0% found this document useful (0 votes)
15 views4 pages

Cloud Computing Detailed Qna

The document discusses key concepts in cloud computing, including privacy and security measures, the architecture of Windows Azure, and the services offered by AWS. It highlights the roles of cloud computing in various sectors such as social networking, media, CRM, ERP, and healthcare, while also addressing threats and security risks associated with virtual machines. Additionally, it emphasizes the importance of compliance and data protection in cloud environments.

Uploaded by

memes18official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Cloud Computing Detailed Qna

The document discusses key concepts in cloud computing, including privacy and security measures, the architecture of Windows Azure, and the services offered by AWS. It highlights the roles of cloud computing in various sectors such as social networking, media, CRM, ERP, and healthcare, while also addressing threats and security risks associated with virtual machines. Additionally, it emphasizes the importance of compliance and data protection in cloud environments.

Uploaded by

memes18official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cloud Computing Important Questions - Detailed Answers

1. Explain the concept of privacy and privacy impact assessment in cloud security.

Privacy in cloud security ensures that user data stored, processed, or transmitted in the cloud is

secure from unauthorized access, breaches, and misuse.

It focuses on data ownership, access control, data encryption, and compliance with privacy

laws like GDPR, HIPAA, and CCPA. A Privacy Impact Assessment (PIA) is a

process for identifying and mitigating privacy risks in cloud systems. It involves analyzing how

personal data is collected, stored, and shared, and it assesses

potential risks to user privacy. By conducting a PIA, organizations can enhance transparency,

comply with regulations, and build trust with users.

2. Describe the architecture of Windows Azure.

The architecture of Windows Azure consists of multiple layers that support IaaS, PaaS, and SaaS.

The key components are:

1. **Fabric Controller**: Manages physical and virtual resources, handling load balancing and

failover.

2. **Orchestration Layer**: Supports resource allocation and automatic scaling.

3. **Virtualization Layer**: Allows virtual machines to run on physical servers.

4. **Azure Resource Manager (ARM)**: Manages resource deployments using templates.

5. **Data Centers**: Distributed globally, they provide redundancy and disaster recovery.

6. **Networking**: Connects services using Virtual Networks (VNet), Load Balancers, and VPN

gateways.

3. What are AWS? What types of services does it provide?

Amazon Web Services (AWS) is a leading cloud platform offering Infrastructure as a Service (IaaS),

Platform as a Service (PaaS), and Software as a Service (SaaS).


AWS offers services in the following categories:

- **Compute**: EC2, Lambda, Elastic Beanstalk for running applications and VMs.

- **Storage**: S3, EBS, Glacier for storing files, backups, and archives.

- **Database**: RDS, DynamoDB, Redshift for relational and NoSQL databases.

- **Networking**: VPC, Route 53, CloudFront for secure connections and traffic distribution.

- **AI/ML**: SageMaker, Rekognition, Comprehend for AI, image recognition, and NLP.

AWS supports a pay-as-you-go model and provides global availability with 99.9% uptime.

4. Explain the role of cloud computing in social networking.

Cloud computing supports social networking by enabling real-time interactions, data storage, and

scalability. Key roles include:

- **Real-time Updates**: Enables instant likes, comments, and notifications.

- **Storage**: Cloud storage like S3 stores images, videos, and user-generated content.

- **Content Delivery**: Content Delivery Networks (CDNs) deliver content to users globally with

low latency.

- **AI and Personalization**: Cloud-based AI models recommend friends, posts, and ads.

- **Cost Efficiency**: Cloud providers offer a pay-as-you-go model, reducing operational costs

for social platforms.

5. Explain the role of cloud computing in media.

Cloud computing plays a key role in media production, storage, and distribution.

- **Content Production**: Cloud platforms support video editing, rendering, and collaboration.

- **Content Storage**: Services like AWS S3 store large media files like movies and music.

- **Streaming**: Live and on-demand streaming is powered by AWS MediaLive, CloudFront,

and Azure Media Services.

- **Content Delivery**: CDNs distribute media globally with low latency.

- **AI for Media**: Cloud-based AI enables video analysis, content recommendation, and
personalization.

6. Explain the advantages of cloud computing in CRM and ERP.

Cloud computing enhances Customer Relationship Management (CRM) and Enterprise Resource

Planning (ERP) systems in the following ways:

- **On-Demand Access**: CRM and ERP tools can be accessed from anywhere.

- **Cost Reduction**: Reduces the need for on-premises infrastructure.

- **Real-time Analytics**: Provides data-driven insights and customer behavior analysis.

- **Integration**: Cloud CRM/ERP integrates with third-party applications for business

efficiency.

- **Security**: Protects sensitive customer and operational data with encryption and compliance

standards.

7. Explain the role of cloud computing in healthcare analysis.

Cloud computing facilitates healthcare analysis by supporting data storage, processing, and

analytics.

- **Electronic Health Records (EHRs)**: Cloud platforms store and process EHRs for easy

access by healthcare providers.

- **Data Analytics**: Cloud tools analyze patient data to predict disease outbreaks.

- **Telemedicine**: Supports video consultations, allowing remote medical care.

- **Compliance**: Ensures adherence to healthcare regulations like HIPAA.

- **AI and ML**: Cloud-based AI models aid in diagnostics, imaging, and treatment planning.

8. Briefly discuss VMM and VM-based threats.

A Virtual Machine Monitor (VMM) is software that manages and runs multiple VMs on a single

physical host.

**VM-based Threats**:

- **VM Escape**: Malicious software escapes from a VM and attacks the host system.
- **Hyperjacking**: Attackers gain control of the hypervisor to control VMs.

- **Inter-VM Attacks**: One VM attacks another due to weak isolation mechanisms.

To mitigate these threats, VMs should be isolated, patched, and encrypted.

9. With a neat diagram, explain virtual machine security.

Virtual machine (VM) security ensures protection of VMs, hypervisors, and host systems.

Key measures include:

- **Isolation**: Ensures that VMs do not interfere with each other.

- **Encryption**: Encrypts VM files and storage.

- **Access Control**: Restricts user access to VMs.

- **Patching**: Updates VMs and hypervisors to remove vulnerabilities.

10. Briefly discuss the different classes of cloud security risks.

Cloud security risks include:

- **Data Breaches**: Unauthorized access to cloud data.

- **Insider Threats**: Internal users with malicious intent.

- **Insecure APIs**: Vulnerable APIs expose cloud services to attacks.

- **Account Hijacking**: Attacks on user credentials to gain access.

- **Compliance Risks**: Failure to meet regulatory standards like GDPR.

Mitigation involves strong encryption, multi-factor authentication (MFA), and periodic audits.

You might also like