3.1 Security Architecture Flashcards

1
Q

Fundamental Security Architectural Considerations

A

High Availability: Ensuring continuous system operation.
Durability: Protecting data from loss or corruption.
Resilience: Ability to recover from failures and disruptions.
Scalability: Ability to handle increasing workloads.
Responsiveness: System performance and responsiveness.
Cost-Effectiveness: Balancing cost with performance and security.
Ease of Deployment: Simplifying deployment and maintenance.
Risk Transference: Shifting risks to third-party providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Computing

A

IaaS (Infrastructure as a Service): Provides computing resources like servers, storage, and networking.
PaaS (Platform as a Service): Provides a platform for developing and deploying applications.
SaaS (Software as a Service): Provides software applications over the internet.
Shared Responsibility Model: Defines the division of security responsibilities between the cloud provider and the customer.
Hybrid Cloud: Combines public and private cloud environments.
Third-Party Vendors: External providers offering cloud services or solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure as Code (IaC)

A

Automation of Infrastructure: Using code to provision and manage infrastructure.
Configuration Management: Ensuring consistency and reproducibility.
Version Control: Tracking changes to infrastructure configurations.
Increased Efficiency: Streamlining deployment and maintenance processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Serverless Technologies

A

Function as a Service (FaaS): Executing code without managing servers.
Serverless Containers: Running containers without managing servers.
Serverless Databases: Managing databases without managing servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Containers and Microservices

A

Containers: Standardized software packages that include everything needed to run an application.
Microservices: Architectural style that breaks down applications into small, independent services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Infrastructure

A

Physical Isolation: Separating networks physically to reduce attack surface.
Logical Segmentation: Dividing networks into smaller segments to limit the impact of attacks.
Software-Defined Networking (SDN): Centralized network control and management.
Network Topologies: Various network configurations (e.g., star, bus, ring, mesh)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Industrial Control Systems (ICS) and SCADA

A

ICS: Control systems for industrial processes.
SCADA: Systems for monitoring and controlling industrial processes.
Vulnerabilities: Security risks associated with ICS and SCADA systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet of Things (IoT)

A

Connected Devices: Devices with internet connectivity.
Security Challenges: Protecting IoT devices from attacks.
Data Privacy and Security: Ensuring the privacy and security of IoT data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly