In this video, explore multilevel authentication layers, from your network to the cloud host to cloud apps.
- [Instructor] There's another aspect of cloud security that needs consideration. As we're already discussed, cloud services can include not only servers and storage, it can include applications and other tools as well. Infrastructure as a service, or IaaS, is a term used to describe what we've been talking about so far, using virtual hardware to increase storage, or processing power. You may have heard the term software as a service, or SaaS.
In the SaaS model, applications are hosted online rather than being installed on individual computers. If someone wants to use the tool, they log-in to the application via the Internet. Things like Google's G suite are a perfect example of SaaS. The entire thing lives online, Gmail, Google Docs, Photos, the works. Salesforce and Cisco Webex are other Saas products that live entirely online. There's also platform as a service, or PaaS.
Now this is different in that it provides primarily development tools in spaces. Rather than each developer in a company having their own copy of the tools they need installed on their personal computers, the common tools are accessible via the Internet. This gives developers a standardized framwork that they can use to build, test, and deploy applications. It's quicker and more economical than the old standalone model, too. So, what does having these web access tools mean for security, and, in particular, file security? Well, first of all it means that there are now multiple levels of authentication that users need to go through to get to their stuff.
This may not be visible to the user. A lot of tools are immediately available through the beauty of single sign-on, meaning you sign-in once to your network and that sign-on authenticates for the other tools through a system of federation. But, that takes setup, and it's not always possible or cost effective. So sometimes, users wind up having to sign-in repeatedly for various things. There may be multiple levels of encryption, too, which can present challenges when you're trying to share data across tools.
Example? If you wanna edit a Microsoft Office online PowerPoint presentation and insert an image that's stored in your Adobe Cloud image library, that can be a little bit difficult.
- Identify the group of people to be notified when making a document policy or procedure change.
- Recognize which types of documentation requires higher levels of security.
- Name the two rights available at folder level during collaboration.
- Recall the purpose of version control.
- Determine which application allows multiple libraries with custom permissions.
- Identify the term used for add-ins within the SharePoint application.
- Explain the most common cause of data breaches.