Domain 3 Flashcards

(108 cards)

1
Q

Infrastructure as a Service (Iaas)

A

Customer is responsible for configuring VM’s, Virtual network and guest OS security as if systems were on Premises. CSP is responsible for the physical components, internal network and tool provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Platform as a Service(Paas)

A

CSP is responsible for physical components, the internal network, and tools provided. Cheaper for customer but less control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a Service(Saas)

A

Customer is responsible for configuring access to the cloud service for their users as well as shared responsibility for data recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public Cloud

A

Everything run on the cloud providers hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Private Cloud

A

Cloud environment in your data centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid Cloud

A

Combines Public and Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi Cloud

A

2 or more public cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multitenancy

A

Logical isolation in CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infrastructure as a Code

A

Management of infrastructure (Networks, VM, load balancers and connection topology) described in code. It is a key DevOps practice and is used in conjunction with continuous integration and continuous delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Serverless Architecture

A

Cloud computing execution model where cloud provider dynamically manages the allocation and provisioning of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microservices

A

Microservices are an architectural style in software development where a system is built as a collection of small, independent, and loosely coupled services. Each service is designed to perform a specific business function and communicates with other services through well-defined APIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logical segmentation

A

Vlans ( Layer 2) - Logically segment a local area network into subnetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN

A

Creating an encrypted tunnel between devices or networks to pass traffic using protocols like IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual routing and forwarding

A

Allows a single router or switch to function as a multiple virtual router or switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Defined Network (SDN)

A

Network architecture approach that enables the network to be centrally controlled or programmed using software. Has a capacity to reprogram the data plane at any time. Use cases include SD-Lan and SD-Wan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Containerization

A

Lightweight portable way to package applications for multiple platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virtualization

A

Server Virtualization the process of dividing a physical server into multiple unique and isolated virtual servers by means of software application (Hypervisor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VM Escape

A

Where attacker gains access to a VM then attacks either the host machine that holds all the VMs, the hypervisor or any other VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

VM Sprawl

A

Unmanaged VM on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IOT (Internet of Things)

A

Connected to the internet . Elective curve(Smaller keys). Limited Compute resources and Limited ability to patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SCADA ( Supervisory Control and Data Acquisition)

A

Large amount of industrial equipment. Do not have direct access for greater security. Should be segmented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RTOS (Real time operating systems)

A

Smart devices like wearables and embedded systems Operate with very specific scheduling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Embedded Systems

A

Technology component of an IOT devices . A full computer system embedded inside another larger system ( Examples - GPS, Drones, VoIP phones)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability

A

Ensuring a system or service is accessible to authorised users when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Resilience
System availability to handle disruptions
26
Responsiveness
Ability to respond to user request or events in a timely manner
27
Scalability
Ability to scale resources
28
Ease of deployment
Complexity and effort required implementation
29
Risk Transference
Security risks mitigated by transferring some responsibility to third parties
30
Internet
A Private network that is designed to host the information internal to the organisation
31
Extranet
Section of an organisation network that has been sectioned off to act as intranet for the private network but also serves information to external business partners
32
Screened Subnet
DMZ/ Perimeter network
33
Attack vectors
Consist of all the threat vectors that a system is exposed to
34
Fail-Open
Allows everything to pass through system when it fails. No security controls are enforced. There is no disruption in network activity
35
Fail- Closed
Nothing can pass through the system when it fails . No security controls are ignored, network traffic is disrupted
36
NIPS/NIDS - Inline
Place near the fire wall as an additional layer of security
37
NIPS/ NIDS - Tap ( Out of band)
replicates traffic. Active taps - require power to operate. Passive taps -does not require operate
38
Jump Server
Place on Screened Subnet allows admins to connect remotely to the network
39
Forward Proxy
Server that controls requests from clients seeking resources on the internet or an external network
40
Reverse Proxy
Placed on a screened subnet, performs the authentication and decryption of a secure session to enable it to filter the incoming traffic
41
IDS
Analyses whole packets, both headers and payload looking for known events. Known event is detected, a log is generated
42
IPS
Analyses whole packets both header and payload looking for known events. Know event is detected, packet is rejected
43
HIDS/HIPS
Host Based IDS/IPS - Monitor activity on a single system
44
NIDS/NIPS
Can monitor activity on a network
45
Behaviour based
Baseline of activity to identify normal behaviour
46
Signature Based
Uses Signature - Used for known attack methods
47
NIC
Network Interface Card - Dual network cards paired together to give maximum throughput
48
802.1x
Is a IEEE standard for port based network access control . It is Authentication process
49
EAP
Extensible Authentication Protocol - Allows for new authentication technologies to be compatible with existing wireless or point to point connection technologies
50
PEAP
Encapsulates EAP within a TLS tunnel
51
LEAP
LEAP is insecure
52
EAP-TLS
secure version of wireless authentication requires X.509 . Involves 3 parties
53
EAP- TTLS
Uses two phases
54
Static Packet - Filtering Firewall
Operate layer 3 - Filters traffic by examining data from a message header
55
Application Level Firewall
Operates at Layer 7 - Filters traffic based on a single internet service, protocol or application
56
Circuit Level Firewall
Layer 5 - Used to establish communication sessions between trusted partners
57
Stateful Inspection Firewall
Evaluates the state, session or the context of network traffic
58
Stateless Firewall
Watch network traffic . Block packets based on source and destination addresses or static values. Heavier traffic loads
59
Statefull
Can watch traffic streams from end to end
60
WAF (Web Application Firewall)
HTTP traffic ( Protects from XSS, CSRF, SQL injection)
61
NGFW ( Next Generation)
Deep Packet firewall. Adds Application level inspection, IPS and brings intelligence from outside. It is multifunctional
62
Deep Packet Inspection
Filters the header and payload
63
Unified Threat Management
Multifunction device (IDS, IPS, TLS/SSL proxy, web filtering, bandwidth throttling, NAT, VPN anchoring, antivirus
64
Split Tunnel
Traffic destined for corporate network only, Internet traffic direct through normal route
65
IPSEC Protocols
AH ( Authentication Header and ESP (Encapsulating Security Payload). AH does not perform encryption ESP provides data confidentiality, integrity, data origin authentication)
66
SD-WAN ( Software Define Wide Area Network)
Enables users in branch office to remotely connect to enterprise network. Security is based on IP Security, VPN tunnel, NGFW, micro segmentation
67
SASE (Secure Access Service Edge)
Related to Zero Trust Architecture - Brings together networking and security functions and delivers them as an integrated cloud service ( Includes Firewall, Antimalware, Secure web gateway, DLp, IPS , CASB
68
Regulated Data
Data Subjects to Specific laws and regulations governing its collection, storage and Use . Examples PHI, financial information, PII
69
Trade Secret
Intellectual property of inventor Eg: Formulas, product design
70
Intellectual Property
Creation of minds - Intangible assets Patents (20 Years), Copyrights, Trademarks (10 Years), Trade secret (must be disclosed), Copyright (70 years)
71
Financial Information
Financial Records (GLBA and PCI-Dss)
72
Public Data
Freely accessible information intended for general public
73
Private Data
Information about individual that should be kept Confidential (PII, PHI)
74
Confidential Data
Organisation intends to keep secret within a designated group
75
Restricted Data
Subject to external regulations or legal requirement
76
Sensitive Data
Information is not publicly known (includes private, confidential, restricted)
77
Restricted Data
Subject to external regulations or legal requirements that limit access and control its handling
78
Full Disk Encryption
Helps to encrypt Windows and Linux Iaas VM's using Bitlocker for Windows and Dm-Crypt for Linux
79
Transparent Data Encryption
Helps to protect SQL database and data warehouses against threat of malicious activity with real time encryption and decryption of database
80
Data Sovereignty
Data is subject to the laws and regulation of the country in which it was created. It cannot be moved to another region. Data is subject to the laws of where it is stored
81
Geolocation
Use GPS to give the actual location of a mobile device - Somewhere you are
82
Encryption
Two way function ( Symmetric and Asymmetric)
83
Hashing
One way function that scrambles plain text to produce a unique message digest
84
Data Masking
Only partial data is left in a data field
85
Tokenization
Meaningful data is replaced with a token that is generated randomly and original data is held in a vault
86
Pseudonymization
De-identification procedure in which PII fields within a data record are replaced by one or more artificial identifiers or pseudonyms
87
Anonymization
process of removing all relevant data so that it is impossible to identify original subject or person
88
Obfuscation
Intentionally making data less readable or understandable
89
Segmentation
Method involving dividing data into smaller isolated segments
90
Clustering
Combines multiple servers into a single, highly available entity ensuring continuous service even when individual servers fail
91
Platform Diversity
Utilizing mix of different platforms
92
COOP (Continuity of Operations)
Procedures and Resources to maintain critical business functions
93
Cold Site
A data centre space
94
Warm Site
Preventative site
95
HOT site
Hot site allows you to keep servers and a live backup site up and running
96
Capacity Planning
Process of proactively assessing and ensuring an organisation has sufficient resources
97
Tabletop
Structured Walkthrough _ Paper based, hypothetical (Talking Only)
98
Failover
Shut down primary site and test recovery site
99
Simulation
Test the plans in a simulated operational environment
100
Parallel Processing
Activating it during the test
101
Onsite/ Offsite
Onsite - Physical location, Offsite - Separate locations
102
Snapshot
Point in time copies of data at a specific moment - Common in VM
103
Recovery
Restoring data from a backup to its original location or a new location
104
Replication
Creating identical copies of data in multiple location
105
Journaing
Transaction logging, records all changes made to data in a sequential log file
106
UPS (Uninterrupted Power Supply)
Self charging battery - Primary power fails it provides power
107
Generator
Standby power source that is powered by diesel, gasoline, propane or natural gas for extended period of time
108