0% found this document useful (0 votes)
119 views8 pages

Two Mark Question With Answers

The document outlines key concepts in cloud security, including five essential security services: confidentiality, integrity, authentication, nonrepudiation, and access control. It discusses types of cryptography, hash functions, digital signatures, and compares cloud security with traditional network security. Additionally, it covers topics like geotagging, burst triggers, and secure cloud interfaces, emphasizing their importance in maintaining data security and compliance.

Uploaded by

Flora Mary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views8 pages

Two Mark Question With Answers

The document outlines key concepts in cloud security, including five essential security services: confidentiality, integrity, authentication, nonrepudiation, and access control. It discusses types of cryptography, hash functions, digital signatures, and compares cloud security with traditional network security. Additionally, it covers topics like geotagging, burst triggers, and secure cloud interfaces, emphasizing their importance in maintaining data security and compliance.

Uploaded by

Flora Mary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

TWO MARK QUESTION WITH ANSWERS

SUBJECT: CCS362 SECURITY AND PRIVACY IN CLOUD


Unit 1

1. What are the five security services provided by cloud computing?


Ans. : The five security services provided by cloud computing are confidentiality, integrity,
authentication, nonrepudiation and access control.
• Confidentiality ensures that data is only accessible to authorized users.
• Integrity ensures that data is not modified without authorization.
• Authentication ensures that users are who they say they are.
• Nonrepudiation ensures that users cannot deny sending or receiving data.
• Access control ensures that users only have access to the data and resources they need.

2. What are the two main types of cryptography?


Ans. : The two main types of cryptography are conventional cryptography and public - key
cryptography.
• Conventional cryptography uses a single key to encrypt and decrypt data.
• Public - key cryptography uses two keys, a public key and a private key. The public key is
used to encrypt data and the private key is used to decrypt it.

3. What are hash functions and how are they used in cloud security?
Ans. : Hash functions are used to create a unique digital fingerprint of data. This fingerprint
can be used to verify the integrity of data, to detect unauthorized modifications and to create
digital signatures.

4. What are digital signatures and how are they used in cloud security?
Ans. : Digital signatures : Digital signatures are cryptographic techniques used to ensure the
authenticity and integrity of digital documents or messages. A digital signature is created
using the sender's private key and it can be verified using the corresponding public key. It
provides a way to prove the authenticity of the sender and detect any tampering or
modifications to the signed data.
Digital signatures are commonly used for non - repudiation purposes.
5. Compare cloud security vs traditional network security.
Aspects
Cloud security
Tradition network security
Infrastructure location
Hosted and managed by third
On-premises
infrastructure
- party cloud service provider
controlled by the organization
Responsibility
Shared responsibility model
Full responsibility rests with the
organization
Scalability
Highly scalable and flexible
Scalability may be limited by
hardware constraints
Control and visibility
Limited control and visibility
Full control and visibility over
over the underlying the network infrastructure
infrastructure

6. Define nonrepudiation.
Ans.: Nonrepudiation is a crucial security service in cloud computing that ensures the
integrity and authenticity of digital transactions, preventing the involved parties from
denying their participation or the validity of the transaction. It provides evidence to prove
that a specific action or communication took place and that the parties involved cannot later
deny their involvement.

7. Differentiate symmetric - key cryptography and asymmetric - key cryptography


Aspects
Symmetric - key cryptography
Asymmetric - key cryptography
Key management
Requires a single shared secret
Utilizes a pair of key known to both the sender mathematically related keys: a
and receiver.
public key and a private key.
The public key is freely distributed, while the private key is kept secret.
Encryption / decryption
Same key is used for both
Encryption is performed using
encryption and decryption
the recipient's public key,
processes.
while
decryption
is
done
using the recipient's private
key.
Speed
Generally faster due to
Slower compared to symmetric -
simpler algorithms and
key cryptography due to more
shorter key lengths.
complex algorithms and longer
key lengths.

6. List some of the advantages of geotags in cloud security.


Ans. :
• Enhanced access control: Geotags can be used to enforce location - based access controls,
allowing organizations to restrict access to cloud resources based on the user's geographic
location.
• Compliance with data localization regulations: Geotags can assist organizations in
complying with data localization regulations that require certain types of data to be stored
or processed within specific geographic boundaries.
• Location - based threat detection : Geotags can be utilized in security analytics and
monitoring to detect anomalies or threats originating from specific geographic regions.
• Incident response and forensics : Geotags provide valuable information during incident
response and forensic investigations.
7. Define geotagging.
Ans.: Geotagging in the context of cloud security refers to the process of associating
geographical information with data or resources stored or processed in the cloud. It involves
adding metadata or tags that indicate the geographic location or region associated with
specific data or resources.
8. What is meant by burst trigger?
Ans.: When the resource monitoring identifies a surge in demand or workload spike, a burst
trigger is initiated. This trigger can be based on predefined thresholds or rules set by the
organization, such as CPU
utilization exceeding a certain percentage or queue lengths reaching a specific threshold.
9. Why we need geotags in cloud security?
Ans. : Geotags can provide extensions to trusted cloud resource pools, allowing pooling of
hardware at provision time in the same geolocation. Trusted cloud resource pools meet the
requirements for workloads to be handled by secure VMs, including entering or leaving certain
geographic regions
.
10. Define secure cloud interfaces.
Ans.: Secure cloud interfaces refer to the mechanisms and protocols used to ensure the
secure and reliable communication between users or client applications and cloud-based
services. These interfaces enable users to interact with cloud resources, such as storage,
computing power, or applications, while maintaining data privacy, integrity and availability.
CCS362 SPC Notes Unit 5.pdf

CS 104
54 views

Solution Available

CCS362 SPC Notes Unit 1.pdf

CS 104
276 views

Solution Available
4-4 Activity- Firewall and Access Control Quiz.docx

CYB 220
1k+ views

Solution Available

CYB_300_Milestone_Two_Checklist_Part_1_Charles_Lang.docx

CYB 300
1k+ views

Solution Available
4-4 Activity- Firewall and Access Control.pdf

CYB 220
1k+ views

Solution Available

Final Exam (100 Questions).docx

CMIT 326
5k+ views

Course Hero:
Select an action from the toolbar, click on a document question to see a solution, or type
your question here.
Get solution, Summarize, Find references, Conclusion, Generate quiz, Generate flashcards

Attach image Upload document


Do not enter any personal information
Scroll to top
 Company
o About Us
o Careers
o Leadership
o Q&A Archive
o Responsible AI
o Course Hero Español
 Get Course Hero
o iOS
o Android
o Chrome Extension
o Tutors
 Study Tools
o AI Chat with PDF
o Grammar Checker
o Paraphraser
o Proofreader
o Spell Checker
o Course Hero Quizzes
 Help
o Contact Us
o FAQ
o Feedback
 Legal
o Copyright Policy
o Academic Integrity
o Our Honor Code
o Privacy Policy
o Service Terms
o Attributions
o Community Guidelines
o Do Not Sell or Share My Personal Info
o Digital Services Act
 Connect with Us
o College Life
o Facebook
o Twitter
o LinkedIn
o YouTube
o Instagram

Course Hero, a Learneo, Inc. business © Learneo, Inc. 2025. Course Hero is not sponsored or
endorsed by any college or university.

You might also like