0% found this document useful (0 votes)
170 views36 pages

Network

Uploaded by

717821t146
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views36 pages

Network

Uploaded by

717821t146
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Cheatsheet For Cloud & Network Security By Techie CodeBuddy

YouTube Link: Click Me


Important Topics for MCQS in Accenture Exam:
1. Basics of Networking
2. Types of Networking Devices
3. Topologies
4. OSI And TCP/IP Models
5. Cloud Computing Introduction
6. Cloud Service models
7. Cryptography, and encryption algorithms
8. Cyber Attacks & Security Measures

Basics of Networking
1. What is a Computer Network?
Definition: A computer network is a collection of interconnected devices
(such as computers, servers, routers, and switches) that communicate with
each other to share resources (like files, printers, and internet connections) and
services.
Types of Network:
LAN (Local Area Network): A network confined to a small geographic area,
like a single building or campus.
WAN (Wide Area Network): A network that spans a large geographic area,
such as cities, countries, or even globally (e.g., the Internet).
MAN (Metropolitan Area Network): A network that covers a larger area than
a LAN but smaller than a WAN, like a city.
PAN (Personal Area Network): A network for personal devices, typically
within a range of a few meters (e.g., Bluetooth connections).

2. Network Topologies
Definition: The layout or structure of a network, describing how devices are
connected.
Common Topologies :
Bus Topology: All devices are connected to a single central cable. Easy to
install but prone to collisions and single points of failure.
Star Topology: All devices are connected to a central hub. This topology is
reliable and easy to manage but depends on the hub.
Ring Topology: Devices are connected in a circular manner. Data travels in
one direction, making it less prone to collisions but more difficult to
troubleshoot.
Mesh Topology: Every device is connected to every other device. Provides
high redundancy but is complex and expensive.

3. OSI Model (Open Systems Interconnection)


Definition: A conceptual framework used to understand and standardize the
functions of a network in seven layers.
- Layer 1: Physical Layer: Handles the physical connection between devices,
including cables, switches, and signal transmission.
- Layer 2: Data Link Layer : Manages the data frames between devices on the
same network and handles error detection.
- Layer 3: Network Layer : Handles the routing of data between devices
across different networks, using IP addresses.
- Layer 4: Transport Layer : Manages end-to-end communication, ensuring
data is transferred reliably using protocols like TCP and UDP.
- Layer 5: Session Layer : Manages sessions or connections between
applications.
- Layer 6: Presentation Layer : Translates data formats between the
application and the network, handling encryption and compression.
- Layer 7: Application Layer : Provides network services directly to end-users,
like email, file transfer, and web browsing.
4. IP Addressing
Definition: An IP (Internet Protocol) address is a unique identifier for a device
on a network.
Types :
1. IPv4 : Uses a 32-bit address, typically written as four decimal numbers
separated by dots (e.g., 192.168.1.1).
2. IPv6 : Uses a 128-bit address, providing a much larger address space,
written as eight groups of hexadecimal numbers (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).

5. Subnetting
Definition: The process of dividing a network into smaller, manageable sub-
networks (subnets) to improve efficiency and security.
Subnet Mask : A 32-bit number that helps define the network and host
portions of an IP address (e.g., 255.255.255.0).

6. TCP/IP Model
Definition: A simplified, more practical model than OSI, used to understand
network communication.
Layer 1: Network Interface Layer: Corresponds to the OSI's Physical and Data
Link layers.
Layer 2: Internet Layer: Corresponds to the OSI's Network layer, handling
routing and addressing (IP).
Layer 3: Transport Layer: Corresponds to the OSI's Transport layer, managing
data transfer (TCP/UDP).
Layer 4: Application Layer: Corresponds to the OSI's Session, Presentation,
and Application layers, providing user services.
7. Protocols
Definition: Rules and conventions for communication between network
devices.
- HTTP/HTTPS : Used for web browsing.
- FTP : Used for file transfer.
- SMTP : Used for sending emails.
- TCP/IP : Core protocols for internet communication.
- DNS : Resolves domain names to IP addresses.
- DHCP : Automatically assigns IP addresses to devices on a network.

8. Network Devices
- Router: Directs data between different networks.
- Switch: Connects devices within a network and filters traffic to improve
performance.
- Hub: Basic device that broadcasts data to all devices in a network.
- Firewall: Protects the network by controlling incoming and outgoing traffic
based on security rules.
- Access Point: Provides wireless connectivity to devices within a network.
These concepts form the foundation of networking, essential for understanding
more advanced topics like network security, cloud networking, and
troubleshooting.
### Types of Network Devices
1. Router
Function: A router connects multiple networks and directs data packets
between them. It determines the best path for data to travel from its source to
its destination.
Use Case : In a home network, a router connects your local devices (like
computers, smartphones, and smart TVs) to the internet. It also enables
different networks (e.g., office networks) to communicate with each other
securely.
- Example : A typical home Wi-Fi router allows your devices to connect to the
internet and each other, providing both wired and wireless connectivity.

2. Switch
Function: A switch operates within a single network, connecting devices (like
computers, printers, and servers) and managing data traffic by sending data
only to the device it’s intended for, thus improving network efficiency.
Use Case: In an office, a switch connects multiple computers, allowing them
to share resources like printers and files without unnecessary data traffic
congestion.
Example: In a small business, an Ethernet switch connects multiple PCs and
servers, ensuring efficient data transfer and communication within the local
network.
3. Hub
Function: A hub is a basic network device that broadcasts data it receives to all
devices connected to it, regardless of the intended recipient. It operates at the
physical layer (Layer 1) of the OSI model.
Use Case : Hubs are used in simple networks where there’s no need for data
filtering or traffic management, although they have largely been replaced by
more efficient switches.
Example: In a small, low-budget network where minimal data traffic control is
needed, a hub can connect several computers, but it’s not ideal for networks
with high traffic due to potential data collisions.

4. Firewall
Function: A firewall is a security device that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. It can be
hardware-based, software-based, or a combination of both.
Use Case : In a corporate environment, a firewall is used to protect sensitive
data by filtering out malicious traffic and preventing unauthorized access to the
internal network.
Example: A company’s network firewall blocks unauthorized access attempts
from the internet while allowing legitimate traffic, thus protecting sensitive
business information.

5. Access Point (AP)


Function : An access point provides wireless connectivity to devices within a
network, extending the network’s coverage. It acts as a bridge between the
wired network and wireless devices.
Use Case : In large buildings or campuses, multiple access points are used to
ensure seamless Wi-Fi coverage, allowing users to move around without losing
connection.
Example : In a university, access points are placed throughout campus
buildings to provide students and staff with reliable Wi-Fi access everywhere.

6. Network Interface Card (NIC)


Function: A NIC is a hardware component that allows a computer or other
device to connect to a network, either through a wired (Ethernet) or wireless
connection.
- Use Case: Every device that needs to connect to a network, like a desktop
computer or server, requires a NIC to interface with the network.
- Example: A desktop computer uses a NIC to connect to the internet via an
Ethernet cable or to a wireless network through a Wi-Fi NIC.

7. Modem
Function: A modem (modulator-demodulator) converts digital data from a
computer into analog signals that can be transmitted over phone lines or cable
systems and vice versa.
Use Case: In homes, modems are commonly used to connect to internet
service providers (ISP) via DSL, cable, or fiber optics.
Example : A cable modem in a household converts the digital data from a
computer into a signal that can be transmitted over a cable TV line, enabling
internet access.

8. Gateway
Function : A gateway is a network device that acts as an entry and exit point
to a network, allowing different networks to communicate with each other,
often performing protocol translation between networks.
Use Case : In an enterprise, a gateway might connect the internal network to
an external network, such as the internet, enabling communication between
systems that use different protocols.
Example: A company might use a gateway to connect its internal network
(using a proprietary protocol) with a cloud service provider's network, enabling
seamless data exchange.
These devices form the backbone of modern networks, each serving specific
roles to ensure efficient communication, security, and connectivity within and
between networks.

### Network Topologies


1. Bus Topology
- Structure : In a bus topology, all devices are connected to a single central
cable, known as the "bus." Data sent by any device travels along the bus to all
other devices, but only the intended recipient processes the data.
- Advantages :
- Simple to install and cost-effective due to minimal cabling.
- Easy to add or remove devices without disrupting the network.
Disadvantages :
- Limited by cable length and the number of devices it can support.
- A single point of failure: if the bus cable fails, the entire network goes down.
Use Case : Small networks or temporary setups where cost is a major factor,
such as a lab or classroom environment.
Example : A small office might use a bus topology to connect a handful of
computers to a single printer and server.

2. Star Topology
Structure: In a star topology, all devices are connected to a central hub or
switch. Data from any device must pass through the hub before reaching its
destination.
Advantages:
- Easy to manage and troubleshoot; if one device or cable fails, the rest of the
network remains unaffected.
- Scalable and easy to expand by adding more devices to the hub.
Disadvantages :
- Dependence on the central hub; if the hub fails, the entire network goes
down.
- Requires more cabling than bus topology, which can increase costs.
Use Case: Commonly used in home networks and small to medium-sized
businesses due to its reliability and ease of maintenance.
Example : A corporate office with multiple departments might use a star
topology, connecting each department’s devices to a central switch for efficient
data management.

3. Ring Topology
Structure : In a ring topology, each device is connected to two other devices,
forming a circular data path. Data travels in one direction (or both directions in
a dual-ring topology) around the ring until it reaches its destination.
Advantages :
- Data flows in an orderly manner, reducing the chances of data collisions.
- Can cover longer distances than a bus topology with repeaters.
Disadvantages :
- A failure in any single device or cable can disrupt the entire network.
- Troubleshooting and maintenance can be challenging, as each device is
linked to the next.
Use Case : Suitable for networks that require a predictable data flow, such as
telecommunications networks or campus environments.
Example : A metropolitan area network (MAN) might use a ring topology to
connect different buildings within a city, ensuring continuous data flow.

4. Mesh Topology
Structure: In a mesh topology, every device is connected to every other device
in the network, creating multiple paths for data to travel. This can be a full
mesh (all devices connected) or a partial mesh (only some devices connected).
Advantages:
- High redundancy and reliability; if one path fails, data can take an alternative
route.
- Enhanced security, as data has multiple paths to travel, making it harder to
intercept.
Disadvantages :
- Expensive and complex to install due to the large amount of cabling and
connections required.
- Difficult to manage and scale as the network grows.
Use Case : Used in critical environments where uptime and reliability are
paramount, such as military communications or financial institutions.
Example : A data center might use a mesh topology to ensure that servers are
highly interconnected, providing multiple failover paths in case of hardware
failure.
5. Tree Topology
Structure : Tree topology is a hierarchical structure that combines
characteristics of both star and bus topologies. Devices are arranged in a tree-
like fashion, with groups of star-configured networks connected to a central
bus.
Advantages :
- Scalable and easy to manage, with clear hierarchical levels.
- Fault isolation is easier; problems can be confined to a particular branch
without affecting the whole network.
Disadvantages:
- If the backbone (central bus) fails, large portions of the network can go
down.
- More complex and costly to install compared to simpler topologies.
- Use Case: Ideal for large organizations with multiple departments or levels,
such as universities or large corporations with a need for structured,
hierarchical networks.
- Example : A university campus might use a tree topology to connect various
departments (each with its own star network) to the main campus network
backbone.
6. Hybrid Topology
- Structure : A hybrid topology is a combination of two or more different
topologies, designed to leverage the strengths of each while minimizing their
weaknesses.
- Advantages :
- Highly flexible and scalable, allowing for tailored solutions to specific
network needs.
- Resilient, as different parts of the network can be isolated and maintained
without affecting the entire system.
Disadvantages :
- Complex and costly to design and implement, as it requires careful planning
to integrate different topologies.
- Troubleshooting can be more challenging due to the diversity of connections
and configurations.
Use Case : Common in large, complex networks such as corporate or
government environments where different departments may require different
topologies.
Example: A large corporation with offices in multiple locations might use a
hybrid topology, combining star, mesh, and tree topologies to ensure
connectivity and reliability across different sites.
These network topologies provide the foundational structure for designing and
implementing networks, each offering specific benefits and challenges based
on the use case and environment.

### OSI Model Explained


The OSI Model (Open Systems Interconnection Model) is a conceptual
framework used to understand and standardize the functions of a network into
seven distinct layers. Each layer performs specific tasks and communicates with
the layers directly above and below it.
1. Physical Layer (Layer 1)
Function: The Physical Layer is responsible for the actual physical connection
between devices. It deals with the transmission and reception of raw data bits
over a physical medium, such as cables, switches, or wireless signals.
Key Components : Cables (Ethernet, fiber optics), switches, network interface
cards (NICs).
Use Case : In a home network, the Ethernet cable connecting your computer
to the router operates at the Physical Layer.
Example : A gigabit Ethernet cable transmits data at high speed between a
computer and a network switch.

2. Data Link Layer (Layer 2)


Function : The Data Link Layer ensures error-free data transfer between two
devices on the same network. It frames data packets, handles error detection
and correction, and manages access to the physical medium.
Sub-layers :
- MAC (Media Access Control) : Controls how devices on the same network
gain access to the physical medium and transmit data.
- LLC (Logical Link Control) : Manages error checking and frame
synchronization.
Key Components : Switches, bridges, MAC addresses.
Use Case : In an office network, switches use MAC addresses to direct data
frames to the correct device.
Example : A network switch directing a data packet to the correct computer
based on its MAC address.

3. Network Layer (Layer 3)


Function : The Network Layer is responsible for routing data between devices
across different networks. It determines the best path for data to travel and
handles logical addressing (IP addressing).
Key Protocols : IP (Internet Protocol), ICMP (Internet Control Message
Protocol), ARP (Address Resolution Protocol).
Use Case : When you access a website, the Network Layer routes your data
from your local network to the internet and back.
Example : Your home router uses IP addresses to route your request for a
webpage to the appropriate server on the internet.

4. Transport Layer (Layer 4)


Function : The Transport Layer ensures reliable data transfer between devices,
providing error detection, data flow control, and retransmission of lost data. It
breaks data into segments and reassembles them at the destination.
Key Protocols : TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
Use Case : When you stream a video, the Transport Layer ensures that data
segments arrive in the correct order without loss or corruption.
Example: TCP is used to establish a connection and ensure that all data packets
for a file download are received correctly.

5. Session Layer (Layer 5)


Function : The Session Layer manages sessions or connections between
applications. It establishes, maintains, and terminates connections, ensuring
that data streams between applications are properly synchronized.
Use Case : In an online gaming session, the Session Layer keeps track of the
connection between your computer and the game server.
Example : A secure banking application uses the Session Layer to maintain an
active and secure connection with the bank's server.

#### 6. Presentation Layer (Layer 6)


Function : The Presentation Layer translates data between the application
layer and the network. It handles data formatting, encryption, and
compression, ensuring that data sent by the application layer of one system is
readable by the application layer of another.
Key Functions : Data translation, encryption/decryption, data compression.
Use Case : When sending an email with attachments, the Presentation Layer
ensures that the attached files are correctly encoded and encrypted.
Example : SSL (Secure Sockets Layer) encrypts data before it is sent over the
network to ensure privacy and security.

7. Application Layer (Layer 7)


Function : The Application Layer provides network services directly to end-
users and applications. It interacts with software applications to implement
communication protocols, like email, file transfer, and web browsing.
Key Protocols : HTTP/HTTPS (Web browsing), FTP (File Transfer Protocol),
SMTP (Simple Mail Transfer Protocol for email).
Use Case : When you access a website, the Application Layer processes your
HTTP request and delivers the webpage content to your browser.
Example : When you send an email using Gmail, the Application Layer handles
the SMTP protocol to send the message to the recipient’s email server.

The OSI Model is essential for understanding how data flows across a network,
providing a clear framework for troubleshooting and designing efficient
communication systems. Each layer plays a specific role, working together to
ensure seamless data transmission between devices and networks.

TCP/IP Model Explained


The TCP/IP Model (Transmission Control Protocol/Internet Protocol Model) is
a more practical and simplified model compared to the OSI Model. It’s the
foundation of the internet and is designed to facilitate communication
between different networks. The TCP/IP model is composed of four layers, each
performing specific functions that correspond to multiple layers of the OSI
model.
1. Network Interface Layer (Link Layer)
Function : The Network Interface Layer (also known as the Link Layer) is
responsible for the physical transmission of data across the network. It handles
how data is physically sent through the network, including hardware
addressing, error detection, and interfacing with the network medium.
Key Components : Network Interface Cards (NICs), Ethernet, Wi-Fi, MAC
addresses.
Use Case : When you connect to a Wi-Fi network, the Network Interface Layer
is responsible for the actual transmission of data between your device and the
router.
Example : An Ethernet cable connected to a router facilitates data transfer
from your computer to the local network.
2. Internet Layer
Function : The Internet Layer is responsible for routing data across different
networks and managing logical addressing (IP addresses). It ensures that data
packets are sent to the correct destination by finding the best path across the
network.
Key Protocols : IP (Internet Protocol), ICMP (Internet Control Message
Protocol), ARP (Address Resolution Protocol).
Use Case : When you visit a website, the Internet Layer routes your data
packets from your local network to the web server across the internet.
Example : Your home router uses the Internet Protocol (IP) to send your
request to the correct website’s server by determining the best path through
the internet.

3. Transport Layer
Function : The Transport Layer ensures reliable data transfer between devices.
It manages end-to-end communication, data flow control, and error checking,
ensuring that data arrives correctly and in the proper order. It also establishes
and maintains connections between devices.
Key Protocols : TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
Use Case : When you download a file, the Transport Layer ensures that all
parts of the file are received in the correct order and that any missing parts are
retransmitted.
Example : TCP is used when streaming a movie online, ensuring that all video
data is received in the correct sequence without errors.

4. Application Layer
Function : The Application Layer is the topmost layer, providing network
services directly to the applications and end-users. It defines the protocols for
data exchange, like web browsing, email, and file transfer, and handles the data
formats and interactions between software applications.
Key Protocols : HTTP/HTTPS (Web browsing), FTP (File Transfer Protocol),
SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System).
Use Case : When you browse the internet, the Application Layer handles your
HTTP/HTTPS requests to load web pages in your browser.
Example : Sending an email through Gmail involves the Application Layer
using the SMTP protocol to deliver your message to the recipient’s email
server.
Comparison with OSI Model
Network Interface Layer : Corresponds to both the Physical and Data Link
layers of the OSI model, handling the physical transmission of data and access
to the network medium.
Internet Layer : Corresponds to the Network layer of the OSI model, focusing
on logical addressing and routing data across networks.
Transport Layer : Directly corresponds to the Transport layer of the OSI model,
ensuring reliable data transfer and connection management.
Application Layer : Combines the functions of the OSI model's Session,
Presentation, and Application layers, managing the interactions between
applications and the network.

The TCP/IP Model is more streamlined than the OSI model, reflecting the real-
world processes involved in internet communication. It’s the standard
framework for most networks today, especially the internet, due to its
simplicity and effectiveness in ensuring reliable data exchange across diverse
networks.

Introduction to Cloud Computing


Cloud Computing is the delivery of computing services—like servers, storage,
databases, networking, software, and more—over the internet ("the cloud").
Instead of owning and maintaining physical data centers and servers,
companies can rent computing power, storage, and applications from a cloud
provider on an as-needed basis.

Key Characteristics :
1. On-Demand Self-Service :
- Users can access computing resources like servers and storage
automatically, without requiring human intervention from the service provider.
- Example : A developer can spin up a virtual server in the cloud in minutes to
run an application.
- Use Case : Startups can quickly deploy applications without waiting for
physical hardware setups.

2. Broad Network Access :


- Cloud services are available over the network and accessed through
standard mechanisms, like a web browser, across various devices (e.g., laptops,
smartphones).
- Example : Accessing your Google Drive files from your phone, tablet, or
computer.
- Use Case : Employees can collaborate on documents from different
locations using cloud-based tools like Google Workspace.

3. Resource Pooling :
- Cloud providers pool computing resources to serve multiple customers using
a multi-tenant model. Resources are dynamically allocated and reallocated
according to demand.
- Example : Multiple businesses can share the same physical servers, but
their data is isolated and secure.
- Use Case : A company can efficiently manage varying workloads without
investing in dedicated infrastructure.
4. Rapid Elasticity :
- Cloud services can scale up or down quickly to meet demand, appearing
unlimited to users and available at any time.
- Example : An e-commerce website can automatically scale its resources to
handle increased traffic during a sale.
- Use Case : Businesses with seasonal spikes in demand can rely on the cloud
to handle increased traffic without over-provisioning resources.

5. Measured Service :
- Cloud systems automatically control and optimize resource use by metering.
This means you only pay for what you use.
- Example : If you use a cloud storage service, you pay based on how much
data you store.
- Use Case : Small businesses can manage costs effectively by paying only for
the storage and computing power they use.

Types of Cloud
1. Public Cloud
Description : A public cloud is owned and operated by a third-party cloud
service provider that delivers computing resources over the internet. These
resources are shared among multiple customers.
Example : Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.
Use Case : Startups and small businesses often use public clouds to avoid the
high upfront costs of hardware and software.

2. Private Cloud
Description: A private cloud is used exclusively by a single organization. It can
be physically located on the company’s on-site data center or hosted by a third-
party provider. The resources are not shared with other organizations.
Example : A company like a bank or a government agency might maintain its
own private cloud for enhanced security and control.
Use Case : Large enterprises with sensitive data (e.g., financial institutions) use
private clouds to maintain control over their infrastructure and data.

3. Hybrid Cloud
Description : A hybrid cloud combines public and private clouds, allowing data
and applications to be shared between them. This setup provides greater
flexibility and more deployment options.
Example : A company might use a private cloud for sensitive operations and a
public cloud for less-critical tasks.
Use Case : Businesses with fluctuating workloads might use a hybrid cloud,
running essential applications in a private cloud and using a public cloud to
handle spikes in demand.

4. Community Cloud
Description : A community cloud is shared by several organizations with similar
computing needs or that belong to a specific community, such as healthcare,
financial services, or government.
Example : Multiple hospitals might share a community cloud to manage
patient records securely and comply with regulations.
Use Case : Organizations with common goals and compliance requirements,
like research institutions, use community clouds to collaborate securely.

Cloud computing enables businesses to be more agile, reduce costs, and focus
on their core activities without worrying about IT infrastructure, making it a
cornerstone of modern digital transformation.

Cloud Service Models


Cloud service models define the different types of services that cloud providers
offer to meet various business needs. The three primary models are IaaS
(Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software
as a Service).
1. Infrastructure as a Service (IaaS)
Definition : IaaS provides virtualized computing resources over the internet,
such as servers, storage, and networking. Users can rent these resources
instead of buying and maintaining physical hardware.
Example :
- Amazon Web Services (AWS) EC2 : Offers virtual servers with customizable
configurations.
- Microsoft Azure Virtual Machines : Allows users to deploy, scale, and
manage virtual machines in the cloud.
Use Case/Applications :
- Scalable Websites : A company can host its website on IaaS, scaling
resources up or down based on traffic demands.
- Disaster Recovery : Businesses can use IaaS to create backups and run
disaster recovery operations without investing in secondary data centers.
- Development and Testing : Developers can quickly create and manage
virtual machines for testing applications without the need for physical
hardware.

2. Platform as a Service (PaaS)


Definition: PaaS provides a platform that includes operating systems,
development tools, database management, and web servers. It allows
developers to build, deploy, and manage applications without worrying about
the underlying infrastructure.
Example :
- Google App Engine : A platform that allows developers to build and deploy
applications without managing the infrastructure.
- Heroku : A cloud platform that supports multiple programming languages
and allows developers to deploy applications easily.
Use Case/Applications :
- Application Development : A startup can use PaaS to quickly develop and
deploy a mobile or web application without managing servers or storage.
- Microservices : Businesses can develop and deploy microservices
architectures using PaaS, allowing for greater flexibility and scalability.
- Automated Deployment : Enterprises can automate the deployment of
applications, improving efficiency and reducing the risk of human error.

3. Software as a Service (SaaS)


Definition : SaaS delivers software applications over the internet, typically on a
subscription basis. Users can access the software through a web browser
without installing or maintaining the software on their devices.
Example :
- Google Workspace : A suite of productivity tools (like Gmail, Google Drive,
and Google Docs) available via the cloud.
- Salesforce : A cloud-based customer relationship management (CRM)
platform.
Use Case/Applications :
- Email Services : Companies use SaaS-based email services like Gmail to
manage their business communications without worrying about mail server
management.
- Customer Relationship Management (CRM) : Sales teams use SaaS CRM
platforms like Salesforce to manage customer interactions, sales, and
marketing efforts.
- Collaboration Tools : Teams use tools like Slack or Microsoft Teams (SaaS
applications) for communication and collaboration across different locations.
These cloud service models allow organizations to choose the level of control
and responsibility they want, helping them to focus on their core business
activities while leveraging the power of cloud computing.

Cloud Deployment Models


Cloud deployment models define the environment in which cloud services are
deployed and accessed. They determine who has access to the cloud resources
and how they are managed. The main cloud deployment models are Public
Cloud, Private Cloud, Hybrid Cloud, and Community Cloud.

1. Public Cloud
Definition : In a public cloud, services and infrastructure are provided over the
internet and shared across multiple organizations. The cloud provider owns and
manages the hardware, software, and other supporting infrastructure.
Example :
- Amazon Web Services (AWS) : Offers a range of cloud services that are
accessible to anyone via the internet.
- Microsoft Azure : Provides a wide variety of cloud computing services
available to the general public.
Use Case :
- Startups and Small Businesses : Use public clouds to access scalable
computing resources without the need for large upfront investments in
hardware.
- Web Hosting : Companies host websites on public cloud platforms to handle
varying levels of web traffic efficiently.

2. Private Cloud
Definition : A private cloud is used exclusively by a single organization. It can
be hosted either on-premises (within the organization’s data center) or by a
third-party provider. It provides greater control and customization compared to
public clouds.
Example :
- VMware vSphere : Often used to create private cloud environments within
an organization's data center.
- Microsoft Azure Stack : Extends Azure services to an on-premises private
cloud environment.
Use Case :
- Regulated Industries : Companies in industries like finance or healthcare use
private clouds to meet strict regulatory requirements and ensure data security.
- Large Enterprises : Organizations with complex IT requirements may use
private clouds to maintain control over their infrastructure and customize it to
meet specific needs.

3. Hybrid Cloud
Definition : A hybrid cloud combines public and private clouds, allowing data
and applications to be shared between them. This model provides greater
flexibility and optimizes the existing infrastructure.
Example :
- Microsoft Azure Hybrid : Combines Azure public cloud services with on-
premises data centers, enabling seamless integration between the two.
- AWS Outposts : Extends AWS infrastructure to on-premises environments,
integrating with the public cloud.
Use Case :
- Dynamic Workloads : Businesses with fluctuating workloads might use
hybrid clouds to scale resources in the public cloud while keeping sensitive data
on a private cloud.
- Disaster Recovery : Organizations use hybrid clouds to maintain backup and
disaster recovery solutions by replicating data between private and public
clouds.

4. Community Cloud
Definition : A community cloud is shared by several organizations with similar
computing needs or compliance requirements. It is managed either by the
organizations themselves or by a third-party provider.
Example :
- Government Community Cloud : Shared by various government agencies to
ensure compliance with specific regulations and standards.
- Healthcare Community Cloud : Used by multiple healthcare providers to
manage patient data securely and comply with healthcare regulations.
Use Case :
- Collaborative Projects : Organizations with common goals, like research
institutions, use community clouds to collaborate on joint projects and share
resources.
- Compliance and Security : Entities with shared compliance requirements use
community clouds to meet regulatory standards and enhance data security.
These deployment models help organizations choose the best approach based
on their specific needs for security, control, and scalability. Each model offers
different levels of management and customization, allowing businesses to
optimize their cloud strategies accordingly.

Key Cloud Providers


1. Amazon Web Services (AWS)
Overview : AWS is one of the largest and most widely used cloud service
providers, offering a comprehensive suite of cloud services, including
computing power, storage, and databases. It supports a broad range of
applications and use cases.
Example :
- Amazon EC2 : Provides scalable virtual servers in the cloud.
- Amazon S3 : Offers scalable object storage for data backup and archiving.

2. Microsoft Azure
Overview : Microsoft Azure is a leading cloud platform that provides a variety
of cloud services including computing, analytics, storage, and networking. It
integrates well with Microsoft’s existing software and enterprise solutions.
Example :
- Azure Virtual Machines : Offers on-demand virtual servers.
- Azure SQL Database : Provides a managed relational database service.

3. Google Cloud Platform (GCP)


Overview : GCP provides a wide range of cloud services including computing,
data storage, and machine learning. It is known for its data analytics and
machine learning capabilities.
Example :
- Google Compute Engine : Provides scalable virtual machines.
- Google BigQuery : A fully managed data warehouse for large-scale data
analysis.

4. IBM Cloud
Overview: IBM Cloud offers a range of cloud services including infrastructure
as a service (IaaS), platform as a service (PaaS), and software as a service
(SaaS). It emphasizes hybrid cloud solutions and enterprise-grade services.
Example :
- IBM Cloud Virtual Servers : Provides scalable virtual servers.
- IBM Cloud Kubernetes Service : Offers managed Kubernetes clusters for
containerized applications.

5. Oracle Cloud
Overview : Oracle Cloud provides a variety of cloud services including IaaS,
PaaS, and SaaS. It is known for its database solutions and enterprise
applications.
Example :
- Oracle Cloud Infrastructure : Offers high-performance computing and
storage services.
- Oracle Autonomous Database : Provides a self-managing database service.

6. Alibaba Cloud
Overview : Alibaba Cloud is a major cloud provider in China and Asia-Pacific,
offering a broad range of cloud services including computing, storage, and big
data solutions.
Example :
- Elastic Compute Service (ECS) : Provides scalable virtual servers.
- ApsaraDB : Offers managed database services.

7. Salesforce
Overview: Salesforce is a leading provider of cloud-based CRM and enterprise
solutions. It focuses on customer relationship management and various
enterprise applications.
Example :
- Salesforce Sales Cloud : Provides tools for sales management and customer
relationship management.
- Salesforce Marketing Cloud : Offers solutions for digital marketing and
customer engagement.

Extra Stuff but Important


VPN (Virtual Private Network) and Cloud Security

VPN (Virtual Private Network)


Definition :
A VPN is a technology that creates a secure, encrypted connection over a less
secure network, such as the internet. It allows users to send and receive data
as if their devices were directly connected to a private network.
Key Points :
1. Encryption :
- Description : VPNs encrypt data transmitted over the network, making it
unreadable to anyone who intercepts it. This ensures that sensitive information
remains confidential.
- Example : A user accessing a company's internal resources over a public Wi-
Fi network with data encrypted by the VPN.
- Use Case : Protecting data privacy when using public or unsecured
networks, such as in coffee shops or airports.

2. Remote Access :
- Description : VPNs enable users to securely access their organization’s
network from remote locations. This is useful for employees working from
home or traveling.
- Example : An employee accessing their office network and files from a
remote location using a VPN connection.
- Use Case : Supporting remote work by providing secure access to company
resources.

3. IP Address Masking :
- Description : VPNs mask a user’s real IP address and assign a new IP address
from the VPN server’s location. This helps protect user identity and location.
- Example : Browsing the internet with an IP address from a different country,
making it harder to track the user's real location.
- Use Case : Enhancing online privacy and circumventing geographic content
restrictions.
4. Secure Communication :
- Description : VPNs ensure that all data transmitted between the user and
the VPN server is secure, protecting against eavesdropping and data theft.
- Example : A business using a VPN to securely communicate sensitive
information between different offices.
- Use Case : Safeguarding business communications and data transfers over
the internet.

5. Access Control :
- Description : VPNs can enforce access control policies, limiting who can
connect to the VPN and access certain resources based on user authentication.
- Example : A company requiring employees to use VPN authentication
before accessing sensitive internal applications.
- Use Case : Controlling and monitoring access to company networks and
resources.
Cloud Security
Definition :
Cloud security involves protecting data, applications, and services hosted in the
cloud from threats and vulnerabilities. It encompasses measures for securing
cloud infrastructure, data, and user access.
Key Points :
1. Data Encryption :
- Description : Encrypting data both at rest (stored data) and in transit (data
being transmitted) ensures that it remains confidential and secure from
unauthorized access.
- Example : Using encryption to protect sensitive customer data stored in a
cloud database.
- Use Case : Securing sensitive information against unauthorized access and
breaches.
2. Identity and Access Management (IAM) :
- Description : IAM involves managing user identities and controlling access
to cloud resources based on roles and permissions. It ensures that only
authorized users can access certain data or services.
- Example : Setting up role-based access controls (RBAC) to restrict access to
sensitive cloud resources based on user roles.
- Use Case : Preventing unauthorized access and ensuring that users have
appropriate permissions for their roles.

3. Compliance and Regulatory Requirements :


- Description : Cloud services must comply with various regulations and
standards, such as GDPR, HIPAA, or SOC 2. Compliance helps ensure that cloud
providers meet industry-specific security and privacy requirements.
- Example : A healthcare organization ensuring that its cloud provider
complies with HIPAA regulations for patient data.
- Use Case : Meeting legal and regulatory requirements for data protection
and privacy.

4. Data Backup and Recovery :


- Description : Regularly backing up data and having disaster recovery plans
in place ensures that data can be restored in case of loss, corruption, or other
issues.
- Example : Implementing automated backups of cloud storage and creating a
disaster recovery plan to quickly restore data after an incident.
- Use Case : Protecting against data loss due to accidental deletion,
corruption, or cyberattacks.

5. Threat Detection and Response :


- Description : Implementing tools and processes to detect, analyze, and
respond to security threats and incidents in the cloud environment helps
prevent and mitigate attacks.
- Example : Using cloud security monitoring tools to detect suspicious
activities and respond to potential security incidents.
- Use Case : Enhancing security by actively monitoring and responding to
threats in real-time.

Both VPNs and cloud security are essential components in safeguarding data
and ensuring secure communication and access. VPNs focus on secure
connections and privacy for individual users, while cloud security addresses
broader concerns related to data protection and infrastructure management in
cloud environments.

Cryptography
Definition :
Cryptography is the practice of securing information by transforming it into an
unreadable format, called ciphertext, so that only authorized parties can
decrypt and read the original data. It involves techniques such as encryption
and decryption to protect data confidentiality, integrity, and authenticity.
Key Concepts :
1. Encryption :
- Description : The process of converting plaintext (readable data) into
ciphertext (encrypted data) using an algorithm and a key.
- Example : Encrypting an email with a recipient's public key so that only the
recipient can decrypt it with their private key.

2. Decryption :
- Description : The process of converting ciphertext back into plaintext using
a decryption key.
- Example : Decrypting a file to access its original content after receiving it
from a secure source.

3. Keys :
- Description : Cryptographic keys are used in encryption and decryption
processes. They can be symmetric (same key for both encryption and
decryption) or asymmetric (different keys for encryption and decryption).
- Example : Symmetric key encryption using AES (Advanced Encryption
Standard) and asymmetric key encryption using RSA (Rivest-Shamir-Adleman).

Cyber Attacks
Definition :
Cyber attacks are deliberate attempts to gain unauthorized access to, disrupt,
or damage computer systems, networks, or data. They are executed by
malicious actors to steal, alter, or destroy information, or to disrupt operations.
Types of Cyber Attacks :
1. Phishing
Description : A type of social engineering attack where attackers
impersonate legitimate organizations or individuals to trick users into providing
sensitive information like passwords or credit card numbers.
Example : An email that appears to be from a bank asking the recipient to
click a link and enter their account details, leading to a fake website designed
to steal login credentials.

2. Malware
- Description : Malicious software designed to harm or exploit a computer
system. Types of malware include viruses, worms, Trojans, ransomware, and
spyware.
- Example : A ransomware attack that encrypts a user’s files and demands
payment for the decryption key.
3. Denial of Service (DoS)
- Description : An attack that aims to make a system, service, or network
unavailable by overwhelming it with traffic. A Distributed Denial of Service
(DDoS) attack uses multiple systems to amplify the attack.
- Example : Flooding a website with excessive traffic, causing it to slow down
or crash, disrupting its availability to legitimate users.

4. Man-in-the-Middle (MitM)
- Description : An attack where an attacker intercepts and potentially alters
communications between two parties without their knowledge.
- Example : Intercepting and altering data transmitted between a user’s
browser and a secure website, such as capturing login credentials or injecting
malicious code.

5. SQL Injection
- Description : An attack where malicious SQL queries are injected into an
application’s input fields to manipulate or access the database in unauthorized
ways.
- Example : An attacker inserting SQL code into a login form to bypass
authentication and access sensitive data in the database.

6. Cross-Site Scripting (XSS)


- Description : An attack where malicious scripts are injected into web pages
viewed by other users, allowing attackers to steal session cookies, deface
websites, or redirect users to malicious sites.
- Example : An attacker injecting a script into a forum post that steals the
session cookies of other users who view the post.
7. Credential Stuffing
- Description : An attack where stolen username-password pairs are used to
gain unauthorized access to accounts on various websites, exploiting the
tendency of users to reuse passwords.
- Example : Using leaked credentials from a data breach to attempt login on
multiple sites, potentially gaining access to accounts with reused passwords.

8. Insider Threats
- Description : Threats originating from within an organization, where
employees or contractors intentionally or unintentionally cause harm to the
organization’s data or systems.
- Example : An employee intentionally stealing sensitive data or accidentally
exposing it due to poor security practices.

Protective Measures :
- Cryptography : Use encryption to protect sensitive data both in transit and at
rest.
- Security Awareness : Educate users about phishing and social engineering
attacks.
- Anti-Malware : Implement anti-malware software to detect and remove
malicious programs.
- Firewalls and Intrusion Detection Systems (IDS) : Use these to monitor and
block malicious traffic and activities.
- Regular Updates : Keep software and systems up to date to fix vulnerabilities
and protect against known exploits.
Understanding cryptography and the various types of cyber attacks can help in
implementing effective security measures to protect information and systems.

Security Providers, Services, and Devices


1. Firewall
Definition : A firewall is a network security device that monitors and controls
incoming and outgoing network traffic based on predetermined security rules.
It acts as a barrier between a trusted internal network and untrusted external
networks.
Services/Devices :
- Hardware Firewalls : Dedicated devices that protect entire networks by
filtering traffic.
- Example : Cisco ASA (Adaptive Security Appliance).
- Software Firewalls : Programs installed on individual devices to protect
them from unauthorized access.
- Example : Windows Defender Firewall.
Use Case : Protecting a corporate network from external threats by blocking
unauthorized access while allowing legitimate traffic.

2. Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)


Definition : IDS monitors network traffic for suspicious activities and potential
threats, while IPS not only detects but also takes action to prevent or block
detected threats.
Services/Devices :
- IDS : Alerts administrators about potential security incidents.
- Example : Snort (an open-source IDS).
- IPS : Automatically takes action to block or mitigate threats.
- Example : Palo Alto Networks Threat Prevention.
Use Case : Identifying and responding to potential intrusions and attacks in
real-time.

3. Unified Threat Management (UTM)


Definition : UTM solutions combine multiple security features and functions
into a single device or service, providing comprehensive protection against
various types of threats.
Services/Devices :
- UTM Appliances : Devices that integrate multiple security features such as
firewalls, IDS/IPS, antivirus, and VPNs.
- Example : Fortinet FortiGate.
- UTM Software : Integrated software solutions offering similar functionality.
- Example : Sophos XG Firewall.
Use Case : Simplifying security management by consolidating multiple
security functions into one solution.

4. Anti-Virus and Anti-Malware Solutions


Definition : Software designed to detect, prevent, and remove malicious
software (malware) from devices and networks.
Services/Devices :
- Anti-Virus Software : Protects against viruses and other malware.
- Example : Norton AntiVirus.
- Anti-Malware Software : Focuses on detecting and removing various types
of malware, including spyware, ransomware, and trojans.
- Example : Malwarebytes.
Use Case : Protecting individual computers and networks from malware
infections and ensuring the integrity of data.

5. Virtual Private Network (VPN)


Definition : A VPN provides a secure, encrypted connection over a less secure
network, such as the internet, enabling secure remote access and protecting
data privacy.
Services/Devices :
- VPN Appliances : Hardware devices that provide VPN services for an entire
network.
- Example : Cisco ASA with VPN.
- VPN Software : Applications or services that provide VPN functionality on
individual devices.
- Example : ExpressVPN.
Use Case : Securing remote access to a corporate network and protecting
data transmitted over public or unsecured networks.

6. Security Information and Event Management (SIEM)


Definition : SIEM solutions aggregate, analyze, and manage security data
from various sources to provide insights into security events and incidents.
Services/Devices :
- SIEM Platforms : Comprehensive systems for collecting and analyzing
security data.
- Example : Splunk Enterprise Security.
- Log Management Tools : Focused on collecting and managing log data for
security analysis.
- Example : LogRhythm.
Use Case : Centralizing security data for monitoring, analysis, and incident
response.

Complete Playlist of Cloud & Network Security Accenture Exam: Click me


All the very best guys !

You might also like