Chapter 5 Sec + Flashcards

1
Q

VM

A

Virtual Machine
Typically hosted on the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROI

A

Return On Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VDI

A

Virtual Desktop Infrastructure
Host a users desktop operating system on a server
Users can connect to the server and access applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT

A

Internet of Things
Includes devices that interact with networks, smartphones, computer,servers, virtual machines etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EDR

A

Endpoint Detection and Response

Is a security technology focused on Detecting and Responding to that’s at endpoint level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XDR

A

Extended Detection and Response

Is a next generation security technology that goes beyond endpoint devices and works with network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIPS

A

Host-based Intrusion Prevention System
Used on a host system
Uses behavioral analysis, file integrity monitoring, and application control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCO

A

Total Cost of Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDE

A

Full Disk Encryption

Encrypts the Entire Disk
Can be done using technology built in the OS system like Windows using Bit Locker or use Third-Party Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SED

A

Self-Encryptiom Drives
Includes Encryption Circuitry built into the drive
-typically allows users to enter credentials when they set up the drive
-can be configured to used without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOS

A

Basic Input/Output System

Includes Software that provides the computer with Basic instructions on starting.

Bios is a hardware Chip you can touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UEFI

A

Unified Extensible Firmware Interface

Provides many of the functions BIOS does with some Enhancements

-Can boot with larger dishes
-CPU - Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TPM

A

Trusted Platform Module

Is a hardware Chip on the computers motherboard that stores crypto graphic keys for encryption
-Ships with unique key burned into it

-Supports Secure Boot Attestation
-Supports Remote Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSM

A

Hardware Security Module

Is a security device you can add to the system to manage, generate, and securely store Cryptographic keys
-is usually a removable device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOL

A

End of Life

Refers to hardware that has reached its end of usefulness life
either because it is no longer supported by manufacturer or too outdated for current standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Lost Prevention System
Is used to prevent Data Exfiltration
Can be configured to look for certain phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TEE

A

Trusted Execution Environment or Secure Enclave

Is a type fo Security Technology that provides a Secure and isolated area within the system or application for processing sensitive data
-used hardware-based Security mechanisms such as Software Guard Extension(SGX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Saas

A

Software as a Service

Includes any Software or application provided to users
-normally used with web browsers
Gmail,Yahoo Mail,Google drive

19
Q

Paas

A

Platform as a Service

Provides customers with a pre-configured computing platform they can use as needed

-upload code and the cloud provider runs it.

20
Q

Iaas

A

Infrastructure as a Service

Allows an organization to outsource it’s equipment requirements, including the hardware.
-Referes to as self-managed Solution
-organizations are responsible for all operating systems updates and patches
CSP will lend out physical or virtual systems

21
Q

API

A

Application Programming Interface

Is a software component that gives developers access to features or data within another application, a service, or an operating system.

22
Q

MSSP

A

Managed Security Service Provider

Is a Third-Party vendor that provides security services for companies

23
Q

MSP

A

Managed Service Provider

Provides any information IT services that an organization needs

24
Q

CSP

A

Cloud Service Provider

Offers cloud services to users or organizations

25
Q

CASB

A

Cloud Access Security Broker

Is a software solution or service deployed between an organization network and the cloud provider
-provides Security by Monitoring traffic and enforcing Security Policies

26
Q

SWG

A

Secure Web Gateway

Is a combination of a proxy server and a stateless firewall
-is typically a cloud-based service but can be on an on-site appliance
-performs same functions as proxy server

27
Q

IaC

A

Infrastructure as Code

Refers to managing and provisioning data centers with code to define VMs and virtual networks by allowing admins to run a script to create them

28
Q

SDN

A

Software Defined Networks

Uses virtualization Technologies to Route Traffic instead of using hardware routers and switches

An SDN separates the data and control plane

29
Q

OSPF

A

Open Shortest Path First-Routing Protocol

Help routers determine the best path to route traffic on the control plane

Used with SDN

30
Q

BGP

A

Border Gateway Protocol

Help routers determine the best path to route traffic on the control plane

Used with SDN

31
Q

COPE

A

Corporate Owned Personally Enabled

Organization buy device for employees and employees can use them for personal activities

32
Q

COPE

A

Corporate Owned Personally Enabled

Organization buy device for employees and employees can use them for personal activities

33
Q

BYOD

A

Bring Your Own Device

Employees being there own devices to attach to the network

Organizations use Policies to protect devices

34
Q

CYOD

A

Choose your own Device

Organization creates a list of acceptable devices and published the list in a CYOD policy.Employees can purchase these devices and bring them to work

35
Q

LTE

A

Long-Term Evolution

36
Q

MDM

A

Mobile Device Management
Includes technologies to manage mobile devices to keep them secure

Uses application allow lists
-full device encryption
-storage segmentation
-geofencing
-gps tagging
-geo lcation

37
Q

MAM

A

Mobile Application Management
Tools are typically built into MDM tools

38
Q

OTA

A

Over-the-Air

39
Q

APK

A

Application Packet Kit

Side loading is the process of copying an APK format to device then activating it

-used with android deviced

40
Q

WANET

A

Wireless AD Hoc Network

Is a type of LAN that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure information

41
Q

UAV

A

Unmanned Aerial Vehicles

42
Q

ICs

A

Industrial Control System

Typically refers to systems with large facilities such as power plants or water treatment facilities.

SCADA systems typically control an ICs by monitoring it and sending it commands

43
Q

SoC

A

System on Chip

-customized for specific applications for particular embedded systems

Integrates many components of a computer system onto a Single Chip, including a processor, memory, in-put/output interfaces, and other components

44
Q

RTOS

A

Real Time Operating System

Is specialized operating System designed for Embedded systems that require precise timing and deterministic behavior