Quick Navigation
CLOUD SECURITY#1
Practices and technologies designed to protect cloud-based systems, data, and infrastructure from threats.
CLOUD SERVICE MODELS#2
Different types of cloud services: IaaS, PaaS, and SaaS, each with unique security considerations.
IaaS (Infrastructure as a Service)#3
Cloud service model providing virtualized computing resources over the internet, requiring strong security measures.
PaaS (Platform as a Service)#4
Cloud service model that offers hardware and software tools over the internet, focusing on application security.
SaaS (Software as a Service)#5
Cloud service model delivering software applications over the internet, emphasizing user data protection.
THREAT MODELING#6
Process of identifying potential threats to a system and determining mitigation strategies.
RISK ASSESSMENT#7
Evaluation of potential risks that could harm an organization’s assets or operations.
IDENTITY AND ACCESS MANAGEMENT (IAM)#8
Framework for managing user identities and access rights to secure cloud resources.
ROLE-BASED ACCESS CONTROL (RBAC)#9
Access control method based on user roles within an organization, enhancing security management.
COMPLIANCE FRAMEWORKS#10
Regulatory guidelines (e.g., GDPR, HIPAA) that organizations must follow to ensure data protection.
GDPR (General Data Protection Regulation)#11
EU regulation on data protection and privacy, affecting how organizations handle personal data.
HIPAA (Health Insurance Portability and Accountability Act)#12
US law that mandates data privacy and security provisions for safeguarding medical information.
INCIDENT RESPONSE PLANNING#13
Preparation and procedures for responding to security incidents to minimize damage.
SECURITY ARCHITECTURE#14
Design and structure of security controls and processes to protect an organization’s assets.
VULNERABILITY#15
A weakness in a system that can be exploited by threats to gain unauthorized access.
MITIGATION STRATEGIES#16
Actions taken to reduce the impact or likelihood of potential security threats.
ATTACK VECTOR#17
The path or method used by an attacker to gain access to a system or network.
SECURITY CONTROLS#18
Measures implemented to protect information systems from security threats.
DATA ENCRYPTION#19
The process of converting data into a coded format to prevent unauthorized access.
SECURITY INCIDENT#20
An event that indicates a potential breach of security policies or practices.
SECURITY GAP#21
A vulnerability or weakness in the security posture of an organization.
ARCHITECTURE DIAGRAM#22
Visual representation of the components and relationships within a cloud security architecture.
DOCUMENTATION#23
Written records that detail the design, decisions, and processes of a cloud security architecture.
SELF-ASSESSMENT#24
A reflective process where students evaluate their understanding and application of course concepts.