Page 1585 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1585

Chapter 9: Security Vulnerabilities, Threats,

               and Countermeasures




                1.  The three standard cloud-based X-as-a-service options are
                    platform as a service (PaaS), software as a service (SaaS), and

                    infrastructure as a service (IaaS). PaaS is the concept of providing
                    a computing platform and software solution stack as a virtual or
                    cloud-based service. Essentially, this type of cloud solution
                    provides all the aspects of a platform (that is, the operating system
                    and complete solution package). The primary attraction of PaaS is
                    the avoidance of having to purchase and maintain high-end

                    hardware and software locally. SaaS is a derivative of PaaS. SaaS
                    provides on-demand online access to specific software applications
                    or suites without the need for local installation. In many cases,
                    there are few local hardware and OS limitations. SaaS can be
                    implemented as a subscription, a pay-as-you-go service, or a free
                    service. IaaS takes the PaaS model yet another step forward and
                    provides not just on-demand operating solutions but complete

                    outsourcing options. This can include utility or metered computing
                    services, administrative task automation, dynamic scaling,
                    virtualization services, policy implementation and management
                    services, and managed/filtered internet connectivity. Ultimately,
                    IaaS allows an enterprise to scale up new software or data-based
                    services/solutions through cloud systems quickly and without

                    having to install massive hardware locally.

                2.  The four security modes are dedicated, system high,
                    compartmented, and multilevel.

                3.  The three pairs of aspects or features used to describe storage are
                    primary vs. secondary, volatile vs. nonvolatile, and random vs.
                    sequential.

                4.  Some vulnerabilities found in distributed architecture include

                    sensitive data found on desktops/terminals/notebooks, lack of
                    security understanding among users, greater risk of physical
   1580   1581   1582   1583   1584   1585   1586   1587   1588   1589   1590