The process of placing compute assets in strategic locations to ensure the ability to recover in case of an attack or natural disaster.
2
New cards
disk redundancy
The principle behind writing data to two or more disks at the same time.
3
New cards
network redundancy
The process of adding additional instances of network devices and connections to help ensure network availability and decrease the risk of failure.
4
New cards
Redundant Array of Inexpensive Disks (RAID)
A technology that ensures that a disk failure does not lead to lost data.
5
New cards
multipath
The multiple physical routes established for storage. For example, multipath I/O defines more than one physical path between the CPU in a computer and its mass-storage devices through the buses, controllers, and bridge devices connecting them.
6
New cards
network interface card (NIC) teaming
The process of combining two or more network interfaces to increase network capacity.
7
New cards
generator
A device that provides power to spaces and other devices during complete power loss, blackouts, or in areas where standard electrical service isn’t available.
8
New cards
dual supply
The power that is supplied to the building via multiple paths. It ensures a single path failure does not interrupt power to the building.
9
New cards
managed power distribution unit (PDU)
Essentially, a power strip with multiple outputs designed to distribute electric power, especially designed to deliver power to racks of computers and networking equipment located within a data center.
10
New cards
replication
The process of copying data from one system to another so that a specific data set is in one or more locations.
11
New cards
storage area networks (SANs)
The most common storage networking architecture used by enterprises for business-critical applications that need to deliver high throughput and low latency. By storing data in centralized shared storage, SANs enable organizations to apply consistent methodologies and tools for security, data protection, and disaster recovery.
12
New cards
virtual machine (VM)
A computer file, typically called an image, that behaves like an actual computer.
13
New cards
full backups
The process of creating one or more full copies of all data in a specific set/system.
14
New cards
incremental backups
A series of backup data sets in which daily changes to the data are compared to the state of the data on the previous day. They all have to be applied to the original full backup copy to come up with an up-to-date full backup copy.
15
New cards
snapshot backups
Duplicate copies primarily used to restore a system, virtual machine, and disk or drive to an operational state and to serve as the system’s restore point when the snapshot was taken.
16
New cards
differential backups
The data backups that preserve data, saving only the difference in the data since the last full backup.
17
New cards
tape backups
A magnetic tape or tape cartridges used as storage devices that can hold enormous amounts of data.
18
New cards
disk backups
A data backup and recovery method that backs up data to a hard disk storage unit.
19
New cards
copy backups
The methodology of making a copy of a set of backups.
20
New cards
NAS (network-attached storage) backups
The backups that are copied over the network to a storage array.
21
New cards
cloud backups
The duplicate copies of your computer or entire set of computers saved to cloud-based storage services.
22
New cards
image backups
The images of your entire operating system, including files, executable programs, and OS configurations. With an image backup, you can restore a single file, directory, or entire disk to the same or another device or to a virtual machine.
23
New cards
online vs. offline backups
An online backup places your files onto spare backup data servers. It is called an online backup because it uses the Internet to transfer files. The offline backup is a cold backup. A cold backup is performed while the database is offline and unavailable to its users.
24
New cards
offsite storage backups
The process of ensuring redundancy and protection by securing your data at a remote server away from your premises.
25
New cards
revert to known state
A process in which the desired outcome is to take a system back to a prior moment in time or state of existence.
26
New cards
last known-good configuration
The configuration of a system made just before a problem started.
27
New cards
live boot media
A USB flash drive or external hard disk drive containing a full operating system that can be booted to.
28
New cards
high availability
A characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
29
New cards
diversity
An adequate distance between primary and secondary (or backup) sites; this is an important disaster recovery term.
30
New cards
embedded systems
The microprocessor-based computer hardware systems with software that is designed to perform a dedicated function, either as an independent system or as a part of a larger system.
31
New cards
Raspberry Pi
A low-cost, credit-card-sized computer that plugs into a computer monitor, keyboard, and mouse.
32
New cards
Arduino
An open-source electronics platform based on easy-to-use hardware and software.
33
New cards
**Field-Programmable Gate Array (FPGA)**
An array of programmable logic blocks and a hierarchy of “reconfigurable interconnects” that allow the blocks to be “wired together.” Logic blocks can be configured to perform complex combinational functions, or merely simple logic gates such as the AND gate, OR gate, and NOT gate.
34
New cards
**supervisory control and data acquisition (SCADA)**
The systems capable of managing parts inventories for just-in-time manufacturing, regulating industrial automation and robots, and monitoring process and quality control.
35
New cards
**industrial control systems (ICS)**
The systems that monitor, control, sense, and warn engineers of all aspects of the processes in industrial plants.
36
New cards
logistics
The detailed organization, implementation, and management of the flow of things between points.
37
New cards
Internet of Things (IoT)
A system that is connected to a network or the Internet which is embedded with sensors, software, and other technologies. Examples of IoT systems include industrial control systems (ICS), sensors, thermostats, wearable systems, security cameras, and other systems exchanging data with other systems over the Internet.
38
New cards
sensors
The network devices that inspect network traffic.
39
New cards
smart devices
The devices ranging from A/C systems, garage doors, security systems, TVs, and so on that can be controlled for wired or wireless networks.
40
New cards
wearables
The devices such as smart watches, pedometers, glasses, 3D headsets, and smart clothing that are Internet-aware.
41
New cards
facility automation
A full-service commercial and industrial automatic control system for buildings, factories, and larger facilities.
42
New cards
smart meters
The electronic devices that record information such as consumption of electric energy, voltage levels, current, and power factor. Smart meters communicate the information of consumption behavior to the consumer, and electricity suppliers for system monitoring and customer billing.
43
New cards
**Voice over Internet Protocol (VoIP)**
A process for sending audio signals, primarily voice, over a data network, such as the Internet.
44
New cards
**heating, ventilating, and air conditioning (HVAC)**
The technology of indoor, building, and data center environmental comfort. Its goal is to provide thermal comfort and acceptable indoor air quality.
45
New cards
**multifunction printer (MFP)**
An office machine that incorporates the functionality of multiple devices in one, so as to have a smaller footprint specialized in document management, distribution, and production in a large office setting.
46
New cards
**real-time operating system (RTOS)**
An operating system intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements are measured in tenths of seconds or shorter increments of time.
47
New cards
**system on a chip (SoC)**
An integrated circuit that integrates all or most components of a computer system or other electronic system to perform a complete function.
48
New cards
5G
A fifth-generation advanced wireless network technology developed based on 802.11ac IEEE wireless standard.
49
New cards
**NarrowBand-Internet of Things (NB-IoT)**
An Internet of Things implementation based on low-power wide-area (LPWA) technology developed to enable a wide range of new IoT devices and services.
50
New cards
baseband radio
The original frequency range of transmission signal before it is modulated. It can also refer to the type of data transmission in which analog data is sent over a single nonmultiplex channel.
51
New cards
**subscriber identity module (SIM)**
An integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices like mobile phones and computers. It is widely known as a SIM card.
52
New cards
**Zigbee**
A specification that uses the 2.4 GHz band and a self-healing true mesh network. It was created on the IEEE’s 802.15.4 standard. Zigbee is intended as a simpler and less expensive wireless personal area network (WPAN) alternative to Bluetooth and Wi-Fi.
53
New cards
bollard
A standalone post used for physical security purposes. It is typically steel, short, and sturdy, and anchored in a hard surface such as concrete.
54
New cards
barricade
A defensive barrier constructed to stop or obstruct passage.
55
New cards
access control vestibule
The entries with panels built from prefabricated composite or metal that are used as a way to control ingress/egress of a building, allowing security to have visibility into persons accessing the facility. They can also be used to control the heat and airflow in their facilities.
56
New cards
motion recognition
The capability of newer cameras and software to recognize that something moved or changed position relative to its surroundings or the surroundings to the object.
57
New cards
object detection
A security camera functionality that enables cameras to evaluate and detect any new objects in a specific area, sometimes also employing facial recognition.
58
New cards
**closed circuit television (CCTV)**
video surveillance system that uses video cameras to monitor specific areas.
59
New cards
industrial camouflage
The use of blended images where the surrounding scenery and the camouflaged structure appear as one, with the goal to deceive passersby to believe the structure is something else entirely.
60
New cards
guards
The persons typically deployed at ingress/egress points with the goal of reducing tailgating, verifying identity of scanned ID cards, and ensuring property does not leave the premises.
\
61
New cards
robot sentries
The mechanized guards that provide a 24/7/365 watchman, continuously monitoring and alerting on differentials. Robot sentries report anything out of the normal to the manned security desk/office.
62
New cards
reception
The public-facing part of a business or organization, where a reception desk places a friendly face in front of a visitor, essentially a buffer zone away from strangers accessing anyone in the company. Receptionists vet the person attempting to gain access to the facility or a particular employee.
63
New cards
**two-person integrity/control**
An escort and an observer that are assigned to a particular person doing work in a high-risk area, such as a data center, where a single person can cause massive amounts of damage in a few minutes.
64
New cards
electronic locks
Locks that usually have a magnetic strike plate that is energized to keep the magnet engaged until authorization is given to disengage, thereby releasing the magnetic hold.
65
New cards
physical locks
The traditional locks designed to deter entry by unauthorized users who don’t have a key.
66
New cards
cable locks
The devices typically deployed to secure equipment to stable heavy equipment in a room that is not easily removed. For example, you would use a computer cable lock that connects a laptop computer to a desk or a projector to its cart or stand.
67
New cards
USB data blocker
A device that stops an attacker from connecting a USB drive to a computer and stealing data.
68
New cards
fire suppression
The act of extinguishing fires through the application of a substance.
69
New cards
Faraday cage
An enclosure designed to block any RF signals from entering or leaving, or having an effect on devices inside the cage.
70
New cards
air gap
A concept that refers to the gap or lack of connection between a computer and other networks. Because the computer isn’t directly connected to the network, it can’t be attacked through the network.
71
New cards
screened subnet
One or more routers or firewalls that provide controlled access to company assets like web servers. Previously known as demilitarized zone (DMZ).
72
New cards
**protected cable distribution system (PDS)**
A system designed to deter, detect, and/or make difficult physical access to the communication lines carrying data and/or voice communications.
73
New cards
hot aisle
In its simplest form, a type of data center design that involves lining up server racks in alternating rows with hot air exhausts facing one way and cold air intakes facing the other.
74
New cards
cold aisle
In a hot aisle/cold aisle data center design, the rows are composed of rack fronts.
75
New cards
pulping
A data destruction method where paper is first shredded and then reduced to pulp.
76
New cards
pulverizing
Grinding or shredding media and paper multiple times beyond recognition.
77
New cards
degaussing
A data destruction method involving the reduction or elimination of a magnetic field (or data) stored on tape and disk media such as computer and laptop hard drives, diskettes, reels, cassettes, and cartridge tapes.
78
New cards
digital signatures
Mathematical schemes for verifying the authenticity of digital messages or documents.
79
New cards
key length
The number of bits in an encryption algorithm’s key.
80
New cards
key stretching
A technique used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) needed to test each possible key.
81
New cards
key exchange
Also referred to as key establishment; a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
82
New cards
**elliptic-curve cryptography (ECC)**
An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
83
New cards
perfect forward secrecy
A feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised.
84
New cards
**quantum cryptography**
The science of exploiting quantum mechanical properties to perform cryptographic tasks.
85
New cards
**post-quantum cryptography**
The use of cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer.
86
New cards
**ephemeral keys**
Cryptographic keys that can be used more than once within a single session, such as for broadcast applications, where the sender generates only one ephemeral key pair per message, and the private key is combined separately with each recipient’s public key.
87
New cards
authenticated mode
An encryption type that includes authentication (or authenticated encryption \[AE\]) and authenticated encryption with associated data (AEAD). With AE, the requirement is to both protect the privacy of the message and to ensure authenticity. A method for achieving both of these goals at the same time is called authenticated encryption.
88
New cards
unauthenticated mode
An encryption protocol that provides no authentication of the encrypted data.
89
New cards
counter mode
An encryption mode that uses an arbitrary number (the counter) that changes with each block of text encrypted. The counter is encrypted with the cipher, and the result is XOR’d (exclusive OR’d) into ciphertext. Because the counter changes for each block, the problem of repeating ciphertext that results from the Electronic Code Book method is avoided.
90
New cards
blockchain
A specific type of database. It differs from a typical database in the way it stores information; a blockchain stores data in blocks that are then chained together. As new data comes in, it is entered into a fresh block. Once the block is filled with data, it is chained onto the previous block, which makes the data chained together in chronological order.
91
New cards
public ledger
Information organized into a long chain of blocks. When a buyer and seller engage in a transaction, the blockchain verifies the authenticity of their accounts. This is done by using the public ledger and by checking if the funds are available to proceed with the transactions.
92
New cards
cipher suite
A set of algorithms that helps secure a network connection that uses Transport Layer Security (TLS). The set of algorithms that cipher suites usually contain includes a key exchange algorithm, bulk encryption algorithm, and message authentication code (MAC) algorithm.
93
New cards
stream cipher
A way of combining plaintext digits with a pseudorandom cipher digit stream, or keystream.
94
New cards
block cipher
An encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text instead of encrypting one bit at a time as in stream ciphers.
95
New cards
symmetric encryption
An encryption algorithm implementation that uses a single key that needs to be shared among the people who need to receive the message.
96
New cards
asymmetric encryption
A process that uses a public-key and private-key pair to encrypt and decrypt messages when communicating.
97
New cards
lightweight cryptography
An encryption method that features a small footprint and/or low computational complexity. It is aimed at expanding the applications of cryptography to constrained devices such as the ever-expanding IoT market.
98
New cards
**steganography**
The practice of hiding a secret message inside of or even on top of something that is not secret, such as an image, video, or audio file.
99
New cards
**audio steganography**
A technique used to transmit hidden information by modifying an audio signal in an imperceptible manner.
100
New cards
**video steganography**
A technique to hide any kind of file in a cover video file.