Domain 2.0 Architecture/Design

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 230

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

231 Terms

1

Diagrams

Visual representations created by network professionals to outline configurations such as servers, routers, and switches, often made using tools like Microsoft Visio.

New cards
2

Baseline Configuration

Minimum setup required for systems, including software, firewall settings, antivirus, etc., with the creation of an image deployed to all desktops.

New cards
3

Standard Naming Conventions

Company-specific naming of systems and devices, ensuring consistency across departments like Accounting, Marketing, etc.

New cards
4

IP schema

Internal IP addressing using private IP addresses like 10.x.x.x, 192.168.10.x, etc., allocated to different departments for network organization.

New cards
5

Data Sovereignty

Data subject to laws and governance of the nation where it is collected, emphasizing restrictions on data transfer between countries.

New cards
6

DLP

Data Loss Prevention software to stop confidential data from leaving the organization, crucial for industries like Healthcare and Finance.

New cards
7

Masking (Data Masking)

Technique to conceal confidential data for internal sharing without compromising security, not used for payment transactions.

New cards
8

Tokenization

Data protection method replacing sensitive data with non-sensitive placeholders, meeting PCI DSS requirements for secure storage.

New cards
9

Encryption

Process of encoding data to make it unreadable to unauthorized users, ensuring data security and integrity.

New cards
10

Data States

Data classification into At rest, In transit, and In-use states, each requiring specific security measures like encryption and access controls.

New cards
11

IRM

Information Rights Management secures information to prevent unauthorized access or copying by individuals or businesses.

New cards
12

HSM (Hardware Security Module)

Physical computing module managing cryptographic keys securely within servers or devices.

New cards
13

Geographical Considerations

Legal implications and regulations based on the geographical region where data is created or stored, impacting data access and storage.

New cards
14

Response and Recovery Controls

Procedures and software to respond to security incidents and recover data from backups or reimaging computers.

New cards
15

SSL/TLS Inspection

Inspection of SSL/TLS traffic for malware, ensuring secure connections and trust via certificates from Certificate Authorities.

New cards
16

Hashing

Process of transforming data into a short code (hash) for data integrity verification, using algorithms like MD5, SHA 1, etc.

New cards
17

API considerations

Vulnerabilities related to API usage, including on-path attacks, API injections, and DDoS attacks, requiring security measures.

New cards
18

Cold Site

Alternative site without equipment or data, used in case of disaster recovery, taking weeks to relocate equipment.

New cards
19

Warm Site

Site with some equipment ready for use, requiring a few days for setup, suitable for faster recovery than a cold site.

New cards
20

Hot Site

Replica of the main data center with all equipment ready for immediate use, ensuring quick data recovery within hours but being the most expensive option.

New cards
21

SECaaS

Security as a Service (SECaaS) provides various security services to organizations without the need for maintaining a cybersecurity staff.

New cards
22

Public (Cloud)

A cloud service provider offers resources over the Internet, cost-effective, and efficient for organizations, utilizing a multitenant model.

New cards
23

Private (Cloud)

A company creates its own cloud environment for internal use, responsible for design, operation, and hosting, suitable for high-security needs.

New cards
24

Hybrid (Cloud)

Combines benefits of public and private cloud, allowing organizations to use both resources, with strict data hosting rules.

New cards
25

Community Cloud

Shared cloud service for specific organizations or employees with similar security and compliance needs, sharing resources and costs.

New cards
26

CSP

Cloud Service Provider (CSP) offers cloud-based services like platforms, infrastructure, applications, or storage.

New cards
27

MSP

Managed Service Provider (MSP) manages technology aspects for clients, sometimes offering cloud services, including network management and disaster recovery.

New cards
28

MSSP

Managed Security Service Providers (MSSP) specialize in IT security, managing firewall, patching, security audits, and emergency responses.

New cards
29

On-Premises vs Off-Premises

On-Premises services run locally, while Off-Premises services are hosted externally, often in third-party data centers.

New cards
30

Cloud Computing Pros & Cons

Cloud computing offers on-demand computing, massive data storage, and fast implementation but may face challenges like latency and data protection.

New cards
31

Edge Computing

Technology processing data on devices themselves, reducing latency, suitable for devices with poor connectivity.

New cards
32

Fog Computing

Data preprocessing at local gateways before sending to the cloud, reducing latency and enabling local decisions from local data.

New cards
33

Thin Clients

Simple computers optimized for connecting to virtual desktops, running applications on remote servers with minimal local operating system.

New cards
34

Containers

Provide reproducible compute environments with code and dependencies, self-contained applications running inside a small OS.

New cards
35

API's

Application Programming Interfaces connect applications in microservice architecture, acting as the glue for scalable, resilient, and secure applications.

New cards
36

IaC

Infrastructure as Code automates infrastructure management and provisioning using scripted code, common in cloud technologies for efficient configuration.

New cards
37

SDN

Software Defined Network routes packets through a software-based controller, improving security, performance, and control in a network.

New cards
38

SDV

Software Defined Visibility monitors network traffic flow, enabling understanding of data flow and deployment of security devices.

New cards
39

Serverless Architecture

Backend as a Service where a third-party hosts applications, allowing building and running applications without managing infrastructure.

New cards
40

Services Integration

Combining business and IT services seamlessly to provide a single solution for businesses.

New cards
41

Normalization

Process of organizing databases to eliminate redundancies and inconsistent dependencies, making the database more secure and fast.

New cards
42

Stored Procedure

Reusable prepared SQL code that prevents code modification by attackers and uses parameterized queries to prevent SQL injections.

New cards
43

Obfuscation

Process of hiding or masking source code to prevent understanding by competitors or attackers, using techniques like XOR, ROT13, and steganography.

New cards
44

Code Reuse

Practice of reusing high-quality code from code libraries to develop applications efficiently.

New cards
45

Dead Code

Code that is never executed and should be removed promptly to avoid consuming unnecessary resources.

New cards
46

Server-side vs

Distinguishing between server-side (backend) and client-side (front-end) code execution and validation for security and performance.

New cards
47

Memory Management

Writing code to minimize memory consumption, prevent memory leaks, and avoid buffer overflows for secure and efficient applications.

New cards
48

Use of 3rd Party Libraries

Incorporating third-party libraries to extend programming language functionality, balancing application features with potential security risks.

New cards
49

Software Development Kits (SDK)

Set of tools created by vendors to facilitate application development, which may introduce security vulnerabilities if not selected carefully.

New cards
50

Data Exposure

Securing application data through encryption, limited access, input validation, and data protection techniques to prevent theft by attackers.

New cards
51

OWASP

Open Web Application Security Project, an organization focused on improving software and web security through open-source initiatives and community education.

New cards
52

Compiler

Software that translates high-level programming language code into machine code for computer execution.

New cards
53

Binary

Numbering scheme with two possible values (0 or 1) used in computing systems for operational instructions and user input.

New cards
54

Automated Courses of Action

Using technology to automate IT processes, such as incident responses in a SOAR system for efficient threat management.

New cards
55

Automation

Process of automating tasks through scripts or GUI to eliminate the need for human intervention.

New cards
56

Continuous Monitoring

Logging system failures and security vulnerabilities for timely remediation.

New cards
57

Continuous Deployment

Automatically pushing changes to the production environment after testing.

New cards
58

Continuous Delivery

Fixing bugs before moving an application into production, typically in the staging environment.

New cards
59

Continuous Validation

Testing applications to ensure they meet requirements and function as intended.

New cards
60

Continuous Integration

Process where multiple developers consolidate and test code in the test environment to ensure functionality.

New cards
61

Elasticity

Automatically adjusting resources to meet demand for efficient resource utilization, commonly seen in cloud computing.

New cards
62

Scalability

Ability to increase capacity either vertically or horizontally to accommodate growing operational demands.

New cards
63

Version Control

Managing and tracking changes to software code using version control systems.

New cards
64

Directory Services

Storing and managing information about objects like user accounts and resources, commonly used for authentication like Microsoft Active Directory.

New cards
65

Federation Services & Authentication

Collection of domains with established trust for shared access to resources, used for authentication between different organizations.

New cards
66

SAML

Security Assertion Markup Language, an XML-based authentication standard for passing credentials between companies.

New cards
67

Attestation

Confirming device compliance with company policies, often done remotely for device verification.

New cards
68

Smart Card Authentication

Using integrated circuit cards for physical and digital access, often with multiple factors of authentication like PIN or fingerprint.

New cards
69

TOTP

Time-Based One-Time Password algorithm for generating time-sensitive login credentials.

New cards
70

HOTP

HMAC-based One-Time Password algorithm for event-based OTP using a counter and secret key.

New cards
71

HOTP vs

Comparison between HOTP and TOTP authentication methods, where TOTP is time-based and HOTP is event-based.

New cards
72

Short Message Service (SMS) Authentication

Authentication method using text messages, less secure than authentication apps and biometrics.

New cards
73

Push Notification (Authentication)

Sending authentication information to mobile devices via push notifications, considered more secure than SMS but may have vulnerabilities.

New cards
74

Authentication Applications

Software-based authenticators implementing 2-step verification using TOTP and HOTP algorithms for secure user authentication.

New cards
75

Static Codes

A set of unchanging numbers or letters used for authentication, like passwords or passphrases.

New cards
76

Token key

A one-time password generated by software or hardware for authentication purposes.

New cards
77

Fingerprint (Biometrics)

Biometric authentication based on unique fingerprint patterns.

New cards
78

Retina (biometric)

Biometric authentication using retinal scans.

New cards
79

Iris (biometric)

Biometric authentication based on iris scans.

New cards
80

Voice Recognition (Biometrics)

Authentication based on voice patterns.

New cards
81

Facial Recognition

Authentication based on facial features.

New cards
82

Veins (Biometrics)

Authentication based on the unique vein patterns in the body.

New cards
83

Gait Analysis (for biometrics)

Authentication based on the unique way a person walks.

New cards
84

FAR

False Acceptance Rate, where an unauthorized user is mistakenly authenticated.

New cards
85

FRR

False Rejection Rate, where an authorized user is wrongly rejected.

New cards
86

CER

Crossover Error Rate, where FAR equals FRR for optimal biometric accuracy.

New cards
87

Efficacy Rates

Measure of biometric system accuracy, with lower rates indicating fewer errors.

New cards
88

Factors

Different characteristics used for authentication, including something you know, have, or are.

New cards
89

AAA

Authentication, Authorization, and Accounting framework for centralized services.

New cards
90

MFA

Multi-Factor Authentication, using multiple factors for enhanced security.

New cards
91

Cloud versus On-Premises Authentication

Contrasting centralized cloud-based and local on-premises authentication.

New cards
92

Redundancy

Duplicating system parts for continuous availability in case of failures.

New cards
93

Geographical Dispersal

Creating redundant systems in different geographical locations for uptime.

New cards
94

RAID

Redundant Array of Independent Disks, a method of storing data across multiple drives for redundancy and performance.

New cards
95

RAID 5

Utilizes a minimum of 3 hard drives, distributes parity information across disks for redundancy, can withstand the failure of one drive, and offers fault tolerance.

New cards
96

RAID 6

Requires a minimum of 4 hard drives, similar to RAID 5 but with an additional disk for parity, can tolerate the loss of 2 drives due to double parity.

New cards
97

Most Common RAID Types

RAID 0, 1, and 5 are widely used for various purposes, balancing performance and redundancy.

New cards
98

Load Balancers

Devices distributing network/application traffic across servers, ensuring active servers, and providing redundancy.

New cards
99

NIC Teaming

Combining multiple network adapters into a virtual NIC for performance, load balancing, and redundancy, commonly done on Windows Servers.

New cards
100

Power Redundancies

Include UPS, generators, dual supply, and PDUs to ensure continuous power supply and protect against failures.

New cards

Explore top notes

note Note
studied byStudied by 1 person
74 days ago
4.0(1)
note Note
studied byStudied by 3 people
113 days ago
5.0(1)
note Note
studied byStudied by 1 person
112 days ago
5.0(1)
note Note
studied byStudied by 472 people
781 days ago
4.0(1)
note Note
studied byStudied by 4 people
148 days ago
5.0(1)
note Note
studied byStudied by 53 people
705 days ago
5.0(1)
note Note
studied byStudied by 5 people
288 days ago
5.0(1)
note Note
studied byStudied by 462 people
156 days ago
4.0(2)

Explore top flashcards

flashcards Flashcard (25)
studied byStudied by 45 people
820 days ago
4.0(1)
flashcards Flashcard (69)
studied byStudied by 111 people
344 days ago
5.0(2)
flashcards Flashcard (45)
studied byStudied by 220 people
111 days ago
5.0(1)
flashcards Flashcard (126)
studied byStudied by 4 people
686 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 14 people
834 days ago
5.0(2)
flashcards Flashcard (98)
studied byStudied by 237 people
370 days ago
5.0(6)
flashcards Flashcard (62)
studied byStudied by 29 people
917 days ago
4.5(2)
flashcards Flashcard (28)
studied byStudied by 4 people
30 days ago
5.0(1)
robot