Coaching Class Notes
Coaching Class Notes
UNIT - 1
PART - A (2 Marks)
- On-Demand Provisioning, is the most flexible and scalable cloud computing model that
dynamically allows cloud service providers to allocate resources to the user as needed.
- The resources may be maintained within the user’s enterprise or made available by a cloud
service provider. On-Demand Provisioning is also known as Dynamic Provisioning.
- Hybrid cloud solutions enable us to migrate and manage workloads between these various
cloud environments, allowing to create more versatile setups based on specific business needs.
- Many organizations choose to adopt hybrid cloud platforms to reduce costs, minimize risk
and extend their existing capabilities to support digital transformation efforts.
- Platform as a Service (PaaS) is a type of cloud computing that helps developers to build
applications and services over the Internet by providing them with a platform.
- It includes everything needed to create, deploy, and manage applications, such as servers,
databases, development tools, and operating system software.
- Leading cloud service providers like Amazon Web Services (AWS), Google Cloud, IBM
Cloud, and Microsoft Azure offer their own PaaS solutions.
- Software as a Service (SaaS), commonly known as SaaS, is a software delivery model where
applications are provided to users over the Internet.
- SaaS allows users to connect to and use cloud-based apps without the need for local
installation. Instead of purchasing and maintaining software, you access it via the Internet.
- Some well known SaaS vendor Amazon Web Services (AWS), Microsoft Azure, IONOS,
Slack, Salesforce and Wordpress.
Public cloud infrastructure is offered via web Private cloud infrastructure is dedicated to a
applications and also as web services over Internet single organization.
to the public.
- A cloud deployment model defines the type of cloud environment based on ownership, size,
and access, and it dictates how the cloud services are made available to users. There are several types
of cloud deployment models, each suited for different business needs: - Public Cloud - Private Cloud
- Hybrid Cloud - Multi Cloud - Community Cloud.
- Each model offers different levels of control, flexibility, and management, which can be
chosen based on the specific needs of the business regarding privacy, scalability, and resource
utilization.
- Cost: Cost is an important factor for the cloud deployment model as it tells how much amount
you want to pay for these things.
- Scalability: Scalability tells about the current activity status and how much we can scale it.
- Privacy: Privacy tells about what data you gather for the model.
PART - B (13 Marks)
- NIST stands for National Institute of Standards and Technology. The goal is to achieve
effective and secure cloud computing to reduce cost and improve services.
- Cloud Consumer: A person or an organization that maintains a business relationship with and
uses a services from cloud providers
- Cloud Provider: A person, organization or entity responsible for making a service available
to interested parties
- Cloud auditor: A party that conduct independent assessment of cloud services, information
system operation, performance and security of cloud implementation
- Cloud broker: An entity that manages the performance and delivery of cloud services and
negotiates relationship between cloud provider and consumer.
- Cloud carrier: An intermediary that provides connectivity and transport of cloud services from
cloud providers to consumers.
- A cloud deployment model defines the type of cloud environment based on ownership, size,
and access, and it dictates how the cloud services are made available to users. There are several types
of cloud deployment models, each suited for different business needs: - Public Cloud - Private Cloud
- Hybrid Cloud - Multi Cloud - Community Cloud.
Diagram (Public, Private, Hybrid, Community and Multi Cloud) Advantages & Disadvantages
- Each model offers different levels of control, flexibility, and management, which can be
chosen based on the specific needs of the business regarding privacy, scalability, and resource
utilization.
Right Choice for Cloud Deployment Model :
• Cost: Cost is an important factor for the cloud deployment model as it tells how much amount you
want to pay for these things.
• Scalability: Scalability tells about the current activity status and how much we can scale it.
• Easy to use: It tells how much your resources are trained and how easily can you manage these models.
• Compliance: Compliance tells about the laws and regulations which impact the implementation of the
model.
• Privacy: Privacy tells about what data you gather for the model.
- Cloud Computing helps in rendering several services according to roles, companies, etc.
Cloud computing models are
IaaS :
- With IaaS, you rent access to cloud infrastructure resources from a cloud service provider
(CSP), including: Servers, Networking Resources and Storage.
PaaS :
- Platform as a Service (PaaS) is a type of cloud computing that helps developers to build
applications and services over the Internet by providing them with a platform.
- It includes everything needed to create, deploy, and manage applications, such as servers,
databases, development tools, and operating system software.
- Leading cloud service providers like Amazon Web Services (AWS), Google Cloud, IBM
Cloud, and Microsoft Azure offer their own PaaS solutions.
SaaS :
- Software as a Service (SaaS), commonly known as SaaS, is a software delivery model where
applications are provided to users over the Internet.
- SaaS allows users to connect to and use cloud-based apps without the need for local
installation. Instead of purchasing and maintaining software, you access it via the Internet.
- Some well known SaaS vendor Amazon Web Services (AWS), Microsoft Azure, IONOS,
Slack, Salesforce and Wordpress. - (Advantages & Disadvantages of IaaS, PaaS, SaaS)
4. Explain in details about architecture of cloud computing ?
The cloud architecture is divided into 2 parts i.e. i) Frontend ii) Backend
PART - A (2 Marks)
- A VM (Virtual Machine) is a virtualized instance of a computer that can perform almost all
of the same functions as a computer, including running applications and operating systems.
- Virtual machines run on a physical machine and access computing resources from software
called a hypervisor.
- A cloud virtual machine is the digital version of a physical computer that can run in a cloud.
Like a physical machine, it can run an operating system, store data, connect to networks, and do all
the other computing functions.
- Low cost: It is cheaper to spin off a virtual machine in the clouds than to procure a physical
machine.
- Easy scalability: We can easily scale in or scale out the infrastructure of a cloud virtual
machine based on load.
- Ease of setup and maintenance: Spinning off virtual machines is very easy as compared to
buying actual hardware. This helps us get set up quickly.
Data-integration
Business-integration
Service-oriented architecture data-services
Searching organizational data
- A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs
by virtually sharing its resources, such as memory and processing.
Types of Hypervisor –
- Allocating resources in accordance with traffic engineering rules and Providing information
for provisioning virtual infrastructure orchestration (VIO).
- A System VM provides a complete virtual hardware platform that supports the execution of
an entire operating system (OS). Think of it as a full-fledged virtual computer. Example: VirtualBox.
- A Process VM, also known as an application virtual machine, runs as a normal application
within a host OS. It supports a single process. Example: Java Virtual Machine (JVM).
- Network virtualization helps organizations achieve major advances in speed, agility, and
security by automating and simplifying many of the processes that go into running a data center network
and managing networking and security in the cloud.
- Reduce network provisioning time from weeks to minutes. Achieve greater operational
efficiency by automating manual processes Place and move workloads independently of physical
topology. Improve network security within the data center.
- These techniques are mostly concerned with partial file systems, libraries, and operating
system component emulation.
- Technologies that use application virtualization are hosted applications and packaged
applications.
- Server virtualization is the process of dividing a physical server into multiple unique and
isolated virtual servers by means of a software application.
- Each virtual server can run its own operating systems independently. It’s beneficial in virtual
migration, reducing energy consumption, reducing infrastructural costs, etc.
PART - B (13 Marks)
Types :
Application Virtualization
Network Virtualization
Desktop Virtualization
Storage Virtualization
Server Virtualization
Data virtualization
Data Virtualization: provides a single customer view by combining data from various sources.
Benefits:
Scalability: Cloud computing is highly scalable, Scalability: Virtualization is less scalable than
allowing dynamic resource allocation. cloud computing.
Flexibility: It provides great flexibility for Flexibility: It is less flexible than cloud
deploying and managing applications. computing.
Workload State: Workloads in cloud computing Workload State: Workloads in virtualization are
are typically stateless. stateful.
Cost: The total cost of cloud computing tends to Cost: The total cost of virtualization is lower than
be higher due to its extensive features. cloud computing.
Storage: Cloud computing offers unlimited Storage: Storage space depends on the physical
storage space. server capacity.
- A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs
by virtually sharing its resources, such as memory and processing.
Types of Hypervisor –
Type 1 Type 2
PART - A (2 Marks)
- The guest can share the same network interface of the host and use NAT.
- The VM manager can emulate and install on the host together with the driver.
- Desktop Virtualization provide a same outcome of H/W Virtualization but serve a different
purpose.
- A Pod is a Kubernetes abstraction that represents a group of one or more application containers
and some shared resources for those containers.
- A Node is a worker machine in Kubernetes and may be either a virtual or a physical machine,
depending on the cluster. Each Node is managed by the Master.
4. What is VDI?
- VDI – Virtual Desktop Infrastructure VDI uses VM to provide and manage virtual desktop
- VDI hosts desktop environments on a server and deploy them to end-users on request.
- SAN (Storage Area Network) security, high-speed data transfer, centralized back-up.
- Maintain all open N/W connection without relying on forwarding mechanism on the original
host.
- To enable remote system with VM, each VM must be assigned a virtual IP address known to
other entities.
- Types: i) Full Virtualization, ii) Emulation Virtualization and iii) Para Virtualization
8. Define hypervisor
- A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs
by virtually sharing its resources, such as memory and processing.
Types of Hypervisor –
- Operating system-level virtualization offers the opportunity to create different and separated
execution environments for applications that are managed concurrently.
Memory Migration
File System Migration
Network Migration
Docker is a powerful tool for containerization, allowing developers to package applications and
their dependencies into lightweight, portable containers.
- Docker Engine - Docker Client - Docker Daemon - Docker Image
- Virtual clusters are fully functional Kubernetes clusters that operate within a namespace of
another Kubernetes cluster. The cluster in which the virtual cluster resides is often referred to as the
“host” or “parent” cluster.
- Virtual clusters consist of VMs distributed across multiple physical clusters. These VMs are
interconnected logically via a virtual network. The provisioning of VMs to virtual clusters is done
dynamically, promoting server utilization and application flexibility.
ii) RDS (Remote Desktop Services) RDS allows users to remotely access Windows desktop
sessions via a shared virtual machine. Multiple users work on the same VM, reducing hardware
utilization.
iii) DaaS (Desktop-as-a-Service) DaaS delivers virtual desktops from the cloud. Users access
their desktop environments over the internet. It’s a flexible solution, especially for businesses seeking
scalability and simplified management.
- Containers are lightweight packages of software that contain all the necessary elements to run
in any environment. They virtualize the operating system, allowing applications to run consistently from
a private data center to the public cloud or even on a developer’s personal laptop.
Advantages:
PART - A (2 Marks)
1. Define GAE?
- It enables users to run their applications on a large number of data centers associated with
Google’s search engine operations.
- OpenStack is a powerful open-source cloud computing platform that enables the creation and
management of cloud infrastructure for both public and private clouds.
- Key services - Compute, identity, networking image, block storage, Object storage, telemetry,
orchestration and DB services.
- AWS (Amazon Web Services) Amazon Web Services ecosystem is a cloud computing service
that makes it easy to build scalable and reliable applications, websites, and services.
- It makes it easy for businesses to develop, deploy and extend their software, as well as store
data.
- Amazon Elastic Compute Cloud (Amazon EC2) is a cloud-based web service that offers a
secure and scalable computing capacity.
- It allows organizations to customize virtual compute capacity in the cloud, with the flexibility
to choose from a range of operating systems and resource configurations such as CPU, memory, and
storage.
- Amazon DynamoDB is a NoSQL database service that offers fast and flexible storage for
applications requiring consistent, low-latency access at any scale.
- It's fully managed and supports both document and key-value data models.
- Azure is a cloud platform developed by Microsoft, similar to Google Cloud and Amazon Web
Services (AWS). It provides access to Microsoft's resources, such as virtual machines, analytical and
monitoring tools, and fast data processing.
- Azure is a cost-effective platform with simple pricing based on the "Pay As You Go" model,
which means the user only pay for the resources the user use.
ii) System mode, which assigns a MAC address and connects the instance's network interface
to the physical network via NC.
- Amazon Web Services (AWS) is a comprehensive cloud computing platform that offers a
wide range of services to help businesses and developers build, deploy, and manage applications and
infrastructure.
- Compute Services: Amazon EC2 (Elastic Compute Cloud): Provides virtual servers for
building, deploying, and scaling applications. AWS Lambda: Allows running code without managing
servers (serverless computing).
- Storage: Amazon S3 (Simple Storage Service): Web data storage for archiving data. Amazon
EBS (Elastic Block Store): Persistent block storage volumes for EC2 instances.
- Databases: Amazon RDS (Relational Database Service): Cost-efficient, secure, and scalable
relational databases. Amazon DynamoDB: Fully managed NoSQL database.
- Networking and Content Delivery: Amazon VPC (Virtual Private Cloud): Isolated network
environments. Amazon CloudFront: Content delivery network (CDN) for faster content distribution.
- Machine Learning and AI: Amazon SageMaker: Managed machine learning service.
Amazon Rekognition: Image and video analysis. Amazon Polly: Text-to-speech service.
- Analytics and Big Data: Amazon Redshift: Data warehousing. Amazon EMR (Elastic
MapReduce): Big data processing. Amazon Kinesis: Real-time data streaming.
- Security and Compliance: AWS Identity and Access Management (IAM): User access
control. AWS Key Management Service (KMS): Encryption key management. AWS Shield: DDoS
protection.
- IoT (Internet of Things): AWS IoT Core: Connects devices to the cloud. AWS Greengrass:
Edge computing for IoT devices.
- Serverless and Containers: AWS Fargate: Serverless container management. AWS Step
Functions: Workflow automation.
- Eucalyptus Command Line Interfaces (CLIS) have the capability to manage both Amazon
Web Services and private instances.
- Components of Eucalyptus:
- GAE Architecture: GFS is used for storing large amounts of data. MapReduce is for use in
application program development. Chubby is used for distributed application lock services. BigTable
offers a storage service for accessing structured data.
- Users can interact with Google applications via the web interface provided by each application.
- Third-party application providers can use GAE to build cloud applications for providing services.
- Features
Language Support
Flexibility
Diagnostics
Traffic Splitting
Security
Flexible Environment
- MS Azure is a cloud platform developed by Microsoft, similar to Google Cloud and Amazon
Web Services (AWS). It provides access to Microsoft's resources, such as virtual machines, analytical
and monitoring tools, and fast data processing.
- MS Azure is a cost-effective platform with simple pricing based on the "Pay As You Go"
model, which means the user only pay for the resources the user use.
- Platform as a Service (PaaS): Developers can build and deploy applications without managing
the underlying infrastructure.
PART - A (2 Marks)
- Virtualization Attacks One of the top cloud computing threats involves one of its core enabling
technologies: virtualization.
- In virtual environments, the attacker can take control of virtual machines installed by
compromising the lower layer hypervisor.
- Virtualization introduces serious threats to service delivery such as Denial of Service (DoS)
attacks, Cross-VM Cache Side Channel attacks, Hypervisor Escape and Hyper-jacking.
- One of the most sophisticated forms of attack is the cross-VM cache side channel attack that
exploits shared cache memory between VMs.
3. What is guesthopping?
- Guest-hopping attack: In this type of attack, an attacker will try to get access to one virtual
machine by penetrating another virtual machine hosted in the same hardware.
- One of the possible mitigations of guest hopping attack is the Forensics and VM debugging
tools to observe the security of cloud.
- Hyperjacking is an attack in which a hacker takes malicious control over the hypervisor that
creates the virtual environment within a virtual machine (VM) host.
- Hyperjacking is an attack in which an adversary takes malicious control over the hypervisor
that creates the virtual environment within a virtual machine (VM) host.
- Cloud data security is the practice of protecting data and other digital information assets from
security threats, human error, and insider threats. It leverages technology, policies, and processes to
keep your data confidential and still accessible to those who need it in cloud-based environments
- Detection - Response
- There are three main cloud storage types: object storage, file storage, and block storage. Each
offers its own advantages and has its own use cases.
9. What are the four principles of data security?
- There are many basic principles to protect data in information security. The primary principles
are confidentiality, integrity, accountability, availability, least privilege, separation of privilege, and
least common mechanisms. The most common security principle is CIA triad with accountability.
- Identity and access management (IAM) ensures that the right people and job roles in your
organization (identities) can access the tools they need to do their jobs. Identity management and access
systems enable your organization to manage employee apps without logging into each app as an
administrator.
- Identity and Access Management (IAM), A principal of IAM is a human user or workload
that can make a request for an action or operation on an AWS resource. After authentication, the
principal can be granted either permanent or temporary credentials to make requests to AWS, depending
on the principal type.
- A virtual migration attack is a cybersecurity threat that targets the virtualization layer in cloud
computing environments.
Types of Virtual Migration Attacks:
- VM Migration Attacks: These attacks exploit vulnerabilities during the migration process of
VMs. Migration serves various purposes, including power management, load balancing, fault tolerance,
and system maintenance.
Mitigation Strategies:
- Identity and access management (IAM) ensures that the right people and job roles in your
organization (identities) can access the tools they need to do their jobs. Identity management and access
systems enable your organization to manage employee apps without logging into each app as an
administrator.
Components of IAM:
- IAM Roles: Used for granting permissions to AWS services or external entities.
- Cloud data security presents several challenges that organizations must address to protect their
sensitive information.
Challenge: As organizations adopt microservices and deploy workloads in the cloud, the attack
surface can expand significantly. Each workload adds to this surface, potentially exposing infrastructure
in ways that might not be immediately apparent
Challenge: According to Gartner, 99% of all cloud security failures through 2025 will be due
to some level of human error. Mistakes during configuration, mismanagement of permissions, or
accidental exposure of sensitive data can lead to security breaches.
iii) Misconfiguration:
Challenge: Improperly configured cloud resources can leave data open and unprotected.
Misconfigurations may occur due to lack of expertise, haste, or oversight.
Challenge: Traditional data center security models do not directly translate to the cloud.
Organizations often lack a comprehensive cloud security strategy.
Challenge: Maintaining control over data security becomes more challenging due to dynamic
provisioning and de-provisioning of cloud resources.
Challenge: Managing user identities, permissions, and access across multiple cloud services
can be complex.
Challenge: Employees may use unauthorized cloud services or applications without IT’s
knowledge. This can lead to unsecured data and compliance issues.
- A threat is an attack against your cloud assets that tries to exploit a risk. Four common threats
faced by cloud security: i) Traffic Eavesdropping: it occurs when a user connects to a network in
which traffic is not secured or encrypted and sends sensitive business data to a colleague.
ii) Malicious Intermediary: It arises when messages are intercepted and altered by a malicious service
agent. The confidentiality and/or integrity of the message are hereby compromised.
iii) DoS (Denial of Service): is a type of cyber attack designed to disable, shut down or disrupt a
network, website or service.
iv) Insufficient Authorization: when an application does not perform adequate authorization checks
to ensure that the user is performing a function or accessing data in a manner consistent with the
security policy.