Sec+ 3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/108

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

109 Terms

1
New cards

Hybrid cloud

more than one public or private cloud

2
New cards

infrastructure as code

Define servers, networks, and apps as code

3
New cards

FaaS

Function as a Service means applications are separated into individual autonomous functions

4
New cards

Monolithic architecture

is one big application that does everything

5
New cards

API

Application programming interfaces break an application into microservices to extend the use of an app

6
New cards

Physical Isolation

Air gap meaning physically separating infrastructure.

7
New cards

SDN

Software Defined Networking has data, control and management planes

8
New cards

Data plane

An infrastructure layer that forwards traffic. Also, where encryption and Network address translation (NAT) happen.

9
New cards

Control plane

Manages the actions of the data plane. Routing tables, session tables, and NAT tables.

10
New cards

Application Layer

Configure the management to the device, SSH, Browser, API

11
New cards

On premises security

Control of all data makes security better as you have your own.

12
New cards

Decentralized

having data in many locations. Makes it difficult to manage. Some have a centralized console to manage this. Has a single point of failure

13
New cards

Container

Running multiple apps on the OS directly. Can not interact with other apps

14
New cards

SCADA

Supervisory control and data acquisition system hardware for factories.Has no access to the outside

15
New cards

RTOS

A real-time operating system is an OS that focuses on one process at a time. When you hit your brakes really hard

16
New cards

Embedded Systems

hardware designed for a specific function

17
New cards

High availability

Means there is always something available in case of failure. not redundancy

18
New cards

Availability

have the most uptime as possible

19
New cards

Resilience

How much time something can recover. MTTR, mean time to repair, is how long it will take to repair something.

20
New cards

Cost

How much does everything costs

21
New cards

Responsiveness

How quickly does the app respond

22
New cards

Scalability

How quickly and easily can we increase or decrease capacity. Also called elasticity

23
New cards

Ease of Deployment

If the infrastructure and software are easily deployable

24
New cards

Risk transference

methods to minimize risk 

25
New cards

Ease of recovery

how ealy can you recover

26
New cards

Patch Availability

How often can you update an OS or app

27
New cards

Inability to patch

for embedded systems, so add additional security like a firewall if connected to a network

28
New cards

Power

Need power for everything to function. UPS (uninterruptible power supply) as a backup

29
New cards

Compute

What does the processing for the hardware

30
New cards

Device placement

devices are placed specifically in a network, firewalls, honeypots, etc

31
New cards

Security zones

trusted and untrusted zones that allow and disallow IP address ranges

32
New cards

Attack surface

patching all openings in your network

33
New cards

Connectivity

secure cabling, app-level encryption, VPN

34
New cards

IPS

intrusion prevention system prevents harmful info from getting in

35
New cards

IDS

intrusion detection systems stop it before it gets into the network

36
New cards

Fail open

When a system fails, data continues to flow 

37
New cards

Fail closed

When a system fails, data does not flow

38
New cards

Active monitoring

Analyzing of traffic.Usally IPS. 

39
New cards

Passive monitoring

Normal network, but copies of traffic are sent to IPS. If the company doesn’t want the IPS to filter out everything

40
New cards

Jump Server 

A server that restricts and reroutes traffic to specific servers 

41
New cards

Proxy server

A server that sends and receives requests for users. If the request was already made, it provides the same response to multiple users

42
New cards

Application proxy

Like HTTP,or HTTPS

43
New cards

Port Security

Connecting to a wired or wireless network or switches with a password.

44
New cards

EAP

Extensible Authentication Protocol is away to authenticate

45
New cards

IEE 802.1x/NAC

Network Access Control provides access to the network if EAP says the authentication is successful

46
New cards

Supplicant

The client who sends a request to the authenticator, who asks for login credentials (EAP request), then sends an EAP response, Ask for anything extra and logs in.

47
New cards

Authenticator

the device that provides access

48
New cards

authentication server

validates clients credentials

49
New cards

Network Based Firewalls

controls through purpose-built client. Older use OSI layer 4 vs newer use OSI layer 7. Can also have VPNs and operate as routers (OSI 3)

50
New cards

UTM

older firewalls that combine mutiple services like URL filtering, malware inspection, spam filtering, router, and IDS.IPS, bandwidth, and more. OSI layer 4

51
New cards

NGFW

Next Generation Firewalls operate on OSI layer 7. See everything over a network

52
New cards

WAF

Web Application Firewall is designed to analyze input in web-based applications. Catch SQL injections

53
New cards

VPN

Send encrypted data over a public network

54
New cards

Concentrator

encryption device often integrated with VPN and firewalls

55
New cards

Headers

add headers to a packet specifically ipsec header and trailer to encrypt it

56
New cards

SSL/TLS VPN

Secure socket layer/ transport layer VPN uses tcp443 giving easy access through firewalls.

57
New cards

Site to Site VPN

Firewall that act as VPNs. They are on both side of the tunnel

58
New cards

SD-WAN

Software-defined Networking is a WAN built for the cloud. Can communicate with the data center or straight to the cloud.

59
New cards

SASE

Secure Access Service Edge is a VPN that allows communication to the cloud.

60
New cards

Regulated data

3rd party controls how your data is protected.

61
New cards

Legal Information

Legal records of data are stored in different systems, usually within the court itself.

62
New cards

Human readable

Data types humans can read

63
New cards

Non-Human readable

Data humans can’t read, barcode, images, encoded

64
New cards

human and non human

XML, JSON, CSV are a mix of non-human and human data

65
New cards

Proprietary data

Data that is property of a specific organization

66
New cards

PII

Personally Identifiable Information is data that can be tied to a specific person. Name, date of birth, mother’s maiden name biometric information.

67
New cards

PHI

Protected Health Information is all health data of an individual

68
New cards

Sensitive data

lowest tier, Intellectual property, PII, PHI

69
New cards

Confidential

2nd tier, must be approved to view

70
New cards

Public/ Unclassified data

No restrictions on viewing of data

71
New cards

Private/ Classified/ Restricted

3rd tier, may require you to sign an NDA

72
New cards

Critical

Data that should always be accessible

73
New cards

Data at rest

Any data on SSD, Flash Drive, Hard Drive. Should be encrypted with permissions

74
New cards

Data in Transit

Any data going over a network. Needs to be encrypted over a network like a firewall and IPS. To encrypt the data themselves, use TLS and IPsec

75
New cards

Data in Use

Data that is being processed by your CPU and by RAM. Almost always non-encrypted and the most vulnerable.

76
New cards

Data Sovereignty

Data laws specific to a country. Where it’s stored and how it’s transported

77
New cards

Geolocation data

802.11, GPS can give info about yourself to apps and companies.

78
New cards

Geographic restrictions

Restrict access to certain data through geography, called geofencing. IP subnet for wired. Geolocation for wireless.

79
New cards

Cyphertext

encrypted data usually with a key. Can be decrypted

80
New cards

SHA256

Hashing Algorithm that outputs 256 bits in 64 hexadecimal characters

81
New cards

Masking

only shows a part of the data hides the rest. Full data may be in storage

82
New cards

Segmentation

Separates data into multiple databases in different locations

83
New cards

Permission restrictions

logins and file permissions based on what kind of user you are

84
New cards

High availability

Everything is running, and if one system fails, another system will run. More expensive due to higher quality and more power

85
New cards

Server Clustering

combines servers to make one big server. Can increase or decrease capacity by adding or removing servers. All servers know each other

86
New cards

load balancing

A device distributes data through servers. Other servers don’t know they exist. Also remove a broken server

87
New cards

Hot Site

Exact copy of your data center, but nothing is running.

88
New cards

Cold Site

An empty building that needs hardware

89
New cards

Warm Site

A mix between hot and cold has some infrastructure and info, but more is needed

90
New cards

Geographic dispersion

Have recovery sites spaced but not to far from each other.

91
New cards

Platform Diversity

Have different OS for different purposes to limit vulnerabilities.

92
New cards

COOP

Continuity of operations planning is a plan in case something goes wrong to continue operations. Give paper receipts instead of automated receipts

93
New cards

People

Based on how many employees and where they are needed to control capacity

94
New cards

Technology

What technology do we need the most of based on demand? Web services or database services

95
New cards

Infrastructure

How much memory, CPU, Storage, etc do we need

96
New cards

Tabletop Exercise

going through the steps of a disaster recovery plan. Changes and critiques can be made here

97
New cards

Fail Over

See if redundant configurations can work when the main ones shut off

98
New cards

Simulation

test phishing, password requests, and data breaches. Test if automated systems and people work

99
New cards

Parallel Processing

Using multiple CPUs to handle transactions, if one fails, it can bounce onto another

100
New cards

On site Backup

Backup is stored on location and easier to access. Used for short term