more study Flashcards
Explain BIA
Business Impact Analysis is a process used by organizations to assess the potential impact of disruption to critical business operations due to various events, such as disasters, cyber attacks, etc
Explain PKI
Public Key Infrastructure is a system used to manage digital certificates and pubic private key pairs, enabling secure communications, authentication, and data encryption
Explain SED
Self Encrypting Drive is a type of hard drive or solid state drive with built in hardware encryption capabilities
What is Key management system
A key management system is used to manage large security key implementations from a central console. This includes creating keys, associating keys with individuals, rotating keys on regular basis and logging all jey use
What is orchestration
Orchestration describes the process of automating and is commonly associated with large scale automation or automating processes between different system
What is HA
High Availability means the service should always be on and available
What is WAF
Web Application Firewall is used to protect web based application from exploits and other attacks such as sql injections, etc
What is LDAP?
LDAP is a common standard for authentication.
What is SD WAN
SD WAN network allows users to communicate directly to cloud based applications
What is a jump server?
A jump server is often used to allow external access to internal devices commonly for maintenance or administrative tasks.
What is a policy engine (PE)?
PE is located in the control plane of zero trust infrastructure and evaluates each access decision based on security policy and other information resources.
What is a proxy server
A proxy server can be used to monitor incoming and outgoing network communication. Proxy servers can be used to identify malicious software, filter content or increase performance through file caching