Anda di halaman 1dari 2

short type

1. define memory sharding?


2. define web hosting services?
A web hosting service is a type of Internet hosting service that allows individu
als and organizations to make their website accessible via the World Wide Web. W
eb hosts are companies that provide space on a server owned or leased for use by
clients, as well as providing Internet connectivity, typically in a data center
.
3. define machine image?
ans3.
machine image is a new copy of your operating system and core software for a par
ticular
environment on a specific platform. when u start a virtual server it copies
its operating environment from the machine image and boots up.if ur machine imag
e
contains ur installed app , deployment is nothing more than the process of star
ting
up a new virtual instance.
4. define hardening and its activities?
5. give a few guidelines for using the db clustering in the cloud?
Clustering, in the context of databases, refers to the ability of several server
s or instances to connect to a single database
6. what are the functions of db replication in the cloud?
Database replication can be used on many database management systems, usually wi
th a master/slave relationship between the original and the copies. The master l
ogs the updates, which then ripple through to the slaves. The slave outputs a me
ssage stating that it has received the update successfully, thus allowing the se
nding (and potentially re-sending until successfully applied) of subsequent upda
tes.
7. types of db backup.-full backup///incremental backup
8. what is a memory lock?
Locking memory is one of the most important issues for real-time applications. I
n a real-time environment, a process must be able to guarantee continuous memory
residence to reduce latency and to prevent paging and swapping.
9. write the basic limitation of web application design with memory lock.
10. name some of cloud based- database solution?
11. what are the security issues in cloud computing?
There are a number of security issues/concerns associated with cloud computing b
ut these issues fall into two broad categories: security issues faced by cloud p
roviders (organizations providing software-, platform-, or infrastructure-as-a-s
ervice via the cloud) and security issues faced by their customers (companies or
organizations who host applications or store data on the cloud).[2] The respons
ibility goes both ways, however: the provider must ensure that their infrastruct
ure is secure and that their clients data and applications are protected while th
e user must take measures to fortify their application and use strong passwords
and authentication measures.
When an organization elects to store data or host applications on the public clo
ud, it loses its ability to have physical access to the servers hosting its info
rmation. As a result, potentially business sensitive and confidential data is at
risk from insider attacks. According to a recent Cloud Security Alliance Report

, insider attacks are the third biggest threat in cloud computing.[3] Therefore,
Cloud Service providers must ensure that thorough background checks are conduct
ed for employees who have physical access to the servers in the data center. Add
itionally, data centers must be frequently monitored for suspicious activity.
In order to conserve resources, cut costs, and maintain efficiency, Cloud Servic
e Providers often store more than one customer's data on the same server. As a r
esult, there is a chance that one user's private data can be viewed by other use
rs (possibly even competitors). To handle such sensitive situations, cloud servi
ce providers should ensure proper data isolation and logical storage segregation
.[1]
The extensive use of virtualization in implementing cloud infrastructure brings
unique security concerns for customers or tenants of a public cloud service.[4]
Virtualization alters the relationship between the OS and underlying hardware be it computing, storage or even networking. This introduces an additional layer
- virtualization - that itself must be properly configured, managed and secured
.[5] Specific concerns include the potential to compromise the virtualization so
ftware, or "hypervisor". While these concerns are largely theoretical, they do e
xist.[6] For example, a breach in the administrator workstation with the managem
ent software of the virtualization software can cause the whole datacenter to go
down or be reconfigured to an attacker's liking.
12. what is cloud cryptography?
Crypto cloud computing is a new secure cloud computing architecture. It can prov
ide protection of information security at the system level, and allows users acc
ess to shared services conveniently and accurately. Crypto cloud computing prote
cts individual s connections with the outside world. It can protect the personal p
rivacy without any delay of information exchange.
long type
1.

a.)explain how IAAS security is different from infrastructural security.


b.)list top ten security threats of cloud computing