Professional Documents
Culture Documents
– Limited by physical
machine
capabilities.
– adding more memory
(RAM),
more powerful processors
(CPUs), or faster storage
– For ex. If a host machine
has 8 CPU units and 64 GB
of RAM, a VM inside this
host cannot size over those
numbers with the real power
of computing resources.
Scalability and Elasticity
• Scaling-Out
• Key points
– Confidentiality, integrity, authenticity and availability are
associated with measuring security.
• Basic terms
– Confidentiality something made accessible to only authorized
parties
– Integrity not altered by an unauthorized party.
– Availability always being accessible and usable.
– Threat A potential security violation that can challenge
defenses.
– Vulnerability a weakness that can be exploited to attack on a
system.
How security policies and security mechanisms are used to counter threats,
vulnerabilities, and risks caused by threat agents.
Cloud Information Security
AWS is responsible for protecting the infrastructure that runs all the services
offered in the AWS Cloud.