Chapter 9 Key Terms Flashcards
Physical machine
The physical computer with hardware, such as the hard disk drive(s), optical drive, RAM, and motherboard.
Virtual machine
A software implementation of a computer that executes programs like a physical machine.
Virtual hard disk (VHD)
A file that is created within the host operating system and simulates a hard disk for the virtual machine.
Hypervisor
A thin layer of software that resides between the guest operating system and the hardware. It creates and runs virtual machines.
Load balancing
A technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput, or response time.
Virtual network
A computer network consisting of virtual and physical devices.
Virtual area network
A virtual LAN running on top of a physical LAN.
Virtual private network
A secure tunnel to another network that connects multiple remote end-points.
Virtual machine
A virtual computer that functions like a physical computer.
Virtual switch
Software that facilitates the communication between virtual machines by checking data packets before moving them to a destination.
Virtual router
Software that replicates the functionality of a physical router.
Virtual firewall appliance
Software that functions as a network firewall device. A virtual firewall appliance provides packet filtering and monitoring functions.
Virtual machine monitor
Software, firmware, or hardware that creates and runs virtual machines.
Software-defined network
An architecture that allows network and security professionals to manage, control, and make changes to a network.
Cloud
A metaphor for the internet.
Cloud computing
Software, data access, computation, and storage services provided to clients through the internet.
Public cloud
Platforms, applications, storage, or other resources that are mad available to the general public by a cloud service provider.
Private cloud
Platforms, applications, storage, or other resources that are made available to a single organization.
Community cloud
Platforms, applications, storage, or other resources that are shared by several organizations.
Hybrid cloud
A combination of public, private and community cloud resources from different service providers.
Cloud access security broker (CASB)
An on-premises cloud-based software tool or service that sits between an organization and a cloud service provider.
Virtual networks
Virtual machines and devices connected through software.
Segmentation
The division of a network into smaller networks through a virtual local area network (VLAN) and firewalls.
Security group
A security group works like a firewall to control traffic to and from network resources.
Virtual private cloud (VPC) endpoint
A virtual device that provides a private connection between virtual private clouds and a cloud provider’s services. A VPC endpoint keeps traffic secure with a private link resource.
Container
A standard unit of software that holds the complete runtime environment including an application, all application dependencies, libraries, binaries, and configuration files.
Cloud-based firewall
A software network device that is deployed in the cloud that protects against unwanted access to a private network.
App whitelisting
The process of identifying apps that users are allowed to have on mobile devices.
Geotagging
The process of embedding GPS coordinates within mobile device files, such as image or video files created with the device’s camera.
Data exfiltration
The unauthorized copy, transfer, or retrieval of data from a computer, server, or network.
Sandboxing
The isolation of an app so that it can’t affect other areas of a computer or network.
Jailbreaking
The process of removing inherent protections placed by the device manufacturer.
Sideloading
Installing an app on a mobile device via a method other than the manufacturer’s app repository.
Windows information protection
A technology that helps protect against data leakage on company-owned and personal devices without disrupting the user experience.
Network fencing
Location compliance, known as network fencing, allows you to keep devices outside your corporate network from accessing network resources.
Mobile device management
The administration of mobile devices. MDM software generally allows for tracking devices; pushing apps and updates; managing security settings; and remotely wiping the device.
Mobile application management
The administration of applications on a mobile device. MAM software allows a system administrator to remotely install or remove organizational apps and to disable certain functions within the apps.
Enterprise mobility management
A combination of MDM and MAM solutions in one package. EMM allows a system administrator to remotely manage hardware and applications on a mobile device.
Unified endpoint management
An all-in-one device management solution. UEM allows a system administrator to manage local and mobile devices, including Internet of Things devices.
Bring your own device (BYOD)
The practice of having employees use their own personal mobile devices for business related tasks.
Bring your own device
A BYOD policy allows employees to use personal devices for work related tasks.
Acceptable use policy
An AUP determines the rules for using corporate resources, such as internet access, computers, etc.
Virtual desktop infrastructure
VDI is a technology that uses virtual machines and virtual desktops.
choose your own device
In a CYOD system, the company provides a list of approved devices for an employee to choose from. The ownership and management of devices varies by organization.
Corporate owned, personally enabled
In a COPE system, the company provides a list of approved devices for an employee to choose from. The company owns the device; the employee uses and manages the device.
Supervisory control and data acquisition (SCADA)
SCADA is an industrial computer system that monitors and controls a process.
Internet of Things
The network of physical devices such as vehicles, home appliances, etc. that are embedded with electronics, software, sensors, actuators, and connectivity that enable them to connect, collect, and exchange data through the internet.
Arduino
Arduino is an open-source hardware and software platform for building electronic projects.
Raspberry Pi
Raspberry Pi is a low-cost device the size of a credit card that’s powered by the Python programming language. It’s manufactured into a single system on a chip (SoC).
Field Programmable Gate Array (FPGA)
FPGA is an integrated circuit that the customer configures.
Subscriber identity module (SIM) card
A SIM card encrypts data transmission and stores information.
Zigbee
Zigbee is a radio protocol that creates low-rate private area networks