3.0 Architectures and Designs Flashcards
The use of multiple layers of security to protect resources. Controlled Diversity and Vendor Diversity are two methods organizations implement to provide this.
Defense-in-Depth
The practice of implementing security controls from different vendors to increase security.
Vendor Diversity
The use of different security control types such as technical controls, administrative controls, and physical controls.
Control Diversity
Security controls implemented via administrative or management methods.
Administrative Control
Security controls implemented through technology.
Technical Control
A network architecture that is situated between an untrusted network and a protected network and acts as a protective buffer zone between the two networks.
DMZ (Demilitarized Zone)
The part of an internal network shared with outside entities. They are often used to provide access to authorized business partners, customers, vendors, or others.
Extranet
An internal network. People use this to communicate and share content with each other.
Intranet
A service that translates public IP address to private IP address and vice versa.
NAT (Network Access Translation
A connection mode used by wireless devices without an access point. When wireless devices connect through an access point they are using infrastructure mode.
AD HOC
A method of segmenting traffic, it logically groups several different computers together without regard of their physical location.
VLAN (Virtual Local Area Network)
A technology that allows you to host multiple virtual machines on a single physical system.
Virtualization
A physical security control that provides physical isolation. Systems separated by this don’t typically have any physical connections to other systems.
Airgap
A dedicated device used for VPNs that includes all the services needs to create a VPN, including strong encryption and authentication techniques.
VPN Concentrator
Devices used to handle TLS traffic. Servers can offload TLS traffic to improve performance.
SSL Acelerator
Hardware of software that balances the load between two or more servers.
Load Balancer
An attack on a system launched from multiple sources, intended to make a computers resources or services unavailable to users.
DDoS (Distributive Denial of Service)
A method to encrypt an entire disc.
FDE (Full Disc Encryption)
A drive that includes the hardware and software necessary to encrypt a hard drive.
SED (Self Encrypting Drive)
Hardware chip on a motherboard included in many laptops and some mobile devices.
TPM (Trusted Platform Module)
A removable or external device that can generate, store, and manage RSA keys using asymmetric encryption.
HSM (Hardware Security Module)
A method used to boot some systems and intended to replace BIOS firmware.
UEFI/BIOS
Interference caused by motors, power lines, and fluorescent lights.
EMI/EMP (Electromagnetic Interference/ Pulse)
A freestanding device that operates in a largely self-contained manner.
Appliance
A core principle of secure system design. Systems should be deployed with only the services, application, and protocols needed to meet their purpose.
Least Functionality