CC VIVA DOC
CC VIVA DOC
Computing in point format, covering all the topics you mentioned. The content is
designed to be easy to understand and fits within the ~2000-word range.
● Influenced by:
○ Web 2.0 – increased demand for scalable web apps and services.
💡 2. Basic Concepts and Terminology
● Cloud Computing: Using the internet to access computing resources
(storage, servers, applications) on demand.
● Broad Network Access: Services are accessible via the internet from any
device.
Boundaries:
2. Private Cloud
3. Hybrid Cloud
4. Community Cloud
Distributed Computing
Difference:
Benefits:
● Resource optimization.
2. Para-Virtualization
● Example: Xen.
● Example: Docker.
4. Hardware-Assisted Virtualization
✅ Summary Table
Topic Key Points
● Benefits:
○ Cost-effective.
○ Easy to scale.
● Drawbacks:
2. Private Cloud
● Benefits:
● Drawbacks:
3. Hybrid Cloud
● Use Case: Sensitive data on private cloud, less critical apps on public
cloud.
● Benefits:
4. Community Cloud
● Benefits:
● Drawbacks:
○ Limited availability.
● Supports IaaS.
● Used by NASA, PayPal, Walmart.
2. Eucalyptus
3. CloudStack
4. OpenNebula
● Not a full cloud platform but crucial for container orchestration in cloud
environments.
2. Scripted Deployment
● Ensures repeatability.
4. Containerization
○ AWS CloudFormation
7. Blue-Green Deployment
8. Canary Deployment
● Minimizes risk.
✅ Summary Table
Section Key Points
2. Edge Computing
3. Serverless Architecture
6. Sustainability
2. Access Control
3. Patch Management
4. Host-Based Firewalls
● Use tools like AWS CloudWatch, Azure Monitor, and SIEM systems.
● Keep logs for audits and threat detection.
4. Containers
5. Databases
3. DevSecOps Integration
4. Secrets Management
● Store passwords and API keys securely (e.g., AWS Secrets Manager,
HashiCorp Vault).
🧾 Summary Table
Topic Key Concepts
2. Data Loss
4. Vendor Lock-In
5. Lack of Visibility
● Users don’t fully see or control how their data is managed in third-party
environments.
6. Misconfiguration
8. Insider Threats
○ Breach recovery.
○ Incident response.
○ Legal services.
● Indirect Costs:
○ Customer churn.
● Preventive Costs:
● Methods:
● Example: Developer can deploy apps but not access billing info.
🔹 3. Accounting (What did you do?)
● Tracks user actions, logins, changes, and accesses.
● Requires:
○ Data encryption.
○ Right to be forgotten.
● Requires:
○ Access controls.
○ Audit logs.
● Requires:
○ Secure storage.
○ Access restrictions.
○ Vulnerability scans and audits.
5. ISO/IEC 27001
3. Email Security
5. Antivirus / Antimalware
🔹 Advantages of SECaaS
● Lower cost compared to traditional security systems.
● Easily scalable.
🔹 Challenges of SECaaS
● Dependence on third-party security providers.