GRADE A+ GUARANTEED
Software as a Service (SaaS)
A form of cloud computing where a consumer subscribes to a third-
party software and receives a service that is delivered online.
Everything is managed by the provider
Like google mail, office 365
Platform as a Service (PaaS)
A cloud service in which consumers can install and run their own
specialized applications on the cloud computing network. This is an
operating system in the cloud.
Like appEngine, Microsoft Azure
Infastructure as a Service (IaaS)
the cloud hosting of a bare server computer, data storage, network,
and virtualization
Provides virtual machines and other virtualized hardware
Public Cloud
promotes massive, global, and industrywide applications offered to
the general public
Cost-effective, high availability and scalability. Can lack in
overall security
Private Cloud
serves only one customer or organization and can be located on the
customer's premises or off the customer's premises.
High security and is very customizable
community cloud
serves a specific community with common business models, security
requirements, and compliance considerations
Is like a public and private combined
Easy data sharing and collaboration among the organization
Hybrid Cloud
includes two or more private, public, or community clouds, but each
cloud remains separate and is only linked by technology that enables
data and application portability
flexible and better security
broad network access (cloud computing)
all devices can access data and applications
Container as a Service (CaaS)
, This cloud computing model provides containers and clusters as a
service to its subscribers.
Function as a Service (FaaS)
A category of cloud computing services that provides a platform
allowing customers to develop, run, and manage application
functionalities without the complexity of building and maintaining
the infrastructure typically associated with developing and launching
an app.
What are cloud users responsible for
application-level security
What are cloud vendors responsible for
physical security and some software security
risks of cloud computing
Abuse, insecure interfaces, malicious insiders, shared technology,
data loss, account or service hijacking, unknown risk profile,
multi-instance model
provides a unique DBMS running on a virtual machine instance for each
cloud subscriber
multi-tenant model
provides a predefined environment for the cloud subscriber that is
shared with other tenants, typically through tagging data with a
subscriber
identifier
Keystone
Security model for openStack. Provides identity and token
IoT (Internet of Things)
Continuing development of the Internet that allows everyday objects
embedded with electronic devices to send and receive data over the
Internet.
Information Technology (IT)
the computers and other electronic devices used to store, retrieve,
transmit and manipulate data. Primarily using wired connectivity
Operational Technology (OT)
A communications network designed to implement an industrial control
system rather than data networking.
Like machines embedded with IT
Actuator
single purpose devices bought by consumers
cloud enabled IoT
unlimited resources and seamless communication
edge device
it is installed closer to a client device, such as a workstation or a
security door, than to the core or backbone of a network
gateway