Professional Documents
Culture Documents
CC Unit 4
CC Unit 4
CC Unit 4
,
user authentication in the context of cloud computing., X.509 certificate, and how is it used in PKI,
concept of data governance in cloud computing., OpenSSL contribute to the management of
cryptographic keys and certificates in the cloud, advantages of Google App Engine, features of Cloud and
Grid Platforms. Block ciphers, and how do they work, symmetric key differ from a public key in
cryptography, Server Virtualization, Desktop Virtualization.
• Enhanced Security:
• MFA adds an additional layer of security beyond passwords, requiring users to provide multiple
forms of identification, such as something they know (password) and something they have
(token or biometric).
• Even if a password is compromised, an attacker would still need the additional factor to gain
access, significantly reducing the risk of unauthorized entry.
• Compliance Requirements:
• Many regulatory standards and compliance frameworks mandate the use of MFA to enhance
security measures.
• Symmetric Cryptography:
• Uses a single secret key for both encryption and decryption. It is fast and efficient for large data
sets but requires secure key distribution.
• Public-Key Cryptography:
• Involves a pair of public and private keys. The public key is used for encryption, and the private
key is used for decryption. It addresses the key distribution challenge but is computationally
more intensive.
• Enables users to log in once and access multiple applications without re-entering credentials.
• X.509 Certificate:
• A standard defining the format of public-key certificates. It includes information about the
certificate holder and the digital signature of the certificate authority.
• PKI:
• A framework that manages the creation, distribution, and revocation of digital certificates. X.509
certificates play a key role in PKI, ensuring the authenticity of public keys.
Clearly defining who owns the data and establishing stewardship responsibilities.
• Access Controls:
Adhering to legal and industry-specific regulations related to data handling and storage.
• OpenSSL:
An open-source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols. It is widely used for key and certificate management.
• Functionality:
OpenSSL provides tools for generating key pairs, creating and verifying digital signatures,
managing certificates, and implementing cryptographic algorithms.
• Automatic Scaling:
• App Engine automatically scales based on demand, handling traffic spikes and minimizing
downtime.
• Managed Infrastructure:
• Integrated Services:
• Offers integrated services such as databases, storage, and machine learning, streamlining
application development.
• Grid Platforms:
• Research and Scientific Computing: Often used for complex calculations in scientific research.
• Block Ciphers:
• Encrypt data in fixed-size blocks (e.g., 64 or 128 bits) using a symmetric key.
• Operation Modes:
• Block ciphers use different modes (e.g., Electronic Codebook (ECB), Cipher Block Chaining (CBC))
to apply the encryption algorithm to plaintext.
• Symmetric Key:
• Public Key:
• Server Virtualization:
• Hypervisor: Software that enables multiple virtual machines to run on a single physical server.
• Desktop Virtualization:
• Virtual Desktop Infrastructure (VDI): Hosted desktop environments delivered to users over the
network.