Chapter 9 - Resilience and Physical Security Flashcards

1
Q

Continuity of Operations

A

Continuity of Operations means ensuring that operations will continue even if issues ranging from single system failures to wide-scale natural disasters occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Geographic Dispersion

A

Geographic Dispersion of systems ensures that a single disaster, attack, or failure cannot disable or destroy them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Load Balancing

A

Load Balancing makes multiple systems or services appear to be a single resource, allowing both redundancy and increased ability to handle loads by distributing them to more than one system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Clustering

A

Clustering describes groups of computers connected together to perform the same task. Some examples include providing a front-end for a web application or grouping together worker nodes of a supercomputer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Platform Diversity

A

Platform Diversity is a means of building resilience into an infrastructure. Using different vendors, cryptographic solutions, platforms, and controls can make it more difficult for a single attack or failure to have system- or organization-wide impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redundant Array of Inexpensive Disks (RAID)

A

RAID is a common solution to storage resiliency that uses multiple disks with data either striped (spread across disks) or mirrored (completely duplicated), and technology to ensure that data is not corrupted or lost (parity). RAID ensures that an array can handle one or more disk failures without losing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID-0

A

RAID-0 offers striping, spreading data across all drives in the array. This allows for better I/O performance. This is NOT fault tolerant. All data is lost if a single drive is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAID-1

A

RAID-1 offers mirroring, duplicating all data to another drive or drives in the array. This uses twice the amount of storage to ensure that data is still available if a drive fails. This solution also offers high read speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAID-5

A

RAID-5 offers both striping and parity. Data is striped across the drives with one of the drives being used for parity (checksum) of the data. This solution can tolerate only a single drive failure at a time. Drive failures can be rebuilt as long as only a single drive fails. Data reads are fast while data writes are slightly slower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID-10

A

RAID-10 (requires at least four drives) offers both mirroring and striping. This means that data is perfectly duplicated across drives and a drive is also used for parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Replication

A

Replication focuses on using either synchronous or asynchronous methods to copy live data to another location or device. Replication is always occurring as changes are made. Replication helps with multisite, multi-system designs, ensuring that changes are carried over to all systems or clusters that are part of an architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Journaling

A

Journaling creates a log of changes that can be reapplied if an issue occurs. Journaling is commonly used for databases and similar technologies that combine frequent changes with an ability to restore to a point in time. Journals should be backed up somewhere else as they are simply maintained on the source system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Snapshot

A

Snapshots capture the full state of a system or device at the time the backup is completed. Snapshots can be useful to clone systems, to go back in time to a point before a patch or upgrade was installed, or to restore a system state to a point before some other event occurred. Snapshots are common for virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Off-Site Storage

A

Off-Site Storage for backup media, either at a self-owned site or at a location provided by a third-party service provider, is a common form of geographic dispersion/diversity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Scalability

A

Scalability is a common design element and a useful response control for many systems in modern environments, where services are designed to scale across many servers instead of requiring a larger server to handle more workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two major categories of scalability?

A
  1. Vertical Scalability: Requires a larger or more powerful system or device. This is commonly seen when all tasks or functions need to be handled on the same system or infrastructure. This can be very expensive to increase, particularly if the event that drives the need to scale is not ongoing or frequent, resulting in unused resources.
  2. Horizontal Scalability: Uses smaller systems or devices but adds more of them. When designed correctly, a horizontally scaled system can take advantage of the ability to transparently add and remove more resources, allowing it to adjust as needs grow or shrink. This approach also provides opportunities for transparent upgrades, patching, and even incident response.
17
Q

Hot Sites

A

Hot Sites have all the infrastructure and data needed to operate the organization. Because of this, some organizations operate them full time, splitting traffic and load between multiple sites to ensure that the sites are performing properly.

18
Q

Warm Sites

A

Warm Sites have some or all of the systems needed to perform the work required by the organization, but the live data is not in place. Warm Sites are expensive to maintain because of the hardware costs, but they can reduce the total time to restoration because systems can be ready to go and mostly configured.

19
Q

Cold Sites

A

Cold Sites have space, power, and often network connectivity but they are not prepared with systems or data. This means that in a disaster an organization knows they would have a place to go but would have to bring or acquire hardware systems.

20
Q

What are the three main areas for Capacity Planning?

A
  1. People: Where staffing and skillsets are necessary to deal with increased scale and disasters. Organizations typically ensure that they have sufficient staff to ensure that appropriate coverage levels exist.
  2. Technology: This capacity planning focuses on understanding the technologies that an organization has deployed and its ability to scaled as needed. Some examples include the capacity capabilities of a web server tool, a load balancer, or a storage device’s throughput and read/write rates.
  3. Infrastructure: Where underlying systems and networks may need to scale. This can include network connectivity, throughput, storage, and any other element of infrastructure that may be needed to handle either changing loads or to support disaster recovery and business continuity efforts.
21
Q

Tabletop Exercises

A

Tabletop Exercises use discussions between personnel assigned roles needed for the plan to validate the plan. This helps to determine if there are missing components or processes.

22
Q

Simulation Exercises

A

Simulation Exercises are drills or practices in which personnel simulate what they would do in an actual event.

23
Q

Parallel Processing Exercises

A

Parallel Processing Exercises move processing to a hot site or alternate/backup system or facility to validate that the backup can be performed as expected.

24
Q

Failover Exercises

A

Failover Exercises test full failover to an alternate site or system, and they have the greatest potential for disruption but also provide the greatest chance to fully test in a real-world scenario.

25
Q

Access Badges

A

Access Badges are often used for entry access via magnetic stripe and radio frequency ID (RFID) access systems.

26
Q

What are the four most common types of sensors?

A
  1. Infrared: Rely on infrared light, or heat radiation. Inexpensive and good for detecting humans.
  2. Pressure: Detect changes in pressure. Good for detecting when an object is moved through an area.
  3. Microwave: Use a baseline for a room or space that is generated by detecting normal responses when the space is at a baseline. Typically more expensive and more sensitive than infrared sensors.
  4. Ultrasonic: Uncommon in commercial security systems. Can be set off by machinery or other vibrations and can often have environmental effects on human occupants. Often used in situations where proximity detection is required.
27
Q

Radio Frequency Identification (RFID) Cloning

A

Radio Frequency Identification (RFID) Cloning attacks work by cloning an RFID tag or card. This can be difficult to catch if the RFID is the only identifier used.