Cloud Security
Cloud Security
1. Data Creation: Generating new data through input, uploads, or automated systems.
3. Use: Accessing and manipulating data for operations, analysis, or user interaction.
5. Archival: Storing data long-term for future use, legal compliance, or analytics.
6. Deletion: Safely and permanently erasing data once it's no longer needed or after its
lifecycle ends.
6. Distinguish between the concepts of security and privacy in the context of cloud
computing.
In cloud computing, security refers to the technical safeguards and practices used to protect
cloud infrastructure, applications, and data from unauthorized access, breaches, and attacks.
Privacy, on the other hand, focuses on the proper handling, processing, and protection of
personal or sensitive information, ensuring that data is collected and shared according to
consent and legal guidelines.
7. What distinguishes the focus of cloud security from that of cloud privacy?
Cloud security emphasizes defending cloud systems and data from external and internal
threats using measures like encryption, firewalls, and intrusion detection. Cloud privacy,
however, concentrates on ethical and legal compliance regarding user data—ensuring it's
handled with transparency and respect for user rights.
8. How do the core concerns of security and privacy differ in cloud computing?
Security concerns are centered on protecting systems from vulnerabilities and attacks,
ensuring data confidentiality, integrity, and availability. Privacy concerns relate to how personal
data is collected, stored, accessed, and shared, focusing on user control and regulatory
adherence.
10. Explain the distinct focus areas of cloud security and cloud privacy.
Cloud security focuses on technical elements such as access controls, encryption, network
security, and threat detection. Cloud privacy focuses on policy enforcement, data minimization,
informed consent, and ensuring legal use of personally identifiable information.
11. In cloud computing, how do the goals of security and privacy vary?
The goal of cloud security is to develop resilient systems that prevent unauthorized access and
ensure system uptime. The goal of cloud privacy is to establish trust by providing transparency
and accountability in how user data is managed, complying with legal frameworks like GDPR,
HIPAA, etc.
UNIT-II
• Insecure interfaces and APIs: Exploitable endpoints that connect users and services.
• Insider threats: Malicious or careless actions from authorized personnel.
8. What risks are associated with improper data deletion in cloud storage?
Improper deletion may leave data remnants that can be recovered by malicious actors. Without
secure deletion protocols, sensitive information remains vulnerable even after supposed
removal, violating privacy regulations and exposing businesses to liability.
UNIT-III
• Intrusion Detection and Prevention Systems (IDPS): Monitor traffic for suspicious
patterns.
• Threat intelligence feeds: Help identify known bad actors and IPs.
7. Analyze different types of events and alerts generated during cloud security monitoring.
Events and alerts include:
• Authentication failures
• Policy violations
• Compliance validation
• Incident investigation
• Policy enforcement
• Operational insights
UNIT-IV
• Virtual Firewalls
• Biometric scan
• Hardware token
This minimizes the risk of credential-based attacks.
5. What are the main components of Identity & Access Management (IAM)?
IAM includes:
• Authentication mechanisms
• Authorization policies
• Improved productivity
• Token interception
Limitations:
• Privacy concerns