Chapter 5 Sec + Flashcards
VM
Virtual Machine
Typically hosted on the host
ROI
Return On Investment
VDI
Virtual Desktop Infrastructure
Host a users desktop operating system on a server
Users can connect to the server and access applications
IoT
Internet of Things
Includes devices that interact with networks, smartphones, computer,servers, virtual machines etc.
EDR
Endpoint Detection and Response
Is a security technology focused on Detecting and Responding to that’s at endpoint level.
XDR
Extended Detection and Response
Is a next generation security technology that goes beyond endpoint devices and works with network devices.
HIPS
Host-based Intrusion Prevention System
Used on a host system
Uses behavioral analysis, file integrity monitoring, and application control
TCO
Total Cost of Ownership
FDE
Full Disk Encryption
Encrypts the Entire Disk
Can be done using technology built in the OS system like Windows using Bit Locker or use Third-Party Applications
SED
Self-Encryptiom Drives
Includes Encryption Circuitry built into the drive
-typically allows users to enter credentials when they set up the drive
-can be configured to used without user interaction
BIOS
Basic Input/Output System
Includes Software that provides the computer with Basic instructions on starting.
Bios is a hardware Chip you can touch
UEFI
Unified Extensible Firmware Interface
Provides many of the functions BIOS does with some Enhancements
-Can boot with larger dishes
-CPU - Independent
TPM
Trusted Platform Module
Is a hardware Chip on the computers motherboard that stores crypto graphic keys for encryption
-Ships with unique key burned into it
-Supports Secure Boot Attestation
-Supports Remote Attestation
HSM
Hardware Security Module
Is a security device you can add to the system to manage, generate, and securely store Cryptographic keys
-is usually a removable device
EOL
End of Life
Refers to hardware that has reached its end of usefulness life
either because it is no longer supported by manufacturer or too outdated for current standards
DLP
Data Lost Prevention System
Is used to prevent Data Exfiltration
Can be configured to look for certain phrases.
TEE
Trusted Execution Environment or Secure Enclave
Is a type fo Security Technology that provides a Secure and isolated area within the system or application for processing sensitive data
-used hardware-based Security mechanisms such as Software Guard Extension(SGX)