Chapter 7 Flashcards
Relational Database
Most common approach to database implementation. Allows data to be viewed in dynamic ways based on the user’s or administrator’s needs
NoSQL
A non-relational/distributed dynamic database that does not use SQL
One-Tier Model
The database and application exist on a single system. Common on desktop systems running a standalone database
Two-Tier Model
The client workstation or system runs an application that communicates with the database that is running on a different server
Three-Tier Model
isolates the end user from the database by introducing a middle-tier server. It evaluates them and sends them on the database server for processing
SAN
Storage Area Network
A separate network set up to appear as a server to the main organization network
Fuzzing
technique of providing unexpected values as input to an application in order to make it crash. Values can be random, invalid, or just unexpected
Secure Coding
the best way to prevent many attacks. It’s a broad concept. Keeping coding secure can prevent SQL injection
OWASP
Open Web Application Security Project
a voluntary group dedicated to forming secure coding practices for web based applications as well as mobile and client applications along with back-end design issues
CERT
Computer Emergency Response Team
addresses exception handling
DLP
Data Loss Protection
Systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed
RAID 3 or 4
Striped Disks with Dedicated Parity
Needs three or more disks with data distributed over disks
RAID 6
Striped with Dual Parity
combines 4 or more disks in a way that protects data against the loss of any two disks. Adds an additional
Hotfix patch
is an immediate and urgent patch. In general, these represent serious security issues and are not optional
Patch
Provides added functionality or a non urgent fix
Service Pack
Cumulative assortment of the hotfixes and patches to date
HSM
Hierarchical Storage Management
Provides continuous online backup by using optical or tape jukeboxes. It appears as an infinite disk to the system
Antimalware Best Practices
Install Antivirus Install Antispam Filters Install Antispyware Filters Use Pop-up blockers Use host-based firewalls Use host based IDSs
How to harden FTP
Create a separate file areas for the transfers
If possible, use a VPN or SSH
Use separate login accounts
Disable anonymous user accounts
Footprinting
Act of gathering data about a network in order to find ways that someone might intrude. Looks for vulnerabilities and any means of entry
Hardening DHCP Services
Only one DHCP server should be running at a time
Use NAT
Types of backups
Full - All changes and data archived
Differential - All changes since the last full backup
Incremental - All changes since the last backup of any kind
Clustering
Used parallel processing (improving performance and availabilty) and adds redundancy
Load Balancing
High availability can be maintained through splitting using multiple servers
Hardening Email Servers
Use Antivirus Scanners to filter out malicious emails