Chapter 7 Host, Data, and Application Security Flashcards
Relational Database
Allows data to be viewed in dynamic ways based on the user’s or administrator’s needs
One-Tier Model
Database and application exist on a single system
Two-Tier Model
The client workstation runs an application that communicates with the database that is running on a different server
Three-Tier Model
Effectively isolates the end user from the database by introducing a middle-tier server
Middle-Tier Server
Accepts requests from clients, evaluates them, and sends them on to the database server for processing, and vice versa.
NoSQL Database
- Not a relational database and doesn’t use SQL.
- Often used where scaling is important
Storage Area Network (SAN)
A separate network set up to appear as a server to the main organizational network, basically just to store data.
Fuzzing
Providing unexpected values as input to an application in order to make it crash
Open Web Application Security Project (OWASP)
A voluntary group dedicated to forming secure coding practices for web-based applications and more.
Computer Emergency Response Team (CERT)
Detail standards for secure coding
Hotfix
An immediate and urgent patch
Patch
A non-urgent fix or functionality
Service Packs
Cumulative assortment of the hotfixes and patches to date
Full Control
A user can read, write, execute, and assign permissions to others
Modify
Read and write with delete added
Read and Execute
Allows the user to run a program
List Folder Contents
Allows the user to see what is in a folder but not to read the files
Web Application Firewall (WAF)
Looks at every request between a web client and a web server and identifies possible attacks
What should you always disable on an FTP server?
The anonymous account
3 Main Attacks on DNS Servers
1) DoS
2) Footprinting
3) Compromising Record Integrity
Footprinting
The act of gathering data about a network in order to find ways that someone might intrude.
DNS Poisoning
A daemon caches DNS reply packets and uses the extra data to try to get useful info for other attacks
Full Backup
All changes to the data are archived
Differential Backup
All changes since the last full backup are archived
Incremental Backup
All changes since the last backup of any type are archived.
Hierarchical Storage Management (HSM)
Provides continuous online backup by using optical or tape jukeboxes
RAID 1 + 0 (10)
- A mirrored data set which is then striped
- Minimum of 4 drives
RAID 0 + 1
- The stripes are mirrored
- Minimum of 4 drives
Data at Rest
Data currently not being transmitted
Data in Transit
Information being sent
Data Loss Prevention (DLP) Systems
Monitor the contents of systems to make sure that key content is not deleted or removed.
Trusted Platform Module (TPM)
A chip that can store cryptographic keys, passwords, or certificates.
Hardware Security Module (HSM)
A cryptoprocessor that can be used to enhance security, commonly used with PKI systems