From the course: Cloud Security Considerations for Government and the Military
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Service models
From the course: Cloud Security Considerations for Government and the Military
Service models
- [Instructor] The basis for your service model selections should be employee skill sets and supporting training budgets. The first of these, infrastructure as a service in which the customer can provision equipment as a service to support operations including storage, hardware servers, and relevant networking components. Characteristics of this model are metered usage and pricing on the basis of units or instances consumed, an ability to scale infrastructure services up and down based on usage, reduced cost of ownership, and reduced energy and cooling costs. For IaaS, key security threats include attacks against the virtual infrastructure, which includes virtual machine attacks, virtual network, virtual switch attacks, and hypervisor attacks. Denial of service attacks on the virtual environment, which forms a critical threat to virtual machines along with all other dependent and associated services. Multi-tenancy by…
Contents
-
-
-
Key cloud computing drivers2m 32s
-
(Locked)
Cloud computing characteristics3m 20s
-
(Locked)
Deployment models2m 53s
-
(Locked)
Service models6m 58s
-
(Locked)
IT implementation options1m 47s
-
(Locked)
Infrastructure attack vectors1m 25s
-
(Locked)
Software attack vectors2m 24s
-
(Locked)
Critical vulnerabilities3m 21s
-
-
-
-
-
-