Security+: Cloud and Virtualization Concepts


Cloud and virtualization represent crucial components of IT operations and are indispensable daily of an IT professional working in the cybersecurity landscape. The CompTIA Security + Certification has become a worldwide standard for recognizing competence in IT security and cloud and virtualization concepts are a fundamental component of this course.

Definition of Cloud

In general, cloud, also known as cloud computing, is a way that allows running application software and storing data in central computer systems and providing access to them to customers or other users through the Internet.

According to NIST, “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

Cloud is everywhere, and its origin is not known. This term became popular in 2008, but the capacity of providing remote access to computing functions through networks dates back to the mainframe time-sharing systems of the 1960s and 1970s [1]. There is no doubt; cloud became a buzzword.

According to NIST, Cloud model is composed of five essential features, three service models, and four deployment models.

Essential Features

The essential features of cloud computing are divided into five principles:

On-demand self-service: On-demand self-service refers to the service provided by cloud computing vendors that enables the provision of cloud resources on-demand whenever they are required. A consumer performs all the actions in the service, such as server time and network storage, without human interaction or going through an IT department, for example.

Broad network access: The access to resources in the Cloud is available through multiple types of devices. This not only includes the most common devices (laptops, workstations, etc.) but also this includes mobile phones, and so on.

Resource pooling: (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Pedro Tavares. Read the original post at: