Domain 2: Architecture & Design Flashcards
Network Diagrams
Data flow across telecommunication hardware
Display the inner behaviors of your network, such as routing protocols and subnets, and reveal how information flows
Device Diagrams
Shows Individual cabling
Naming Conventions
Framework used for naming/labeling your files in a specific way
IP Schema
An IP address plan or model to avoid making duplicate IP addresses
Consistent addressing for network devices
Helps avoid duplicate IP addressing
Data Sovereignty
Data that resides in a country is subject to
the laws of that country
Data masking
Data obfuscation…Hide some of the original data
Data at-rest
Data on a storage device
Data in-transit
Data transmitted over the network…Also called data in-motion
TLS (Transport Layer Security) & IPsec (Internet Protocol Security) Provide transport encryption
Data in-use
Actively processing in memory (System RAM, CPU registers and cache)
Tokenization
Replace sensitive data with a non-sensitive placeholder
Commonly used in NFC payments and Credit card processing.
Uses a temporary token during payment…an attacker capturing the card numbers can’t use them later
Information Rights Management (IRM)
Control how data is used.
Restrict data access to unauthorized persons
Can prevent copy and paste, Control screenshots, Manage printing, & Restrict editing
Each user has their own set of rights
SSL/TLS inspection
Secure Sockets Layer/Transport Layer Security
Commonly used to examine outgoing SSL/TLS
API
Application Programming Interface
Mechanisms that enable two software components to communicate with each other using a set of definitions and protocols
Honeypots
Makes an attractive site for attackers and traps them there
Honeynets
More than one honeypot on a network
Telemetry
Data collected from a network environment that can be analyzed to monitor the health and performance, availability, and security of the network and its components
Can be fake
DNS sinkhole
A DNS that hands out incorrect IP addresses
Can be used for good or bad
MSP/MSSP
Managed service providers - A cloud service provider
Not all cloud service providers are MSPs
Network connectivity management
Backups and disaster recovery
Growth management and planning
Managed Security Service Provider – Firewall management, Patch management, security audits
Emergency response
Fog Computing
Decentralized computing infrastructure where the computing resources (e.g., applications) are placed between the cloud and data source
Edge computing
Distributed computing paradigm that brings computation and data storage closer to the sources of data.
Supposed to improve response times and save bandwidth.
Moves computer storage and processing (now often just called “compute”) to the edge of the network. This is where it is closest to users and devices and most critically, as close as possible to data sources
It is an architecture rather than a specific technology
Examples of edge use cases include self-driving cars, autonomous robots, smart equipment data and automated retail.
Thin client
A simple computer that has been optimized for establishing a remote connection with a server-based computing environment
Typically managed remotely with limited input from the end use
A computer that has no processing power
Container
Contains everything you need to run an application like code and dependencies
A standardized unit of software
Microservices/API
Monolithic applications
One big application that does everything
Serverless architecture
A way to build and run applications and services without having to manage infrastructure.
Cloud based
Service Integration and Management (SIAM)
An approach to managing multiple suppliers of services and integrating them to provide a single business-facing IT organization
Transit Gateway
Network transit hub that you can use to interconnect your virtual private clouds (VPCs) and on-premises networks
SDN (Software Defined Networking)
Infrastructure as code.
An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network
Dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth,
Elasticity
Increase or decrease available resources as the
workload changes
Scalability
The ability to increase the workload in a
given infrastructure
Open Web Application Security Project (OWASP)
Worldwide nonprofit organization that focuses on improving software security.
Attestation
A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key
A mechanism for software to prove it’s identity. The goal of attestation is to prove to a remote party that your operating system and application software are intact and trustworthy