Service (SaaS) >>>>The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Storage Cloud >>>>The collection of multiple distributed and connected resources responsible for storing and managing data online in the cloud. TCI Reference Architecture >>>>A methodology and a set of tools that enables security professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business. Vendor Lock-in >>>>Highlights where a customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or non-technical constraints. Vertical Cloud Computing >>>>The optimization of cloud computing and cloud services for a particular vertical (e.g., a specific industry) or specific-use application. Virtualization Technologies >>>>Enable cloud computing to become a real and scalable service offering due to the savings, sharing, and allocations of resources across multiple tenants and environments. All-or-Nothing-Transform with Reed-Solomon (AONT-RS) >>>>Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the encryption key into blocks in a way that the information cannot be recovered without using all the blocks, and then it uses the IDA to split the blocks into m shares that are distributed to different cloud storage services (the same as in SSMS).Anonymization >>>>The act of permanently and completely removing personal identifiers from data, such as converting personally identifiable information (PII) into aggregated data. Bit Splitting >>>>Usually involves splitting up and storing encrypted information across different cloud storage services. Business Impact Analysis (BIA) >>>>An exercise that determines the impact of losing the support of any resource to an organization, establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems. Control >>>>Acts as a mechanism to restrict a list of possible actions down to allowed or permitted actions. Crypto-shredding >>>>The process of deliberately destroying the encryption keys that were used to encrypt the data originally. Data Loss Prevention (DLP) >>>>Audit and prevent unauthorized data exfiltration. Degaussing >>>>Using strong magnets for scrambling data on magnetic media such as hard drives and tapes. Digital Rights Management (DRM) >>>>Focuses on security and encryption to prevent unauthorized copying limit distribution to only those who pay. Encryption >>>>An overt secret writing technique that uses a bidirectional algorithm in which humanly readable information (referred to as plaintext) is converted into humanly unintelligible information (referred to as ciphertext). Encryption Key >>>>A special mathematical code that allows encryption hardware/software to encode and then decipher an encrypted message. Enterprise DRM >>>>Integration plan designed by Digital Equipment Corp. to provide an operation platform for multi-vendor environment. Homomorphic Encryption >>>>Enables processing of encrypted data without the need to decrypt the data. It allows the cloud customer to upload data to a cloud service provider for processing without the requirement to decipher the data first. Infrastructure as a Service (IaaS) >>>>A model that provides a complete infrastructure (e.g. servers, internetworking devices) and allows companies to install software on provisioned servers and control the configurations of all devices. Key Management >>>>The generation, storage, distribution, deletion, archiving, and application of keys in accordance with a security policy.Masking >>>>A weak form of confidentiality assurance that replaces the original information with asterisks or X's. Non-Repudiation >>>>The assurance that a specific author actually did create and send a specific item to a specific recipient, and that it was successfully received. With assurance of non-repudiation, the sender of the message cannot later credibly deny having sent the message, nor can the recipient credibly claim not to have received it. Obfuscation >>>>The convoluting of code to such a degree that even if the source code is obtained, it is not easily decipherable. Personal Data >>>>Any information relating to an identified or identifiable natural person data subject; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural, or social identity. Personally Identifiable Information (PII) >>>>Information that can be traced back to an individual user, e.g. your name, postal address, or e-mail address. Personal user preferences tracked by a Web site via a cookie is also considered personally identifiable when linked to other personally identifiable information provided by you online. Record >>>>A data structure or collection of information that must be retained by an organization for legal, regulatory or business reasons. Service Level Agreement (SLA) >>>>A formal agreement between two or more organizations: one that provides a service and the other the recipient of the service. It may be a legal contract with incentives and penalties. Tokenization >>>>The process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. Authentication >>>>The act of identifying or verifying the eligibility of a station, originator, or individual to access specific categories of information. Typically, a measure designed to protect against fraudulent transmissions by establishing the validity of a transmission, message, station, or originator. Authorization >>>>The granting of right of access to a user, program, or process. Content Delivery Network (CDN) >>>>A service where data is replicated across the global Internet. Corporate Governanc >>>>The relationship between the shareholders and other stakeholders in the organization versus the senior management of the corporation.Database as a Service >>>>In essence, a managed database service. Demilitarized Zone (DMZ) >>>>Isolates network elements such as e-mail servers that, because they can be accessed from trustless networks, are exposed to external attacks. Enterprise Risk Management >>>>The set of processes and structure to systematically manage all risks to the enterprise. Hardware Security Module (HSM) >>>>A device that can safely store and manage encryption keys. This can be used in servers, data transmission, protecting log files, etc. Management Plane >>>>Controls the entire infrastructure, and parts of it will be exposed to customers independent of network location, it is a prime resource to protect. Object Storage >>>>Objects (files) are stored with additional metadata (content type, redundancy required, creation date, etc.). These objects are accessible through APIs and potentially through a web user interface. Redundant Array of Inexpensive Disks (RAID >>>>Instead of using one large disk to store data, one can use many smaller disks (because they are cheaper). An approach to using many low-cost drives as a group to improve performance, yet also provides a degree of redundancy that makes the chance of data loss remote. Security Alliance's Cloud Controls Matrix >>>>A framework to enable cooperation between cloud consumers and cloud providers on demonstrating adequate risk management Software Defined Networking (SDN) >>>>A broad and developing concept addressing the management of the various network components. The objective is to provide a control plane to manage network traffic on a more abstract level than through direct management of network components. Application Normative Framework (ANF) >>>>A subset of the ONF that will contain only the information required for a specific business application to reach the targeted level of trust Application Programming Interfaces (APIs) >>>>A set of routines, standards, protocols, and tools for building software applications to access a Web-base [Show More]

Last updated: 1 year ago

Preview 1 out of 14 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
64
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 21, 2022

Number of pages

14

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 2 years

314 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 21, 2022

Downloads

 0

Views

 64

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·