Chapter 5 Sec + Flashcards
VM
Virtual Machine
Typically hosted on the host
ROI
Return On Investment
VDI
Virtual Desktop Infrastructure
Host a users desktop operating system on a server
Users can connect to the server and access applications
IoT
Internet of Things
Includes devices that interact with networks, smartphones, computer,servers, virtual machines etc.
EDR
Endpoint Detection and Response
Is a security technology focused on Detecting and Responding to that’s at endpoint level.
XDR
Extended Detection and Response
Is a next generation security technology that goes beyond endpoint devices and works with network devices.
HIPS
Host-based Intrusion Prevention System
Used on a host system
Uses behavioral analysis, file integrity monitoring, and application control
TCO
Total Cost of Ownership
FDE
Full Disk Encryption
Encrypts the Entire Disk
Can be done using technology built in the OS system like Windows using Bit Locker or use Third-Party Applications
SED
Self-Encryptiom Drives
Includes Encryption Circuitry built into the drive
-typically allows users to enter credentials when they set up the drive
-can be configured to used without user interaction
BIOS
Basic Input/Output System
Includes Software that provides the computer with Basic instructions on starting.
Bios is a hardware Chip you can touch
UEFI
Unified Extensible Firmware Interface
Provides many of the functions BIOS does with some Enhancements
-Can boot with larger dishes
-CPU - Independent
TPM
Trusted Platform Module
Is a hardware Chip on the computers motherboard that stores crypto graphic keys for encryption
-Ships with unique key burned into it
-Supports Secure Boot Attestation
-Supports Remote Attestation
HSM
Hardware Security Module
Is a security device you can add to the system to manage, generate, and securely store Cryptographic keys
-is usually a removable device
EOL
End of Life
Refers to hardware that has reached its end of usefulness life
either because it is no longer supported by manufacturer or too outdated for current standards
DLP
Data Lost Prevention System
Is used to prevent Data Exfiltration
Can be configured to look for certain phrases.
TEE
Trusted Execution Environment or Secure Enclave
Is a type fo Security Technology that provides a Secure and isolated area within the system or application for processing sensitive data
-used hardware-based Security mechanisms such as Software Guard Extension(SGX)
Saas
Software as a Service
Includes any Software or application provided to users
-normally used with web browsers
Gmail,Yahoo Mail,Google drive
Paas
Platform as a Service
Provides customers with a pre-configured computing platform they can use as needed
-upload code and the cloud provider runs it.
Iaas
Infrastructure as a Service
Allows an organization to outsource it’s equipment requirements, including the hardware.
-Referes to as self-managed Solution
-organizations are responsible for all operating systems updates and patches
CSP will lend out physical or virtual systems
API
Application Programming Interface
Is a software component that gives developers access to features or data within another application, a service, or an operating system.
MSSP
Managed Security Service Provider
Is a Third-Party vendor that provides security services for companies
MSP
Managed Service Provider
Provides any information IT services that an organization needs
CSP
Cloud Service Provider
Offers cloud services to users or organizations