Quick Navigation

CLOUD SECURITY#1

Practices and technologies designed to protect cloud-based systems, data, and infrastructure from threats.

CLOUD SERVICE MODELS#2

Different types of cloud services: IaaS, PaaS, and SaaS, each with unique security considerations.

IaaS (Infrastructure as a Service)#3

Cloud service model providing virtualized computing resources over the internet, requiring strong security measures.

PaaS (Platform as a Service)#4

Cloud service model that offers hardware and software tools over the internet, focusing on application security.

SaaS (Software as a Service)#5

Cloud service model delivering software applications over the internet, emphasizing user data protection.

THREAT MODELING#6

Process of identifying potential threats to a system and determining mitigation strategies.

RISK ASSESSMENT#7

Evaluation of potential risks that could harm an organization’s assets or operations.

IDENTITY AND ACCESS MANAGEMENT (IAM)#8

Framework for managing user identities and access rights to secure cloud resources.

ROLE-BASED ACCESS CONTROL (RBAC)#9

Access control method based on user roles within an organization, enhancing security management.

COMPLIANCE FRAMEWORKS#10

Regulatory guidelines (e.g., GDPR, HIPAA) that organizations must follow to ensure data protection.

GDPR (General Data Protection Regulation)#11

EU regulation on data protection and privacy, affecting how organizations handle personal data.

HIPAA (Health Insurance Portability and Accountability Act)#12

US law that mandates data privacy and security provisions for safeguarding medical information.

INCIDENT RESPONSE PLANNING#13

Preparation and procedures for responding to security incidents to minimize damage.

SECURITY ARCHITECTURE#14

Design and structure of security controls and processes to protect an organization’s assets.

VULNERABILITY#15

A weakness in a system that can be exploited by threats to gain unauthorized access.

MITIGATION STRATEGIES#16

Actions taken to reduce the impact or likelihood of potential security threats.

ATTACK VECTOR#17

The path or method used by an attacker to gain access to a system or network.

SECURITY CONTROLS#18

Measures implemented to protect information systems from security threats.

DATA ENCRYPTION#19

The process of converting data into a coded format to prevent unauthorized access.

SECURITY INCIDENT#20

An event that indicates a potential breach of security policies or practices.

SECURITY GAP#21

A vulnerability or weakness in the security posture of an organization.

ARCHITECTURE DIAGRAM#22

Visual representation of the components and relationships within a cloud security architecture.

DOCUMENTATION#23

Written records that detail the design, decisions, and processes of a cloud security architecture.

SELF-ASSESSMENT#24

A reflective process where students evaluate their understanding and application of course concepts.