Primary Definitions 14.0-18.0 Flashcards
(178 cards)
Security Architecture
Design, structure, and behavior of an organization’s information security environment.
Serverless
Model where the responsibility of managing servers, databases, and some application logic is shifted away from developers.
Responsibility Matrix
Outlines the division of responsibilities between the cloud service provider and the customer.
Hybrid Solutions
Combine on-premise infrastructure, private cloud services, and public cloud services.
On-Premise Solutions
Computing infrastructure that’s physically located on-site at a business.
Scalability
System’s ability to handle increased workloads.
Virtualization
Technology that allows for the emulation of servers.
Containerization
Lightweight alternative to full machine virtualization that places applications in separate containers with their own dependencies.
Virtual Machine Escape
Occurs when an attacker is able to break out of one of these normally isolated virtual machines.
Privilege Elevation
Occurs when a user is able to gain the ability to run functions as a higher level user.
Live Migration of Virtual Machines
When a virtual machine needs to move from one physical host to another.
Resource Reuse
Concept in computing where system resource like memory or processing power are reused.
Microservices
A software architecture where large applications are broken down into smaller and independent services.
Physical Separation/Air Gapping
Isolation of a network by removing any direct or indirect connections from other networks.
Logical Separation
Creates boundaries within a network, restricting access to certain areas.
Software Defined Network (SDN)
Enables efficient network configuration to improve performance and monitoring.
Infrastructure as Code
A method in which IT infrastructures are defined in code files that can be versioned, tested, and audited.
Snowflake System
A configuration that lacks consistency that might introduce risks, so it has to be eliminated.
Idempotence
The ability of an operation to produce the same results as many times as it is executed.
Internet of Things (IoT)
Refers to the network of physical items with embedded systems that enables connection and data exchange.
Hub
The central point connecting all IoT devices and sends commands to them.
Smart Devices
Everyday objects enhanced with computing capabilities and Internet connectivity.
Wearables
Subset of smart devices designed to be worn on the body.
Weak Defaults
Utilizing the weak default settings that come with the device upon purchase.