Chapter 3 Flashcards

1
Q

Infrastructure as a Service (IaaS)

A

A cloud computing service model that provides computing resources on demand, such as storage, servers, networking, and virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Platform as a Service (Paas)

A

A cloud computing model that provides a complete environment for developers to build, test, deploy, and manage applications. PaaS allows developers to focus on their code without having to worry about the underlying infrastructure, such as servers, storage, and networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a Service (SaaS)

A

A cloud-based software delivery model that allows users to access software through the internet on a subscription basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hybrid Cloud

A

Using more than one cloud provider. Adds additional flexibility but also adds complexity to the system. Most cloud provider systems do not talk to each other directly, so manual configuration of things like authentication, Firewalls, and server settings may be needed. Cloud providers use different security monitoring systems, as well as different logging terminology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Leakage

A

Data stored in the cloud often needs to traverse the public internet which exposes it to attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure as Code

A

Code architecture exists that allows you to define a cloud infrastructure such as servers, network, and applications. This allows you to reduce the human error that can occur manually creating the infrastructure. Also allows you to modify and create versions of the infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Function as a Service (FaaS)

A

Applications can be separated into individual autonomous functions. Each function performs a small part of the application. These functions are commonly event triggered, and can be built in real time as the event is triggered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monolithic Applications

A

One big application that does everything you need. This is the traditional way of writing applications. One single executable is handling all user interface, logic, and data input and output. This makes the application take up a lot of storage space and have a large codebase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Programming Interface (API)

A

Allows programs to access code written elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microservice

A

Uses APIs to create multiple smaller programs that handle discrete parts of an application. If one of the microservices goes down the rest will continue to work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Air Gap

A

Physically separating devices. If one device is compromised it wont compromise the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual Local Area Networks (VLANs)

A

A logical segmentation that allows the segmentation of data on the same device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software Defined Networking (SDN)

A

Splitting functions into separate logical units to extend the functionality and management of a single device. Separates the control functions from the forwarding functions. 3 layers of SDN architecture: Infrastructure Layer, Control layer, Application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Infrastructure Layer

A

Data plane. Process the network frames and packets. Forwarding, trunking encrypting, NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control Layer

A

Manages the actions of the infrastructure layer. Routing tables, session tables, NAT tables. Dynamic routing protocol updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application Layer

A

Management Plane. Configures and manages the device. SSH, browser, API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantages of Cloud based Infrastructure

A

Security is centralized and costs less. No on site hardware or data center to secure. A third party handles everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virtualization

A

Allows you to run many different operating systems on the same hardware. Each application instance has its own operating system, which adds overhead and complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Containerization

A

A segmentation that contains everything you need to run an application, including code and dependencies. A standardized unit of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Container

A

An isolated process that is a self contained system. Apps can’t interact with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Container image

A

A standard for portability. Lightweight and uses the host kernel. Secure separation between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Internet of things (IOT)

A

Devices that are integrated into your network. Smart devices, sensors, wearable tech. Convenient but often not very secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Supervisory Control and Data Acquisition System (SCADA)

A

Used to monitor the status of large scale industrial equipment. Requires extensive segmentation, no access from the outside. Many SCADA systems are incredibly secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Industrial Control Systems (ICS)

A

used to network together large pieces of machinery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Real Time Operating System (RTOS)

A

An operating system with a deterministic processing schedule. Makes sure that actions are performed within a time constraint. Will dedicate all resources to important tasks immediately. Used in industrial equipment, automobiles, and military environments. Extremely sensitive to security issues. No time for antivirus checks. Systems are often self contained and it is difficult to find a way in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Embedded systems

A

Hardware and software are created as a self contained and purpose built device. May work as a single component of a larger system. Can be very optimized for it’s task. Traffic light controllers, digital watches, medical imaging systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

High Availability (HA)

A

Always on, always available. Automatic redundancy. May include many components working together. Higher availability means higher costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Infrastructure Considerations

A

Availability and security can be a difficult balancing act. Available but only to the right people. Uptime % is an important metric when evaluating availability.R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Resilience

A

Eventually something will happen. How quickly can you recover. Based on many different variables: Root cause, replacement hardware installation, software patch availability, system redundency. Commonly referred to as MTTR: Mean time to Repair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mean Time to Repair (MTTR)

A

The length of time to replace something that is no longer available, with components that are available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Responsiveness

A

How long does it take for a user to recieve their information after they make a request? This is very important for interactive applications, as humans are sensitive to delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Scalability

A

How quickly or easily can we increase or decrease capacity. This may happen many times per day. Need to make sure that security monitoring keeps up with the system scaling. Project management and scalability are an important factor to consider during the engineering phase. One missed detail can cause major deployment issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Cybersecurity Insurance

A

Allows you to recover lost funds resulting from things like randsomeware attacks, or outages and business downtime. Helps mitigate risks associated with legal proceedings from customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Patch Availability

A

The only constant is change. Software usually isn’t static. The first step after installation is usually making sure you are running the latest version. Patches need to be tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Patch Tuesday

A

The second tuesday of each month microsoft rolls out patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Power

A

A foundational element. Must be monitored. Requirements are very different depending on the purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Compute

A

An applications heavy lifting. More than just a single CPU. Cloud services provide a compute engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Secure Infrastructure

A

Every network is different, but there are often simularities. We often use firewalls to segment the network, as well as provide additional security to specific parts of the network. Other services may require their own security technologies: Honeypots, jump server, load balancers, sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Zone Based Security Technologies

A

A logical separation of all of the devices on the network by their use or access type. More flexible and secure than IP address ranges. Each area of the network is associated with a zone. Simplifies security policies, allows you to determine what kinds of data can be sent between zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Attack surface

A

Everything can be a vulnerability. Application code, open ports, authentication process, human error. The goal is to minimize the attack surface. Audit code, block ports on the firewall, monitor network traffic in real time, train employees. Secure physical network cabling. Application level encryption makes the data traveling our network encrypted and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Network level encryption

A

IPSec tunnels and VPN connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Intruision Prevention System (IPS)

A

Watches network traffic in real time. If there is any data that may be an intruision or an exploit it can block the traffic in real time. Looks for known exploits, buffer overflows, XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Intrusion Detection System (IDS)

A

Watches network traffic and sounds an alarm if it thinks there is a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Failure modes

A

Eventually something will break. Depending on device configuration different things may happen. Fail open and fail closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Fail open

A

When a system fails data continues to wflow. Security processes are disabled but the network stays up and running.

46
Q

Fail Closed

A

When a system fails the data does not flow

47
Q

Active Monitoring

A

System in connected in line. Data can be blocked as it passes by. intrusion prevention is commonly active

48
Q

Passive Monitoring

A

A copy of the network traffic is examined using a tap or port monitor. Data can not be blocked in real time, intrusion detection is commonly passive.

49
Q

Jump Server

A

A device on the inside of your network that is accessable from the outside. This is a highly secured device that is hardened and closely monitored. Usually a 2 step process: SSH/Tunnel/VPN to the jump server, and then connect to the rest of the network from there. The compromise of a jump server is a significant breach

50
Q

Proxy Server

A

A device that sits between two endpoints and transmits data between by sending and recieving requests on their behalf. Useful for caching, access control, URL filtering, content scanning.

51
Q

Network Address Translation (NAT)

A

Converts between internal and external IP addresses on internet facing routers. A network level proxy.

52
Q

Forward Proxy

A

A proxy inside of your network that controls outbound traffic to the internet. “Internal Proxy”. Commonly used to protect and control user access to the internet.

53
Q

Reverse Proxy

A

A proxy inside your network that controls inbound traffic from the internet to your specific internal service. Can also act as a caching server for identical requests.

54
Q

Open Proxy

A

A third party, uncontrolled proxy. Can be a significant concern. Often can be used to circumvent existing security controls.

55
Q

Load Balancer

A

Distributes network traffic across multiple servers and is invisible to the end user. Useful for large scale implementations. Provides fault tolerance, server outages will not disrupt availability.

56
Q

Active-Active Load balancing

A

Keeps connections open across all the servers. Can provide TCB offloading where it keeps a connection open with all servers so users do not have to keep making new server connections which adds protocol overhead. Some load balancers provide SSL offload, which means that encryption and decryption is done by the load balancer instead of the servers. Can provide Caching and prioritization. Content switching.

57
Q

Active Passive Load balancing

A

Some of the servers are active, while others are on standby. If an active server fails, the passive server takes it’s place.

58
Q

Sensors and Collectors

A

Aggregate information from the network devices. Some are their own stand alone device, while others are built in to switches, routers, servers, firewalls, etc. All of the data collected by these sensors are sent to a central database called a collector.

59
Q

Extensible Authentication Protocol (EAP)

A

A framework for authentication that can be applied to various network configurations. Manufacturers can build their own EAP methods. The most common integration of EAP is with 802.1x which prevents access to the network until authentication succeeds.

60
Q

IEEE 802.1x

A

Sometimes refered to as Port Based Network Access Control (NAC). When you plug into an available access point on a switch you would not gain access to the network until you authenticate. Used in conjunction with other authentication protocols or databases such as RADIUS, LDAP, etc. Involves 3 separate components: Supplicant, Authenticator, and Authentication server.

61
Q

Supplicant

A

End user or client

62
Q

Authenticator

A

The device that provides access such as a switch or AP (access point)

63
Q

Authentication Server

A

A backend database that contains and validates the log in credentials

64
Q

Network Based Firewall

A

Controls the traffic through the use of a purpose built appliance. Traditional network firewalls control traffic based on OSI layer 4: A TCP port or UDP port layer number. Next generation firewalls use OSI layer 7, which is the application layer. Firewalls can integrate other services such as the encyption of traffic. Many firewalls cna be layer 3 devices (routers). These devices commonly sit on the ingress/egress of the network.

65
Q

Unified Threat Management device (UTM)

A

An older type of firewall that has a number of security features built in. Also called an all in one security applicance or a web security gateway.

66
Q

Next Generation Firewall (NGFW)

A

Operates at OSI layer 7, the application layer. Can make forwarding decisions based on the applications being used on the network. Also called: application layer gateway, stateful multilayer inspection, deep packet inspection. Can view all the data in every packet. Can perform a deep packet decode and recognize who is sending the traffic, where it is going, what is contained within the application layer of the traffic, and determine if the packet is allowed or disallowed through the firewall. Gives you granular control of what people are able to do on the network. Ex. employee can view twitter but cannot post. They often act as an intrusion prevention system. Allows for URL catagorization and allow/deny lists.

67
Q

Web Application Firewall (WAF)

A

Analizes input into web based applications and allow or disallow traffic based on the input. Commonly used for web based conversations using HTTP or HTTPS. Can be used to identify SQL injection. A major focus of the payment card industry data security standard (PCI DSS) often used along side a next generation firewall.

68
Q

Virtual Private Network (VPN)

A

Encrypts private data traversing a public network. Managed using a VPN concentrator: A purpose built device that is designed to be an endpoint for everyone to connect to using the encrypted link. They are often integrated into NGFW. There are many deployment options, specialized cryptographic hardware as well as software based options. Often used with client software and sometimes built into the OS.

69
Q

VPN Concentrator

A

A purpose built device that is designed to be an endpoint for everyone to connect to using the encrypted link.

70
Q

Secure Sockets Layer (SSL)

A

The same protocol used to encrypt web server traffic. Runs over TCP port 443. Usually easily passes through firewalls. Used for remote access communication from a single device. No requirement for digital certificates or shared passwords for authentication. Can be run from a browser or light VPN client so additional software is not needed. Some VPN software can be configured as always on, that when you start up your laptop you automatically connect.

71
Q

Software Defined Networking in a Wide Area Network (SD-WAN)

A

Designed to solve issues with securely connecting to cloud based applications. Data centers used to be found in our own buildings. Now out data can be anywhere with the cloud. Allows us to build dynamic networks that can connect directly to cloud based applications.

72
Q

Secure Access Service Edge (SASE)

A

Combines networking and security as a service functions into a single cloud-delivered service at the network edge. Allows you to combine multiple technologies and cloud offerings into one security architecture.

73
Q

Regulated Data

A

Data that a third party sets rules on for how it should be protected. ex. Credit Card Information. Government laws and statutes can determine how data can be stored, and for how long.

74
Q

Trade Secrets

A

The secret formula

75
Q

Intellectual Property

A

May be publicly visible but protected using copyright and trademark law

76
Q

Legal Information

A

It can be difficult to provide information that should be public while protecting information that needs to be private. These are usually stored on different systems.

77
Q

Human Readable

A

People can read and understand the data

78
Q

Non-Human Readable

A

Encoded data, barcodes, qr code

79
Q

Proprietary Data

A

Data that is the property of an organization. May include trade secrets. Often unique to the organization

80
Q

Personally Identifiable Information (PII)

A

Data that can be used to identify an individual. Name, DOB, mothers maiden name, buimetric information

81
Q

Protected Health Information (PHI)

A

Health information associated with an individual. Health status, healthcare records, payments for healthcare, etc.

82
Q

Sensitive Data

A

Intellectual propery, PII, PHICo

83
Q

Confidential

A

Very Sensitive, must be approved to view

84
Q

Public

A

No restrictions on viewing the data

85
Q

Private/classified/restricted

A

Restricted access, may require an NDA

86
Q

Critical

A

Should always be accessable

87
Q

Data at rest

A

Data on a storage device. May want to encrypt and apply permissions and access control lists

88
Q

Data in Transit

A

Data being transmitted over the network. Also called data in motion. If the data isn’t encrypted then there is not much protection as it traverses switches, routers, and devices. Someone could tap into any of these network links and view your data.

89
Q

Network Based Protection

A

Firewall/IPS

90
Q

Data in Use

A

Data actively being processed in memory or by the CPU. Could be System RAM, CPU registers, and cache. The data is almost always non-encrypted. Attackers like to go after data in use for this reason.

91
Q

Data Sovereignty

A

Data that resides in a country is subject to the laws of that country. It is important to consider laws on data monitoring, court orders, etc.

92
Q

General Data Protection Regulation (GDPR)

A

A European Union regulation that dicctates that any data collected on EU citizens must be stored in the EU.

93
Q

Geolocation

A

Tells you the localized area of something. Endpoints, data, etc. There are many ways to determine the location of something: 802.11, mobile service, GPS. Can be used to manage access.

94
Q

Geofencing

A

Automatically allow or restrict access when the user is in a particular location.

95
Q

Confusion

A

Encrypted data is very different from the plaintext

96
Q

Segmentation

A

Separating sensitive data into different locations. Also allows additional security to be added for more sensitive data.

97
Q

Server Clustering

A

Combine two or more servers. Appears and operates like one large server. End users only see one device. Easy to scale and is configured in the server OS.

98
Q

Recovery Site

A

Data is sychronized here in case of a disaster. In that case, business processes failover to the alternate processing site. Allows for operations to continue while the problem is addressed.

99
Q

Hot Site

A

An exact replica of the datacenter. Contains all of the same hardware as your primary site. Must buy everything twice. Applications are constantly updated and data is synched. Can move over at any time.

100
Q

Cold Site

A

An empty building with no hardware. Have to bring all of your data, hardware, and people over to run the site

101
Q

Warm Site

A

Anything in between a hot and cold site. Can get going, but hardware and data will need to be moved over to get everything running as before.

102
Q

Geographic Dispersion

A

Sites that are physically far from each other. Many disruptions can effect a large area such as hurricanes, floods, etc. This can be a logistical problem when transporting equipment and employees between the sites.

103
Q

Platform Diversity

A

Every operating system contains potential security risks. Many security vulnerabilities are specific to a single OS.

104
Q

Muti-cloud systems

A

Cloud outages happen from time to time, so it may be a good idea to have backup services on multiple providers.

105
Q

Continuity of Operations Planning (COOP)

A

Not everything goes according to plan. When tech fails we still want to have a manual way to provide our services. Should be tested and documented before a problem occurs.

106
Q

Capacity Planning

A

Match supply to the demand. Too much supply and you are spending more money than needed. Too much demand and you experience application slowdowns and outages. Requires a balanced approach. Some services require people, which is difficult to scale up and down.

107
Q

Recovery Testing

A

Testing the process and procedures that take place in the event of a disaster. Use well defined rules of scope, and make sure you do not effect the live production systems. Practice specific scenarios.

108
Q

Failover Test

A

A failure is inevitable, but you may be able to keep things running. Redundant infrastructure allows you to perform a failover.

109
Q

Simulations

A

Test an imaginary event. Pen Testing. Allows you to see how your organization would respond.

110
Q

On Site Backups

A

No internet link required, data is immediately available. Generally less expensive than offsite.

111
Q
A