6.3.1 Cloud Computing
Learn the basics behind cloud computing.
Cloud computing is a collection of hardware and software that allows data to be manipulated remotely using external Internet connections. Most organizations that allow cloud computing have a cloud of their own, which is a set of hardware devices that are accessible remotely through some kind of protocol.
The great thing about cloud computing is that it allows for the use of multiple devices from literally anywhere to access the same resources and applications without the need to copy data across all the devices you're using. It's easy to quickly allocate and reallocate precious resources to whose who actively need it.
Cloud Types
- Public
- Private
- Hybrid (both public & private)
- Community
Cloud Services
Organizations offer many things as part of a cloud computing package. Members might simply request storage, computing resources & time, or access to a program, are given it. This is called self-service provisioning. Or, they might request access to an API, which grants them access to data stored and managed on the organization's servers.
Organizations sometimes use strategies such as metering to not charge users for access to their resources, but based on how much or how long they use them for. This is called metering.
Delivery Models
There are three delivery models that cloud computing providers organize their products into:
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
Security Policies (Raw Lesson Content)
Cloud computing service providers reduce the risk of security breaches in multiple ways.
- Authenticate all users who access the service and allow users to access only the applications and data that they need.
- Segregate each organization's centrally stored data.
- Verify, test, and apply updates to the infrastructure.
- Establish a formal process for all facets of the service, from user requests to major data breaches and catastrophic events.
- Implement security monitoring of things like usage and unusual behavior.
- Implement encryption up to the point of use, such as the client's web browser.
- Probe for security holes with a third-party service provider.
- Comply with all regulatory measures, like the Sarbanes-Oxley-Act-of-2002.
#VI
#Aplus
No comments to display
No comments to display