Módulo 10 - Protocol, App and Cloud Security Flashcards
List:
Components of virtualization
- Physical machine (host OS)
- Virtual machine (guest OS)
- Virtual hard disk (VHD)
- Hypervisor
- Containerization
List:
Advantages of virtualization
- Flexibility
- Security
- Testing
- Server consolidation
- Isolation (sandboxing)
- Application virtualization
List:
Disadvantages of virtualization
- Security issues
- Bottleneck
- Complexity
- Server sprawl
List:
Load balancing methods in virtualization
- Resource pooling
- Workload balancing
Define:
Virtualization
The process of installing and running multiple operating systems concurrently on a single physical machine.
Define:
Virtual machine (VM)
A software implementation of a computer that executes programs like a physical machine, also known as a guest operating system.
Define:
Hypervisor
A thin layer of software allowing virtual machines to interact with hardware without using the host OS. Types include Type I (bare-metal) and Type II (hosted).
Define:
Containerization
A virtualization method enforcing resource separation at the OS level by creating isolated containers for applications or OS distributions.
Define:
VM escape
A vulnerability where an attacker breaks out of a VM’s isolated environment and gains access to the host system or other VMs on the same host.
Define:
Resource pooling (in virtualization)
Creating shared logical pools of CPU and memory resources from multiple physical machines within the hypervisor to allocate resources to VMs.
Define:
Sandboxing
Isolating a virtual machine from the network to test applications, updates, or malware without risking production environments.
Define:
Load balancing
A technique that distributes workloads across multiple resources to improve performance, ensure high availability, and provide fault tolerance.
Define:
Server sprawl
A condition where managing a large number of virtual machines delays patching and security updates, increasing administrative complexity.
Acronym:
VHD
Virtual Hard Disk
List:
Important facts about virtual networks
- Virtual machines support unlimited virtual networks.
- Multiple virtual networks can share a single physical network adapter.
- Network configuration depends on host OS and physical hardware.
- Resources are partitioned into virtual devices with defined capacities.
- Bandwidth is split into independently secured channels.
- Virtual DHCP server assigns IPs to virtual machines.
- OS on virtual machines must be network-configured.
- Internal network virtualization uses software to emulate a network.
- External network virtualization combines or segments LANs.
List:
Network virtualization service providers
- VMware
- Microsoft
- Citrix
List:
Virtual networking terms
- Virtual local area network (VLAN)
- Virtual area network (VAN)
- Virtual private network (VPN)
- Virtual machine (VM)
List:
Virtual networking devices
- Virtual switch (vSwitch)
- Virtual router (vRouter)
- Virtual firewall appliance (VFA)
- Virtual machine monitor/hypervisor (VMM/hypervisor)
Define:
Virtual network
A network comprising virtual and physical devices, enabling efficient deployment and management of network services and resources.
Define:
Virtual switch (vSwitch)
Software that facilitates communication between virtual machines by checking data packets before forwarding them to a destination.
Define:
Virtual router (vRouter)
A software-based function replicating a physical router, providing flexibility to move routing functions within a network.
Define:
Virtual firewall appliance (VFA)
Software acting as a network firewall, providing packet filtering and monitoring for virtual environments.
Define:
Virtual local area network (VLAN)
A logical partitioning of a physical LAN, enabling several physical LANs to function as a single network or vice versa.
Define:
Virtual area network (VAN)
A virtual LAN running on a physical LAN, enabling communication between guest virtual machines on separate physical hosts.
Define:
Virtual private network (VPN)
A secure tunnel over another network, connecting multiple remote endpoints, with multipoint VPNs connecting more than two endpoints.
Define:
Hypervisor
Software, firmware, or hardware creating and running virtual machines by managing the virtual platform and guest OS execution.
Define:
Internal network virtualization
The use of software containers or pseudo-interfaces to emulate a physical network, improving efficiency by isolating applications.
Define:
External network virtualization
The combination or segmentation of LANs to create virtual networks, improving efficiency and flexibility across large networks.
Acronym:
VLAN
Virtual Local Area Network
Acronym:
VAN
Virtual Area Network
Acronym:
VPN
Virtual Private Network
Acronym:
VMM
Virtual Machine Monitor
List:
Characteristics of cloud computing
- Delivery of common business applications via web services
- Connection over the internet or a LAN
- No end-user knowledge of physical infrastructure needed
List:
Types of clouds
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
List:
Cloud computing service models
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
- Security as a Service (SECaaS)
List:
Cloud security risk reduction actions
- Zero Trust
- Cloud Access Security Broker (CASB)
- Segregate centrally stored data
- Patches Mamagemnt
- Service management
- Security monitoring
- Encryption
- Penetration testing
- Comply with regulatory measures
List:
Advantages of Virtual Desktop Infrastructure (VDI)
- Workstation hardware costs
- Centralized data protection and backup
- Remote access
- Fast snapshots deploy
- No lost devices
Define:
Cloud computing
The provision of software, data access, computation, and storage services via the internet without requiring end-user knowledge of physical infrastructure.
Define:
Public cloud
A cloud accessible by anyone, with resources made available by a service provider, often for free or with a fee.
Define:
Private cloud
A cloud restricted to a single organization, hosted internally or by a third party, with secure, exclusive access to resources.
Define:
Hybrid cloud
A combination of public, private, and community cloud resources, integrating their functionalities.
Define:
Security as a Service (SECaaS)
A cloud model providing security services such as authentication, anti-virus, intrusion detection, and penetration testing, integrated into a corporate infrastructure.
Define:
Cloud Access Security Broker (CASB)
A tool or service ensuring communication and access to cloud services comply with organizational security policies and procedures.
Define:
Attack surface
All points at which a malicious threat actor could attempt to exploit vulnerabilities in a system.
Define:
Supply chain attack
An attack where a threat actor infiltrates a target indirectly through vulnerabilities in its supply chain, such as cloud service providers or hardware vendors.
Define:
Virtual Desktop Infrastructure (VDI)
A virtualization method hosting user desktops on data center hardware, allowing access via thin clients with enhanced security and flexibility.
Acronym:
IaaS
Infrastructure as a Service
Acronym:
PaaS
Platform as a Service
Acronym:
SaaS
Software as a Service
Acronym:
SECaaS
Security as a Service
Acronym:
CASB
Cloud Access Security Broker
List:
Measures for securing cloud storage
- Implement security controls like in physical datacenters
- Use data classification policies
- Assign information to storage, handling, and access categories
- Assign security classifications based on sensitivity and criticality
- Use tools to securely dispose of data when no longer needed
List:
Advantages of cloud storage
- Pay only for storage used
- Cuts energy consumption by up to 70%
- Offers off-premises, on-premises, or hybrid storage options
- Provides intrinsic storage availability and data protection
- Shifts storage maintenance tasks to the provider
- Allows VM image transfer between cloud and on-premises locations
- Serves as a natural disaster backup with globally distributed servers
Define:
Cloud storage
A data storage model provided by a third party as a service, utilizing distributed resources to offer redundancy, durability, and scalability.
Define:
Cloud Access Security Broker (CASB)
A gatekeeper that enforces security policies on cloud storage, focusing on visibility, compliance, access control, encryption, and loss prevention.
Define:
Federated storage cloud architecture
A cloud storage design where distributed resources act as one unified system for redundancy and fault tolerance.
Define:
Object storage architecture
A cloud storage system with intrinsic availability and data protection, ideal for reducing costs and effort in managing availability and recovery.
List:
Mobile device connection types
- Cellular
- WiFi
- Bluetooth
- NFC
- ANT
- Infrared
- USB
- SATCOM (satellite)