1 What is the cloud computing reference architecture?
2 Describe some of the main cloud-specific security threats.
3 What are the advantages of each of the three approaches shown in Figure 17.1?
4 What protocols comprise SSL?
5 What is the difference between an SSL connection and an SSL session?
1 What is a suppress-replay attack?
2 What problem was Kerberos designed to address?
3 What are three threats associated with user authentication over a network or Internet?
4 List three approaches to secure user authentication in a distributed environment.
5 What four requirements were defined for Kerberos?