Cloud Computing - 2 Marks
Cloud Computing - 2 Marks
Cloud Computing is defined as storing and accessing of data and computing services
over the internet. It doesn’t store any data on your personal computer. It is the on-
demand availability of computer services like servers, data storage, networking,
databases, etc. The main purpose of cloud computing is to give access to data centers to
many users. Users can also access data from a remote server.
Private Cloud
Public Cloud
Hybrid Cloud
Community Cloud
8. Define hypervisor.
A hypervisor or virtual machine monitor (VMM) is a piece of computer software,
firmware or hardware that creates and runs virtual machines. Hypervisors is a
fundamental element of hardware virtualization is the hypervisor, or virtual machine
manager (VMM).
Containers and virtual machines are two types of virtualization technologies that share
many similarities. Virtualization is a process that allows a single resource, such as RAM,
CPU, Disk, or Networking, to be virtualized and represented as multiple resources.
However, the main difference between containers and virtual machines is that virtual
machines virtualize the entire machine, including the hardware layer, while containers
only virtualize software layers above the operating system level.
Blob
Queue
File and Disk Storage
Data Lake Store
Backup and Site Recovery
The OpenStack project is an open source cloud computing platform for all types of
clouds, which aims to be simple to implement, massively scalable, and feature rich.
Developers and cloud computing technologists from around the world create the
OpenStack project. OpenStack provides an Infrastructure-as-a-Service (IaaS) solution
through a set of interrelated services.
17. What is guest hopping?
Guest-hopping attack: In this type of attack, an attacker will try to get access to one
virtual machine by penetrating another virtual machine hosted in the same hardware.
One of the possible mitigations of guest hopping attack is the Forensics and VM
debugging tools to observe the security of cloud.
Hyper jacking is an attack in which a hacker takes malicious control over the hypervisor
that creates the virtual environment within a virtual machine (VM) host.
20. List down the requirements of identity and access management. IAM
requirements are organized into four categories: