General Terms Flashcards

1
Q

What are the 3Cs

A

Cloud first
Cloud native
Cloud agnostic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What reasons could there be to move cloud providers

A

Commercial
Security
Geopolitical
Unique technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Entra ID TAP

A

Temporary access password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM

A

Identity and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIAM

A

Customer identity and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Four main components of IAM

A

IAM consists of four main components: Authentication, Authorization, Administration, and Auditing and Reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SCIM

A

System for Cross-Domain Identity Management (SCIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a CDAO?

A

Chief Data Analytics Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIO

A

Chief Information Officer - oversees organisations information technology strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CEO

A

Chief Executive Officer - highest ranking person in a company, ultimately responsible for managerial decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CISO

A

Chief Information Security Officer - overseeing organisations information, cyber and technology security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CTAO

A

Chief Technology and Architecture Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Applications

A

Software that users interact with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Services

A

Things that run in the background that users don’t directly interact with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIEM

A

Security Information and Event Management.

Collect, aggregate and analyse large volumes of data from apps, devices, servers, users in real time. So SOC can detect and block attacks. Uses predefined rules to define threats and generate alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOAR

A

Security, Orchestration, Automation and Response.

Set of services and tools that automate cyberattack prevention and response. Helps SOC cope by offloading repetitive and time consuming tasks.

17
Q

ABAC

A

Attribute Based Access Control.

User attributes - department, location
Resource attributes - data classification, owner
Environment attributes - time of day, device
Policies - rules that take the above and establish if you can access

Evaluates attributes rather than relying on roles. Allows for more dynamic and fine grained access control.

18
Q

What are ABAC benefits

A

Fine- grained access control
Simplified management
Scalability