Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Month: May 2021

Cloud Computing – Compute, Network, Storage

May 16, 2021May 15, 2021 by admin

Cloud computing introduces new and different economic, operational, and business models. It doesn’t, however, change the fundamentals of technology or security. Although standardization and automation drive revolutionary change in those three domains, fundamentally, cloud computing still delivers compute, storage, and networking services. Compute Services Compute services combine computing processing unit (CPU), memory, and ephemeral storage…

Read More

QuickGuide: Amazon Kinesis Setup

May 15, 2021May 29, 2021 by admin

Learn how to setup Kinesis data and delivery streams on a Linux instance

Read More

QuickGuide: Amazon CloudWatch Setup

May 15, 2021May 26, 2021 by admin

Learn how to install Amazon CloudWatch on a Linux EC2 instance on AWS

Read More

Cloud Computing Characteristics

May 15, 2021May 15, 2021 by admin

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. The following essential characteristics of cloud are sort of a rule book, or a set of laws when identifying cloud…

Read More

Cloud Service Capabilities

May 14, 2021May 15, 2021 by admin

ISO/IEC 17788 defines cloud capability types as a classification of the functionality provided by a cloud service provider to the cloud service customer, based on the resources used. There are three different cloud capability types: Software capabilities Platform capabilities Infrastructure capabilities Software Capabilities The benefits of leveraging software capabilities via cloud computing are multifold. Clients…

Read More

Cloud Computing Activities

May 14, 2021May 15, 2021 by admin

With traditional computing and technology environments, there are several activities that are essential for creating, designing, implementing, testing, auditing, and maintaining the relevant assets. ISO/IEC 17789 links cloud computing activities to traditional technology environment activities by sub-role activities. A cloud service customer’s activities include: Use cloud service activity: Use the services of a cloud service…

Read More

The Birth of Cloud Computing

May 14, 2021May 15, 2021 by admin

Although cloud computing drastically changes some of the traditional norms associated with information technology, most of the underlying technology and security basics remain the same. The below listed NIST definition is the most commonly and globally utilized, cited by professionals and others alike to clarify what the term “cloud” means. “Cloud computing is a model…

Read More

Intrusion Kill Chain Framework by Lockheed Martin

May 10, 2021May 15, 2021 by admin

The “intrusion kill chain” framework is an analytical tool introduced by Lockheed Martin security researchers in 2011. It is also sometimes referred to as the “Cyber Kill Chain”. It is an intelligence- driven, threat-focused approach to study intrusions from the adversaries’ perspective that could give network defenders the upper hand in fighting cyber attackers. So, what is…

Read More

Revisiting the Target breach of 2013

May 10, 2021May 15, 2021 by admin

Between November 27 and December 18, 2013, the Target Corporation’s network was breached. 40 million credit and debit card numbers and 70 million records of personal information were stolen. The ordeal cost credit card unions over two hundred million dollars for just reissuing cards. Six months prior to the breach, Target deployed a well-known and…

Read More

Quantum Cryptography

May 9, 2021May 13, 2021 by admin

The first time I stumbled upon the concept of Quantum Cryptography was in the Computer Networks book in my third year of engineering. I immediately found it fascinating and wondered if we would ever come to a point where it wouldn’t just be theoretical – Applied Quantum Cryptography, imagine the possibilities! So, what is Quantum…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2026 Cloud Gal 42 | Powered by WordPress and Superb Themes!