Chapter 5 Sec + Flashcards

1
Q

VM

A

Virtual Machine
Typically hosted on the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROI

A

Return On Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VDI

A

Virtual Desktop Infrastructure
Host a users desktop operating system on a server
Users can connect to the server and access applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT

A

Internet of Things
Includes devices that interact with networks, smartphones, computer,servers, virtual machines etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EDR

A

Endpoint Detection and Response

Is a security technology focused on Detecting and Responding to that’s at endpoint level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XDR

A

Extended Detection and Response

Is a next generation security technology that goes beyond endpoint devices and works with network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIPS

A

Host-based Intrusion Prevention System
Used on a host system
Uses behavioral analysis, file integrity monitoring, and application control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCO

A

Total Cost of Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDE

A

Full Disk Encryption

Encrypts the Entire Disk
Can be done using technology built in the OS system like Windows using Bit Locker or use Third-Party Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SED

A

Self-Encryptiom Drives
Includes Encryption Circuitry built into the drive
-typically allows users to enter credentials when they set up the drive
-can be configured to used without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOS

A

Basic Input/Output System

Includes Software that provides the computer with Basic instructions on starting.

Bios is a hardware Chip you can touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UEFI

A

Unified Extensible Firmware Interface

Provides many of the functions BIOS does with some Enhancements

-Can boot with larger dishes
-CPU - Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TPM

A

Trusted Platform Module

Is a hardware Chip on the computers motherboard that stores crypto graphic keys for encryption
-Ships with unique key burned into it

-Supports Secure Boot Attestation
-Supports Remote Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSM

A

Hardware Security Module

Is a security device you can add to the system to manage, generate, and securely store Cryptographic keys
-is usually a removable device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOL

A

End of Life

Refers to hardware that has reached its end of usefulness life
either because it is no longer supported by manufacturer or too outdated for current standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Lost Prevention System
Is used to prevent Data Exfiltration
Can be configured to look for certain phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TEE

A

Trusted Execution Environment or Secure Enclave

Is a type fo Security Technology that provides a Secure and isolated area within the system or application for processing sensitive data
-used hardware-based Security mechanisms such as Software Guard Extension(SGX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Saas

A

Software as a Service

Includes any Software or application provided to users
-normally used with web browsers
Gmail,Yahoo Mail,Google drive

19
Q

Paas

A

Platform as a Service

Provides customers with a pre-configured computing platform they can use as needed

-upload code and the cloud provider runs it.

20
Q

Iaas

A

Infrastructure as a Service

Allows an organization to outsource it’s equipment requirements, including the hardware.
-Referes to as self-managed Solution
-organizations are responsible for all operating systems updates and patches
CSP will lend out physical or virtual systems

21
Q

API

A

Application Programming Interface

Is a software component that gives developers access to features or data within another application, a service, or an operating system.

22
Q

MSSP

A

Managed Security Service Provider

Is a Third-Party vendor that provides security services for companies

23
Q

MSP

A

Managed Service Provider

Provides any information IT services that an organization needs

24
Q

CSP

A

Cloud Service Provider

Offers cloud services to users or organizations

25
CASB
Cloud Access Security Broker Is a software solution or service deployed between an organization network and the cloud provider -provides Security by Monitoring traffic and enforcing Security Policies
26
SWG
Secure Web Gateway Is a combination of a proxy server and a stateless firewall -is typically a cloud-based service but can be on an on-site appliance -performs same functions as proxy server
27
IaC
Infrastructure as Code Refers to managing and provisioning data centers with code to define VMs and virtual networks by allowing admins to run a script to create them
28
SDN
Software Defined Networks Uses virtualization Technologies to Route Traffic instead of using hardware routers and switches An SDN separates the data and control plane
29
OSPF
Open Shortest Path First-Routing Protocol Help routers determine the best path to route traffic on the control plane Used with SDN
30
BGP
Border Gateway Protocol Help routers determine the best path to route traffic on the control plane Used with SDN
31
COPE
Corporate Owned Personally Enabled Organization buy device for employees and employees can use them for personal activities
32
COPE
Corporate Owned Personally Enabled Organization buy device for employees and employees can use them for personal activities
33
BYOD
Bring Your Own Device Employees being there own devices to attach to the network Organizations use Policies to protect devices
34
CYOD
Choose your own Device Organization creates a list of acceptable devices and published the list in a CYOD policy.Employees can purchase these devices and bring them to work
35
LTE
Long-Term Evolution
36
MDM
Mobile Device Management Includes technologies to manage mobile devices to keep them secure Uses application allow lists -full device encryption -storage segmentation -geofencing -gps tagging -geo lcation
37
MAM
Mobile Application Management Tools are typically built into MDM tools
38
OTA
Over-the-Air
39
APK
Application Packet Kit Side loading is the process of copying an APK format to device then activating it -used with android deviced
40
WANET
Wireless AD Hoc Network Is a type of LAN that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure information
41
UAV
Unmanned Aerial Vehicles
42
ICs
Industrial Control System Typically refers to systems with large facilities such as power plants or water treatment facilities. SCADA systems typically control an ICs by monitoring it and sending it commands
43
SoC
System on Chip -customized for specific applications for particular embedded systems Integrates many components of a computer system onto a Single Chip, including a processor, memory, in-put/output interfaces, and other components
44
RTOS
Real Time Operating System Is specialized operating System designed for Embedded systems that require precise timing and deterministic behavior