2.0 Flashcards
MFD
Multifunction devices
A device, such as a printer, with multiple functions, such as printing and scanning.
SoC
System on a Chip
The integration of complete system functions on a single chip in order to simplify construction of devices.
RTOS
Real-Time Operating System
Are designed for devices where the processing must occur in real time and data cannot be queued or buffered for any significant length of time.
IaaS
Allows an organization to outsource its equipment requirements, including the hardware and all support operations. The IaaS service provider owns the equipment, houses it in its data center, and performs all the required hardware maintenance.
Ex. Amazon Web Services (AWS), Microsoft Azure
SaaS
Software as a Service
Any software or application provided to users over a network such as the Internet. Internet users access the SaaS applications with a web browser.
Ex. Gmail, Yahoo! Mail, Google Docs, One Drive etc.
PaaS
Platform as a Service
provides customers with a preconfigured computing platform they can use as needed. It provides the customer with an easy-to-configure operating system, combined with appropriate applications and on-demand computing.
Ex. Salesforce, Github, Docker
TOTP
Time-based One-Time Password
A password that is used once and is only valid during a specific time period.
WAF
Web Application Firewall
A firewall that operates at the application level, specifically designed to protect web applications by examining requests at the application stack level.
Public Cloud
A cloud service that is rendered over a system open for public use. Services are available from third-party companies, such as Amazon, Google, Microsoft, and Apple.
Community Cloud
A cloud system is one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor.
Private Cloud
A cloud system where it is essentially reserved resources used only by your organization if your organization is highly sensitive to sharing resources.
Hybrid Cloud
Is a combination of two or more clouds. They can be private, public, community, or a combination of these.
Federation
Defines policies, protocols, and practices to manage identities across systems and organizations. Federation’s ultimate goal is to allow users to seamlessly access data or systems across domains.
Ex. Provide network access to others, not just employees but partners, suppliers, customers, etc.
DNS sinkhole
Domain Name System sinkhole
This is a technique used to redirect malicious or unwanted traffic to a specific IP address. It’s often used as a security measure to block access to malicious domains or to filter out unwanted content.
Honeynet
A network designed to look like a corporate network but is made attractive to attackers. A honeynet is a collection of honeypots.
Honeypot
It is a server that is designed to act like a real server on a corporate network, but rather than having real data, the honeypot possesses fake data.
Screened subnet (formerly known as DMZ)
Demilitarized zone
A network segment that exists in a semi-protected zone between the Internet and the inner, secure trusted network.
UPS
Uninterruptible power supply
Provides short-term power and can protect against power fluctuations.
Blockchain
A distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes.
Keeps track of transactions.
Asymmetric encryption
Uses two keys (public and private) created as a matched pair.
Symmetric encryption
Uses the same key to encrypt and decrypt data.
Faraday cage
Room/ cage that prevents radio frequency (RF) signals or Electromagnetic interference (EMI) from entering into or emanating beyond a room.
Obfuscation
Altering the format, structure, or presentation of data or code without changing its functionality, making it challenging for adversaries to interpret or exploit the information.
Key stretching
Cryptographic technique used to enhance the security of passwords or cryptographic keys by increasing their complexity and resistance to brute-force attacks.
Digital signature
An electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents. Used for non-repudiation and integrity.
MSP/MSSP
Managed Service Provider/ Managed Service Provider
A third party that manages and maintains the security environment for companies.
MSP support
– Network connectivity management
– Backups and disaster recovery
– Growth management and planning
Continuous monitoring
To describe the technologies and processes employed to enable rapid detection of compliance issues and security risks. Check for a particular event, and then react.
Stored Procedure
Stored procedures are precompiled scripted methods of data access (SQL)
Normalization
The process of creating the simplest form, of a string, before processing. To reduce and eliminate redundancy
Attestation
Attestation can be done by a service that checks the credentials supplied, and if they are correct and match the required values, the service can attest that the entry is valid or correct.
HOTP
HMAC-based One-Time Password algorithm
Keyed-hash message authentication code (HMAC). The keys are based on a secret key and a counter. Use them once, and never again.
HE
Homomorphic Encryption
A set of algorithms that allows operations to be conducted on encrypted data, without decrypting and reencrypting.
ECC
Elliptic curve cryptography
An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. As a public-key cryptosystem, it relies on an asymmetric algorithm.
Ex. of use is for mobile devices
Key exchange
A cryptographic method used to share cryptographic keys between two entities.
Ephemeral keys
Cryptographic keys that are used only once after generation.
Diffie–Hellman key exchange
Cryptographic protocol used to securely exchange encryption keys over an insecure medium.
Perfect forward secrecy
A feature of cryptographic systems that ensures that even if a long-term secret key is compromised, past communications remain secure. Generates random public keys for each session
Steganography
hides data inside other data, it hides data in plain sight. The goal is to hide the data in such a way that no one suspects there is a hidden message.
Stream Cipher
Encrypts data as a stream of bits or bytes rather than dividing it into blocks. It is done one at a time
Block
A block cipher encrypts plaintext one block at a time.
IP schema
An IP address plan or model
IRM
Information Rights Document
To control how data is used. Restrict data access to unauthorized persons.