Security Architecture and Infrastructure Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

Responsibility Matrix

Defines the division of responsibilities between the cloud service provider and the customer regarding security, compliance, and management of resources.

2
New cards

Hybrid Considerations

Strategies and challenges involved in integrating on-premises infrastructure with cloud services.

3
New cards

Third-party Vendors

Incorporating services and solutions from external providers into cloud architectures.

4
New cards

Infrastructure as Code (IaC)

Automating the provisioning and management of infrastructure using code and configuration files.

5
New cards

Serverless

Architectural approach where cloud providers manage the infrastructure, allowing developers to focus solely on writing and deploying code.

6
New cards

Microservices

Architectural style where applications are composed of small, independently deployable services, promoting modularity and scalability.

7
New cards

Physical Isolation

Creating network segments physically separated from other parts, often for security or regulatory compliance reasons (e.g., air-gapped networks).

8
New cards

Logical Segmentation

Dividing networks into logical segments using techniques such as VLANs or software-defined networking (SDN).

9
New cards

Software-defined Networking (SDN)

Managing network infrastructure programmatically through software, abstracting the underlying hardware.

10
New cards

On-premises

Infrastructure and services hosted within an organization's physical facilities rather than in the cloud.

11
New cards

Centralized vs. Decentralized

Contrasting approaches to organizing infrastructure management and decision-making authority.

12
New cards

Containerization

Encapsulating applications and their dependencies into lightweight, portable containers for deployment across different environments.

13
New cards

Virtualization

Creating virtual instances of servers, operating systems, storage, or networks to maximize resource utilization and flexibility.

14
New cards

IoT (Internet of Things)

Network of interconnected devices that communicate and exchange data, often involving sensors, actuators, and embedded systems.

15
New cards

Industrial Control Systems (ICS) / Supervisory Control and Data Acquisition (SCADA)

Systems used to monitor and control industrial processes and critical infrastructure.

16
New cards

Real-time Operating System (RTOS)

Operating system optimized for handling real-time processing requirements, often used in embedded systems and IoT devices.

17
New cards

Embedded Systems

Computing devices with specialized functions and limited resources, embedded within larger systems or products.

18
New cards

High Availability

Design principle aiming to minimize downtime and ensure continuous operation of critical systems and services.

19
New cards

Availability

Ensuring systems and services are accessible and operational when needed.

20
New cards

Resilience

Ability to withstand and recover from disruptions, failures, or attacks.

21
New cards

Cost

Balancing infrastructure expenses with budgetary constraints and business needs.

22
New cards

Responsiveness

Ability to quickly adapt and scale infrastructure to meet changing demands.

23
New cards

Scalability

Capacity to expand or shrink resources in response to workload changes.

24
New cards

Ease of Deployment

Simplifying the process of deploying and configuring infrastructure components.

25
New cards

Risk Transference

Shifting security and operational risks to third-party service providers or insurance mechanisms.

26
New cards

Ease of Recovery

Simplifying and accelerating the restoration of services after disruptions or failures.

27
New cards

Patch Availability

Timely availability of software patches and updates to address vulnerabilities and improve security.

28
New cards

Inability to Patch

Addressing challenges associated with patching legacy or embedded systems that cannot be easily updated.

29
New cards

Power

Ensuring sufficient and reliable power supply to support infrastructure operations.

30
New cards

Compute

Managing computational resources to meet performance requirements and optimize resource utilization.

31
New cards

Device Placement

Strategic positioning of network devices and assets to optimize performance, security, and accessibility.

32
New cards

Security Zones

Segregation of network resources into distinct zones based on security requirements and trust levels.

33
New cards

Attack Surface

Total sum of vulnerabilities and entry points that attackers can exploit to compromise a system or network.

34
New cards

Connectivity

Establishing reliable connections between network components while considering bandwidth, latency, and reliability.

35
New cards

Fail-Open

Devices or systems that default to an open state when they encounter a failure, potentially exposing the network to risks.

36
New cards

Fail-Closed

Devices or systems that default to a closed or secure state when they encounter a failure, preventing unauthorized access.

37
New cards

Active vs. Passive

Active devices perform actions on data packets (e.g., firewalls), while passive devices observe and analyze network traffic (e.g., network monitoring tools).

38
New cards

Inline vs. Tap/Monitor

Inline devices sit directly in the data path and can actively intercept or modify traffic, whereas tap/monitor devices passively monitor traffic without interrupting the flow.

39
New cards

Jump Server

Intermediate server used to access and manage devices in a separate, more secure network segment.

40
New cards

Proxy Server

Intermediary server that acts as an intermediary between clients and other servers, providing various functionalities such as caching, filtering, and anonymization.

41
New cards

Intrusion Prevention System (IPS) / Intrusion Detection System (IDS)

Security appliances designed to monitor network traffic for suspicious activity and take action to prevent or mitigate attacks.

42
New cards

Load Balancer

Device that distributes incoming network traffic across multiple servers to optimize resource utilization, improve scalability, and enhance reliability.

43
New cards

Sensors

Devices that collect data from the environment or network for monitoring and analysis, often used for security monitoring and threat detection.

44
New cards

802.1X

IEEE standard for port-based network access control, allowing authentication and authorization of devices before granting access to the network.

45
New cards

Extensible Authentication Protocol (EAP)

Framework for network authentication methods used in 802.1X and other authentication protocols.

46
New cards

Web Application Firewall (WAF)

Firewall specifically designed to protect web applications from common web-based attacks.

47
New cards

Unified Threat Management (UTM)

Comprehensive security appliance that combines multiple security features such as firewall, antivirus, intrusion detection, and content filtering into a single platform.

48
New cards

Next-Generation Firewall (NGFW)

Firewall appliance that integrates traditional firewall capabilities with advanced security features like application awareness, intrusion prevention, and deep packet inspection.

49
New cards

Layer 4/Layer 7

Classifies firewalls based on the layers of the OSI model they operate at, with Layer 4 firewalls filtering traffic based on IP addresses and port numbers, while Layer 7 firewalls can inspect and filter traffic based on application-layer data.

50
New cards

Virtual Private Network (VPN)

Secure encrypted tunnel that allows remote users to securely access the organization's network resources over the internet.

51
New cards

Remote Access

Provision of secure access to network resources for users located outside the organization's premises.

52
New cards

Transport Layer Security (TLS)

Protocol that provides secure communication over a computer network, commonly used for securing web traffic.

53
New cards

Internet Protocol Security (IPSec)

Suite of protocols for securing IP communications by authenticating and encrypting each IP packet of a data stream.

54
New cards

Software-Defined Wide Area Network (SD-WAN)

Approach to network connectivity that uses software-defined networking (SDN) to intelligently route traffic across the WAN, optimizing performance and reducing costs.

55
New cards

Secure Access Service Edge (SASE)

Converged networking and security architecture that combines WAN capabilities with cloud-native security functions to support secure remote access and direct-to-cloud connectivity.

56
New cards

Selection of Effective Controls

Choosing and implementing security controls based on risk assessments, compliance requirements, organizational needs, and industry best practices to mitigate threats and vulnerabilities effectively.

57
New cards

Data Types

Categories of data characterized by their regulatory requirements and sensitivity.

58
New cards

Regulated Data

Data subject to specific laws and regulations governing its collection, storage, processing, and sharing, such as personal health information (PHI) under HIPAA or financial data under PCI DSS.

59
New cards

Trade Secret

Proprietary information that provides a competitive advantage to a business and is protected by intellectual property laws.

60
New cards

Intellectual Property

Creations of the mind, such as inventions, literary and artistic works, designs, symbols, and trade secrets, protected by copyright, patents, and trademarks.

61
New cards

Legal Information

Data related to legal matters, including contracts, litigation documents, and attorney-client privileged communications.

62
New cards

Financial Information

Data concerning financial transactions, accounts, investments, and assets, which may include personally identifiable information (PII) and payment card data.

63
New cards

Human- and Non-Human-Readable Data

Data formats that can be understood by humans (e.g., text, images) and those intended for machine processing (e.g., binary, encrypted data).

64
New cards

Data Classifications

Categories that define the sensitivity and handling requirements of data.

65
New cards

Sensitive Data

Data that requires protection due to its sensitivity and potential impact on individuals, organizations, or society if compromised.

66
New cards

Confidential Data

Data that should be kept private and disclosed only to authorized individuals or entities, often subject to confidentiality agreements or laws.

67
New cards

Public Data

Data intended for unrestricted access and sharing, typically non-sensitive information that can be freely distributed.

68
New cards

Restricted Data

Data with limited access based on specific criteria or authorization requirements, often containing sensitive or confidential information.

69
New cards

Private Data

Data designated for internal use within an organization and not intended for public disclosure.

70
New cards

Critical Data

Data essential to the operation or mission of an organization, the loss or compromise of which could have severe consequences.

71
New cards

Data States

Different conditions in which data can exist.

72
New cards

Data at Rest

Data stored in databases, files, or other storage systems.

73
New cards

Data in Transit

Data being transmitted over a network or communication channel.

74
New cards

Data in Use

Data actively being processed or accessed by applications or users.

75
New cards

Data Sovereignty

Legal concept specifying the jurisdiction under which data is subject to the laws and regulations of a particular country or region.

76
New cards

Geolocation

Identification of the physical location or origin of data, which may have implications for data privacy, security, and compliance.

77
New cards

Methods to Secure Data

Techniques employed to protect data from unauthorized access and breaches.

78
New cards

Geographic Restrictions

Limiting access to data based on the geographic location of users or devices.

79
New cards

Encryption

Converting data into a ciphertext format using cryptographic algorithms to prevent unauthorized access.

80
New cards

Hashing

Generating a unique fixed-size string (hash value) from data input, commonly used for data integrity verification.

81
New cards

Masking

Concealing specific portions of data to prevent unauthorized disclosure while maintaining usability for authorized purposes.

82
New cards

Tokenization

Substituting sensitive data with a non-sensitive equivalent (token) that retains the format and length of the original data but has no exploitable value.

83
New cards

Obfuscation

Intentionally obscuring or hiding data to make it unintelligible or harder to interpret for unauthorized parties.

84
New cards

Segmentation

Dividing networks or systems into isolated segments to contain the spread of threats and limit unauthorized access.

85
New cards

Permission Restrictions

Applying access controls and permissions to data based on user roles, privileges, or other criteria to enforce the principle of least privilege.

86
New cards

Load Balancing

Distributing incoming network traffic across multiple servers to optimize resource utilization, maximize throughput, and ensure high availability.

87
New cards

Clustering

Connecting multiple independent servers or nodes to work together as a single system, providing redundancy and fault tolerance.

88
New cards

Hot Site

Fully equipped facility with infrastructure and systems ready to be operational within a short time frame after a disaster.

89
New cards

Cold Site

Facility lacking pre-installed infrastructure and systems, requiring setup and configuration before becoming operational after a disaster.

90
New cards

Warm Site

Partially equipped facility with some infrastructure and systems in place, reducing the time required for setup compared to a cold site.

91
New cards

Geographic Dispersion

Spreading critical infrastructure and resources across multiple locations to minimize the impact of regional disasters or disruptions.

92
New cards

Platform Diversity

Utilizing a variety of hardware, software, and cloud platforms to mitigate the risk of single points of failure and enhance overall system resilience.

93
New cards

Multi-cloud Systems

Deploying applications and services across multiple cloud providers to increase redundancy, avoid vendor lock-in, and enhance flexibility and resilience.

94
New cards

Continuity of Operations

Ensuring the uninterrupted availability of critical business functions and processes during and after disruptive events or disasters.

95
New cards

Capacity Planning

Assessing and allocating resources to meet current and future demands, including hardware, software, and network infrastructure.

96
New cards

Tabletop Exercises

Simulated discussions and walkthroughs of disaster scenarios to evaluate preparedness, identify gaps, and refine response plans.

97
New cards

Failover

Testing the automatic or manual transfer of operations from a primary to a secondary system or site to ensure continuity.

98
New cards

Simulation

Emulating real-world scenarios to assess the effectiveness of disaster recovery and business continuity plans.

99
New cards

Parallel Processing

Executing tasks simultaneously across multiple systems or nodes to improve performance and resilience.

100
New cards

Backups

Storing backup copies of data and systems either onsite (within the same physical location) or offsite (at a separate location).