Chapter 7 Flashcards
a third-party service that monitors a network for any unusual activity
advanced malware management
a device used to combine multiple network connections into a single link.
aggregation switch
see container
application cell
an inventory of applications and associated components (libraries, configuration files, etc.) that have been pre-approved and authorized to be active and present on the device.
application whitelisting
a set of software tools or services that reside between the enterprises’ on-premises infrastructure and the cloud provider’s infrastructure to ensure that the security policies of the enterprise extend to their data in the cloud.
cloud access security broker (CASB)
a pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled.
cloud computing
a cloud system that has no computational capabilities but provides remote file storage
cloud storage
a cloud that is open only to specific organizations that have common concerns
community cloud
a virtualized environment that holds only the necessary operating system components (such as binary files and libraries) that are needed for a specific application to run. Also called an application cell.
container
a device that aggregates and correlates content from different sources to uncover an attack.
correlation engine
a microsoft windows feature that prevents attackers from using buffer overflow to exe
data execution prevention (DEP)