Professional Documents
Culture Documents
Unit 3 English
Unit 3 English
UNIT - III
2) Identity and access :- Checking the identity and then allow them to
access.
DR – Disaster Recovery
BC - Business Continuity
It is a not-for-profit association.
Sending data
Receiving data
Stored data
1. Access control
2. Auditing
3. Authentication
4. Authorization
6
Broker :
Proxy :
No access to storage
Full access to client and broker
7
Working :
1) Client wants data.
2) Proxy to broker.
3) Broker to Cloud storage.
4) Cloud storage to Broker.
5) Broker to Proxy.
6) Client receives data.
Cloud storage with encrypted keys :-
8
Working :
1) Client wants data.
2) Proxy to broker.
3) Key 1 match
4) Broker to Cloud storage.
5) Key 2
6) Cloud storage to Broker.
7) Broker to Proxy.
8) Client receives data.
9
Storage Location :
Data is stored in
Tenancy :
10
Single Tenancy :
Multiple Tenancy :
Same Application and Separate Database.
Encryption :-
Definition :-
Uses of Encryption:-
Types of Encryption :
1. Symmetric Algorithm
2. Asymmetric Algorithm
1. Symmetric Algorithm :
12
Decryption Key
2. Asymmetric Algorithm :
Decryption Key
1) Data protection :-
Data protection of
2) User authentication :-
14
3) Portability :-
change.
4) Interoperability :-
5) Contingency planning :-
a disaster
2) Regulatory policy
3) Advisory policy
4) Informative policy
Definition :-
o Virtual Machine ( VM )
o Hypervisor
Virtualization Types :
3) Guest Administrator
Virtual Threats
18
Definition :-
Threats which are unique to virtual machines are called as Virtual
Threats.
2) Keystroke logging