Security Plus SY0-701: Section 3

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

Serverless Architecture

A cloud computing execution model in which the cloud provider allocates machine resources on demand, taking care of the servers on behalf of their customers.

2
New cards

FaaS

function as a service, a cloud service model that supports server-less software architecture by provisioning runtime containers in which code is executed in a particular programming language

3
New cards

API

Application Programming Interface, a library of procedures and a description of how to call each procedure.

4
New cards

VLAN

Virtual local area network. A VLAN can logically group several different computers together, or logically separate computers, without regard to their physical location. It is possible to create multiple VLANs with a single switch.

5
New cards

SDN

Software defined network. A method of using software and virtualization technologies to replace hardware routers. SDNs separate the data and control planes.

6
New cards

Infrastructure/Data plane

Part of SDN:

Process the network frames and packets

Forwarding, trunking, encrypting, NAT

7
New cards

Control Layer (Control Plane)

Part of SDN:

Manages the actions of the data plane

Routing tables, session tables, NAT tables

Dynamic routing protocol updates

8
New cards

Application Layer/Management Plane

Part of SDN:

Configure and manage the device - SSH, browser, API

9
New cards

SCADA

Supervisory control and data acquisition. Typically industrial control systems within large facilities such as power plants or water treatment facilities. SCADA systems are often contained within isolated networks that do not have access to the Internet, but are still protected with redundant and diverse security controls. SCADA systems can be protected with NIPS systems and VLANs.

10
New cards

ICS

Industrial Control Systems

11
New cards

RTOS

Real-time operating system: A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks. No time to wait for other processes

12
New cards

IPS

Intrusion prevention system. A preventative control that will stop an attack in progress. It is similar to an active IDS except that it's placed in line with traffic. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress.

13
New cards

IDS

Intrusion detection system. A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns. An anomaly-based IDS (also called behavior-based) starts with a performance baseline of normal behavior and compares network traffic against this baseline. An IDS can be either host-based (HIDS) or network-based (NIDS). In contrast, a firewall is a preventative control that attempts to prevent the attacks before they occur. An IPS is a preventative control that will stop an attack in progress.

14
New cards

Fail-Open

A security control configuration that ensures continued access to the resource in the event of failure

15
New cards

Fail-Closed

A security control configuration that blocks access to a resource in the event of failure

16
New cards

Active Monitoring

- System is connected inline

- Data can be blocked in REAL TIME as it passes by

- Intrusion prevention is commonly active

17
New cards

Passive Monitoring

- A copy of the network traffic is examined using a tap or port monitor

- Data cannot be blocked in real-time

- Intrusion detection is commonly passive more IDS

18
New cards

SPAN

Switch port analyzer

19
New cards

Jump Server

A system on a network used to access and manage devices in a separate security zone

20
New cards

Proxy Server

A server that acts as an intermediary between a user and the Internet. Receives the user request and sends the request on the behalf of the user. Useful for URL filtering, access control, and content scanning

21
New cards

Application Level Proxy

a device or software that recognizes application-specific commands and offers granular control over them

22
New cards

NAT

Network Address Translation. A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.

23
New cards

Forward Proxy

A computer or an application program that intercepts user requests from the internal secure network and then processes those requests on behalf of the users.

24
New cards

Reverse Proxy

A type of proxy server that protects servers from direct contact with client requests that come from the internet. Inbound traffic from the internet to your internal service

25
New cards

Open Proxy

- A third-party, uncontrolled proxy

- Can be a significant security concern

- Often used to circumvent existing security controls

26
New cards

Active/Active Load Balancing

all servers are active and load balancer can use any of the servers at any time. (Round robin and affinity are referred to this type)

Can also: TCP offload (protocol over head), SSL encryption/decryption, caching, prioritization

27
New cards

Active/passive load balancing

When one server in a load balancing system is active and the others are stand-by.

28
New cards

EAP

Extensible Authentication Protocol. An authentication framework that provides general guidance for authentication methods. Variations include LEAP and PEAP and 802.1x

29
New cards

NAC

Network Access Control

30
New cards

Network-based Firewall

filters by port number, can encrypt traffic into/out of the network

protect traffic between sites

can be configured as layer 3 device (routers)

31
New cards

Layers of a Network

Physical (Layer 1)

Data Link

Network

Transport (Layer 4) - Filters by port number or application

Session

Presentation

Application (Layer 7) - NGFW

32
New cards

UTM

Unified threat management. A group of security controls combined in a single solution. UTM appliances can inspect data streams for malicious content and block it. Handles many different services all at the same time. All-in-one security appliance

33
New cards

NGFW

Next Generation FireWall. NGFW means a very smart firewall that understands Application Layer (layer 7) protocols. Does advanced decoding, every packet must be analyzed and categorized before making a security decision

34
New cards

WAF

Web application firewall. A firewall specifically designed to protect a web application, such as a web server. A WAF inspects the contents of traffic to a web server, can detect malicious content, and block it. Not a normal firewall, can allow or deny based on expected input and recognize SQL injection and even XSS

35
New cards

VPN

Virtual Private Network, Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected. Uses SSL/TLS

36
New cards

Concentrator

Encryption/decryption access device - Often integrated into a firewall or VPN

37
New cards

TLS

Transport Layer Security. Used to encrypt traffic on the wire. TLS is the replacement for SSL and like SSL, it uses certificates issued by CAs

38
New cards

SSL

Secure Sockets Layer. Used to encrypt traffic on the wire. SSL is used with HTTPS to encrypt HTTP traffic on the Internet using both symmetric and asymmetric encryption algorithms. SSL uses port 443 when encrypting HTTPS traffic

39
New cards

IPSec

Protocol suite for securing Internet Protocol communications.

40
New cards

Site-to-site IPsec VPN

• Always-on

• Or almost always

• Firewalls often act as VPN concentrators

• Probably already have firewalls in place

41
New cards

SD-WAN

• Software Defined Networking in a Wide Area Network

- A WAN built for the cloud

• The data center used to be in one place

- The cloud has changed everything

• Cloud-based applications communicate directly to the cloud

- No need to hop through a central point

42
New cards

SASE

Secure Access Service Edge

SASE combines SD-WAN with computer security functions, including cloud access security brokers (CASB), Secure Web Gateways (SWG), antivirus/malware inspection, virtual private networking (VPN), firewall as a service (FWaaS), and data loss prevention (DLP), all delivered by a single cloud service at the network edge. Security for cloud based services that are hosted through SD-WAN

43
New cards

Data Types - Regulated

Managed by a third party, government laws and statutes

44
New cards

Data Types - Trade Secrets

An organizations secret formulas often unique to an organization

45
New cards

Data Types - Intellectual Preoperty

May be publicly visible, copyright and trademark restrictions

46
New cards

Data Types - Legal Information

Court records and documents, judge and attorney information, PII and other sensitive details may be stored in another format or on different systems

47
New cards

Data Types - Financial Information

Company financial details, customer finances, payment records, credit card data, bank records, etc

48
New cards

Data Types - Human-Readable

Humans can understand the data

49
New cards

Data Types - Non-human readable

not easily understood by humans, encoded data, barcodes, images

50
New cards

Data Classification - Proprietary

Data that is property of an organization, may also include trade secrets, often unique to the organization

51
New cards

Data Classification - PII

Personally Identifiable Information, data that can be used to identify an individual

52
New cards

Data Classification - PHI

Protected health information, Health information associated with an individual. Contains health status, health care records, payments, etc

53
New cards

Data at rest

Any data stored on media. It's common to encrypt sensitive data-at-rest.

54
New cards

Data in transit

Any data sent over a network. It's common to encrypt sensitive data-in-transit

55
New cards

Data in use

Any data currently being used by a computer. Because the computer needs to process the data, it is not encrypted while in use.

56
New cards

Data sovereignty

A term that refers to the legal implications of data stored in different countries. It is primarily a concern related to backups stored in alternate locations via the cloud.

57
New cards

Geolocation

The identification of the location of a person or object using technology.

58
New cards

ciphertext

A string of text that has been converted to a secure form using encryption

59
New cards

Obfuscation

the action of making something obscure, unclear, or unintelligible

60
New cards

Segmentation

divide the total market into smaller segments, data segmentation could look like using many smaller databases than one big one

61
New cards

Server Clustering

A technique that links multiple servers together to act as a single server

62
New cards

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

63
New cards

Warm site

A separate facility with computer equipment that requires installation and configuration

64
New cards

cold site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

65
New cards

Geographic dispersion

A resiliency mechanism where processing and data storage resources are replicated between physically distant sites.

66
New cards

COOP

Continuity of Operations Plan. A COOP site provides an alternate location for operations after a critical outage. A hot site includes personnel, equipment, software, and communications capabilities of the primary site with all the data up to date. A hot site can take over for a failed primary site within an hour. A cold site will have power and connectivity needed for COOP activation, but little else. A warm site is a compromise between a hot site and a cold site.

67
New cards

journaling

The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.

68
New cards

UPS

Uninterruptible power supply. A battery backup system that provides fault tolerance for power and can protect against power fluctuations. UPS provide short-term power giving the system enough time to shut down smoothly, or to transfer to generator power. Generators provide long-term power in extended outages.

69
New cards

Offline/Standby UPS

Only goes online if you lose the main source power.

70
New cards

Line-interactive UPS

A variation of a standby UPS that shortens switching time by always keeping the inverter that converts AC to DC working, so that there is no charge-up time for the inverter.

71
New cards

Online/Double Conversion UPS

continuous power where power is always routed through batteries