Lessons 10-14 Flashcards
CENTRALIZED COMPUTING
All processing and data storage are managed and controlled by the central server or mainframe rather than on individual devices.
CLIENT-SERVER
is a network architecture where a server provides resources or services, and a client accesses and uses those resources or services.
INDUSTRIAL CONTROL SYSTEMS ICS
Are networked devices and software used to monitor and control industrial processes, such as manufacturing, power generation, and water treatment.
Supervisory control and data acquisition (SCADA)
is a specialized ICS system that is designed for monitoring and controlling large-scale industrial processes.
CLOUD COMPUTING
Is the delivery of computing services other than the internet (the cloud) that scale to business needs.
MICROSERVICES
Is composed of small independent services that communicate with each other over a network, enabling greater scalability and flexibility.
Resilience
if there are failures how well can we recover
Provisioning
the process of setting up and configuring resources, services, or devices so they are ready for use.
SOFTWARE AS A SERVICE SaaS
a cloud computing service where software applications are delivered over the internet on a subscription basis. Users can access these applications via a web browser without needing to install or maintain the software themselves. Examples include Gmail, Microsoft Office 365, and Salesforce.
PLATFORM AS A SERVICE PaaS
is a cloud computing service that provides a platform allowing customers to develop, run, and manage applications without dealing with the underlying infrastructure.
INFRASTRUCTURE AS A SERVICE IaaS
is a cloud computing service that provides virtualized computing resources over the internet. This includes virtual machines, storage, and networking, allowing users to rent and manage the infrastructure they need for their applications, without having to invest in and maintain physical hardware.
ANYTHING AS A SERVICE XaaS
Represents the growing type of services available over the internet via cloud computing as opposed to being provided locally, or on-premises.
CSP
cloud service provider
Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). These providers host and manage the infrastructure and platforms, allowing users to access and use them on a pay-as-you-go basis.
Public cloud
Provisioned for public use. Considerations include- location, multi-tenancy
Private cloud
Provisioned for the exclusive use of a single organization. Considerations-scalability
Community cloud
Provisioned for the exclusive use by a well-defined group. Considerations- multi-tenancy
CLOUD BURSTING
Is the on-demand and temporary use of the public cloud when demand exceeds resources available in the private cloud or on-premises infrastructure.
Physical layer
Consists of data centers with thousands of servers, storage devices, and networking equipment.
Abstract Layer
Includes the EC2 instances (virtual machines), S3 storage (abstracted storage service), and VPC (virtual private cloud for networking).
CLOUD SECURITY GROUPS
are a feature used in cloud computing environments to control inbound and outbound traffic to and from virtual machines (VMs) or other cloud resources.
CLOUD CONTAINER
Containers offer a logical packaging mechanism in which applications can be abstracted from the environment in which they run
Containers can virtualize CPU, memory, storage, network resources at the OS-level (lightweight)
region
set of connected data centers deployed within a defined perimeter
Availiability zone
zone is made up of one or more data centers equipped with independent power, cooling and networking
instance
is a virtual server created and managed on a cloud platform. Instances provide computing power and can run applications just like physical servers but with the flexibility and scalability of the cloud.
rapid elasticity
adapt to changing workload demands by auto-provisioning and de-provisioning pooled resources to match the current demand.
resource pooling
the practice of sharing physical or virtual resources (like servers, storage, and networks) among multiple users or applications.
measured service
metering capability
AUTOMATION
Is the application of technology, programs, robotics or processes to achieve outcomes with minimal human input.
Orchestration
is the integration of disparate tools and platforms for an automated response.
Scalability
is the ability of the system to automatically accommodate larger loads by adding resources- either making hardware stronger(scale up) or adding additional nodes (scale out)
Elasticity
is the ability to fit the resources needed to cope with loads dynamically. When the load increases, more resources are added and when demand decreases, resources are removed.
Infrastructure-as-code
using code to manage configurations and automate provisioning
Serverless computing
dynamic allocation of resources to execute a specific piece of code.
Containerization
is a technology that allows applications to be packaged and run in isolated environments called containers
Software-defined-networking
using software to manage and configure the network infrastructure
VIRTUALIZATION
Is technology that creates multiple environments from a single, physical hardware system
Virtualization sprawl-
occurs when the number of virtual systems is out of control-potentially unmanaged, unnecessary, and not in compliance with licensing agreements. Virtual devices should be treated the same as physical systems
Virtual machine escape
occurs when a VM and the host OS interact. This should NEVER happen.
Virtual desktop infrastructure VDI
is Virtualization technology that hosts a desktop OS on a centralized server in a data center.
HYPERVISORS
Are software or firmware components used to virtualize system resources
Type 1- bare metal/native hypervisors run directly on the system hardware. Direct access to hardware. No OS to load as the hypervisor is the OS
Type 2- hosted hypervisors run on a host OS that provides Virtualization services. Type 1 is faster and more efficient but with greater hardware requirements and expense.
EMBEDDED SYSTEMS
Is an electronic product that contains a microprocessor and software designed to perform a specific task.
Industrial control systems ICS-
are embedded systems that monitor and control industrial processes that exist in the physical world. They are either data driven or operated remotely
Supervisory control and data acquisition SCADA
monitor complex systems spread out over large areas (gasoline, natural gas, electricity, water, waste)
System on a chip SoC
The chips are inexpensive and profit margins slim
There is little incentive to maintain/update chip firmware
Real-time OS RTOS
Strong incentive to use open-source OS
The RTOS may be outdated
Often patches are not available, if available expertise to install is rare.
active side channel- embedded system attack
uses a voltage glitch on the power supply to cause a program malfunction
steppingstone- embedded system attack
is a type of cyber attack where an attacker compromises a less secure system (the “stepping stone”) to gain access to a more secure target.
Rasberry Pi
a small, affordable single-board computer developed by the Raspberry Pi Foundation. It’s designed to promote computer science education and can be used for various projects and applications, including programming, electronics, and DIY projects.
INTERNET OF THINGS IoT
Refers to a network of physical objects or “things” embedded with sensors, software and connectivity that enable the, to exchange data with other connected devices and interacts with users of the internet (smart devices)
Industrial internet of things IIoT
the applications of Iot in industrial settings to improve efficiency, productivity and safety. The use of connected sensors, devices, and machines in manufacturing, logistics and other industrial settings to collect, analize, and share data in real time
EDGE COMPUTING
a technology that processes data close to where it is generated, rather than sending it to a central data center or cloud. This reduces latency, saves bandwidth, and allows for faster decision-making and real-time applications.
Sensor-
a component that detects and responds to changes in an environment
Actuator
takes the electrical input and turns it into a physical action
Wireless Transceiver
sends and receive RF signals over the air- NFC,WLAN,RFID,GSM
True positive
Normal or expected activity is correctly identified- GOOD
False positive
Normal or expected activity is incorrectly identified as abnormal or unexpected- PROBLEMATIC
True negative
Abnormal or unexpected activity is correctly identified- GOOD
False negative
Abnormal or unexpected activity is incorrectly identified as normal or expected- DANGEROUS
Fail-open
means that the network device allows network traffic to continue to flow even if the device fails.
Fail-closed
the network device blocks network traffic even if the device fails-
inline device
sits directly in the path of network traffic and activity and actively processes data packets as they pass through , IPS firewalls and load balancers
A collector
is a device that performs targeted collection which feeds into an aggregation or correlation engine
NAC
NETWORK ACCESS CONTROL
Is the process of controlling access, identifying suspicious behavior, and preventing data exfiltration
Intrusion detection system IDS
can analyze and monitor network traffic
Intrusion prevention system IPS
can analyze and monitor, and proactively deny network traffic
Pattern matching
based on established known patterns and signatures. Signatures must be updated frequently
Rule-based
analyze behavior for violations or preconfigured set of rules.
Behavior-based
focus on deviations from normal patterns of behavior rather than specific attack signatures or rules.
Heuristic
use a set of predefined rules and algorithms to identify anomalous behavior and patterns which can be adapted and updated over time
JUMP SERVER
Also known as a jump host or bastion host, is a hardened computer system or server that provides secure access to other computers or systems within a network
*Usually deployed in a screened subnet to provide an additional layer of security. Users can access the jump server through a secure connection, such as SSH or a VPN, then use the jump server as a gateway to access other systems within the network
PROXY SERVER
Is an intermediary machine between a client and a server. Which is used to filter or fetch and cache requests made by the client
TYPE OF PROXY SERVERS
- Forward- client (browsers) are configured to send requests to the proxy server, the proxy server receives the request, fetches content and stores a copy for future use (static)
- Transparent- same as forward proxy except that the client (browser) does not need to be configured. The proxy server resides on the gateway and intercepts requests.
- Reverse- appears to the client just like a regular web server. The proxy caches all the static answers from the web server and replies to the clients from its cache to reduce the load on the web server