Cloud Computing Unit II Important Question
- Why Cloud Computing brings new threats?
- Define Security Governance.
- Define Security Governance.
- Define Data Security.
- What is Denial-of-Service attack?
- Explain in detail about Software-as-a-service security.
- Explain the fundamental function of identify management and access control, which are required for secure cloud computing?
- What are the risks associated with cloud? Explain risks from multi-tenancy, with respect to various cloud environments?
- What are the layers in security architecture design?
- Explain in detail about Software-as-a-Service security.
- Explain Identity Access Management (IAM) in detail.
- What are the layers in security architecture design?
- Explain in detail about Software-as-a-Service security.
- Explain Identity Access Management (IAM) in detail.
- What is the security threats associated with cloud computing model?
- Explain Security Architecture design in detail.
- Explain third party authentication using the Oauth protocol. What is open Id?
- What is the security threats associated with cloud computing model?
- What is an Identity Access Management System? Draw and explain the diagram Life Cycle. Authentication and Authorization.
- Explain third party authentication using the Oauth protocol. What is OpenId?