Flashcards in ISDS 4120 Exam 3 Deck (56):
What is Point-of-Presence? (PoP)
-location where an ISP provides service to its customers
-connects to the rest of the ISP's network
-authentication is performed at the PoP
What separates telephone from data traffic?
-main distribution facility (MDF)
What type of server is used by ISPs to authenticate customers?
What is hybrid fiber coax?
-tv industry term for broadband network that combines optical fiber and coaxial cable
Hierarchy of ISPs by size?
-tier 1 National
-tier 2 Regional
-tier 3 Local
How does tiering work for ISPs?
-higher-tier ISPs charge lower-tier ISPs for data transfer
-ISPs at same tier don't charge each other (peering)
What is used to combine internet data traffic with tv video traffic in a cable modem environment?
-combines the internet data traffic with the ordinary tv video traffic and sends it back to the fiber node for distribution
What is an Internet Exchange Point (IEP)?
-physical infrastructure through which ISPs and content delivery networks exchange internet traffic between their networks
What is Internet 2?
-US National Science Foundation Project started in 1996
-used by more than 500 organizations to develop advanced networks and network management tools
What is Peering?
-ISPs do not charge 1 another for transferring messages they exchange across a NAP or MAE
-allows for traffic spikes and minimizes delays
-allows for workload changes by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible
-mirrored solutions to minimize downtime in the event of a disaster, gives business sustainability they need during unanticipated events
-no matter which cloud provider and architecture an organization uses, an open cloud will make it easy for them to work with other groups, even if those other groups choose different providers and architectures
-different companies share the same machine
all users in the same company use the same machine
Advantages of a Virtual Machine (6)
-run operating systems where physical hardware is unavailable
-easier to create new machines and backup machines
-software testing using clean installs of operating systems and software
-emulate more machines than are physically available
-run legacy systems
Advantages of Cloud Computing? (7)
-lower computer costs
-reduced software costs
-instant software updates
-unlimited storage capacity
-increased data reliability
-universal document access
Benefits of Cloud Computing?
-significant cost saving
Costs of Cloud Computing?
-lack of transparency
-sharing of computer assets
Vendo Value Proposition?
-personnel development, methodology development, and customer relationship management + complementarities in core competencies = productivity gains available to the client
2 Beneficial relationships
Client-Vender Relationship solidified with
-service level agreement
Partnership Quality: Trust
-degree of confidence and willingness
Partnership Quality: Business Understanding
-degree of understanding of behaviors, goals, and policies
Partnership Quality: Benefit/Risk Share
-degree of articulation and agreement on benefit risk
Partnership Quality: Conflict Avoidance
-degree of compatibility of activities, resource share and goals
Partnership Quality: Commitment
-degree of the pledge of relationship continuity
What laws govern Cloud Computing?
-processing of personal data
-free movement of personal data
What risks are associated with Cloud Computing?
Advantages of Cloud Security
-data fragmentation and dispersal
-dedicated security team
-greater investment in security infrastructure
-fault tolerance and reliability
-hypervisor protection against network attacks
-possible reduction of C-A activities
-simplification of compliance analysis
-data held unbiased party
-low-cost disaster recovery and data storage solutions
-on-demand security controls
-real-time detection of system tampering
-rapid re-construction of services
-advanced honeynet capabilities
Disadvantages of Cloud Security
-data dispersal and international privacy laws
-need for isolation management
-data ownership issues
-quality of service guarentees
-dependence on secure hypervisors
-attraction to hackers
-security of virtual OS's in the cloud
-possibility of massive outages
-public cloud vs internal cloud security
-lack of public SaaS version control
-virus spreads itself without human intervention
-copies itself from computer to computer
-disguising information using math rules, providing confidentiality
-important tool in gaining unauthorized access
-remote access management console that enable users to access a computer and manage it from afar
Disasters: Threats to business continuity
-destruction of data
-denial of service
Intrusion: Threats of Unauthorized Access
-external attackers exist, but most unauthorized access incidents involve employees
-mission-critical applications and data
-any potential occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization
How do you calculate a Relative Risk Score?
-multiplying the impact score by the likelihood
How does a Packet Level Firewall work?
-examines the source destination address of every network packet that passes through it
What is Mission Critical Information System?
-an information system that is critical to the survival of the organization
What Layer would an IP Security protocol sit on?
What are the methods for Deterring Intrusion?
What are the two parts of a Symmetric Encryption System?
What are the steps in Implementing an Enterprise 2.0 Initiative?
-create enabling frameworks
-drive adoption and value
What are the 6 Characteristics of Web 3.0?
5.) behavioral advertising
-social networking analysis
-really simple syndication (RSS)
What are the characteristics of Web 2.0?
Where do inputs of Web 2.0 technologies arise from?
-user generated content
What are the future Grand Challenges of Enterprise Architecture?