Host, Data, and Application Security Flashcards
advanced persistent threats (APTs)
Any sophisticated series of related attacks taking place over an extended period of time
APTs
advanced persistent threats
Agile development
A method of software development where milestones and product release are more incremental
baselining
creating a baseline security level
Big Data
Data that is larger than what can be handled with traditional tools and algorithms
database normalization
The process of removing duplication in a relational database
embedded system
Operating system in a device, sometimes on a single chip
fuzzing
A method of testing that intentionally enters invalid input to see if the application can handle it and look for vulnerabilities
hardening
The process of making a server or an application resistant to an attack
Infrastructure as Code (IaC)
The process of managing and provisioning computer data centers through machine-readable definition files
IaC
Infrastructure as Code
Internet of Things (IoT)
Devices that interact on the Internet, without human intervention
IoT
Internet of Things
NoSQL database
Datastores that do not use a relational structure
Open Web Application Security Project (OWASP)
An online community that develops free articles, tools, etc on web application security