Network Security 5 Flashcards
client computers act as both servers and workstations because they share files and printers while allowing a user to log on and use the client computer for normal tasks.
peer-to-peer network
provides the VM, and therefore the guest OS, access to the physical CPU and RAM resources as well as access to a virtual disk that the guest OS believes is a real, physical hard drive. Type 1 hypervisors, such as VMware ESXi or the open-source KVM hypervisor, are operating systems that natively run virtual machines and are intended to be installed on a dedicated bare metal server. Type 2 hypervisor, such as VMware Workstation, is installed as an application within your existing computer or laptop operating system. Type 1 hypervisor has complete access to the underlying hardware of the physical computer. Type 2 hypervisor does not have direct and unrestricted access to the physical hardware but instead must send all your VM’s hardware requests through your computer’s operating system.
netstat -a == show all connections and listening ports
netstat -b == displays the executable involved in creating each connection or listening port.
nmap -A 192.168.1.143 == discover the operating system information of the hosts that are mapped
hypervisor
on-demand, self-service, resource pooling, elastic, accessible, measurable. The on-demand nature of cloud computing provides IT professionals the means to provision new servers, applications, and other resources in a self-service manner, often within minutes of the request.
Cloud-Computing
The cornerstones of the IaaS offering are server virtualization, storage virtualization, and network virtualization. Infrastructure as a service is very customizable, but it also means you are responsible for managing more things, such as the virtual machine configuration, its operating system, and all the patches that it requires. With regard to server virtualization, the cloud provider manages the hypervisor and the underlying hardware. You, as the consumer, are given access to a web portal, which enables you to create virtual machines and customize their resources to fit your business and application needs. The cloud provider allows you to choose the number of CPUs, the amount of RAM, the amount of storage, and even the number of network cards in the VM. Storage virtualization helps cloud providers offer you storage solutions that can expand in size or change in performance based on your business needs. When creating your VMs, you may be given the choice to provision regular storage at the normal price or very fast storage at a premium price. Network virtualization gives cloud providers the ability to create virtual private cloud (VPC) networks for each of their customers, keeping each VPC network isolated from the others. When deploying a production application to the cloud, build redundancy and disaster recovery into your design by deploying at least two of everything: one instance in a nearby data center for production use, and one instance in a geographically distant data center for safekeeping.
IaaS
the cloud provider is responsible for the virtual servers and, in some cases, the services that run on top of them, such as a database engine, and provides you with a platform on which you can run your code or store your data, The provider gives you limited control over a web server that they maintain for you, serverless computing = the consumer of the service (the developer in this case) typically is not even made aware of the number of servers being used in the back end to run the application.
PaaS
The company purchases or leases the computer, storage, and networking hardware and maintains the data center facilities. If a failure occurs, the company is responsible for repairing the problem themselves because all the equipment belongs to and is managed by them. The primary advantage of a _______ _____ is the ownership and control that a company has over the equipment. Some companies use a _______ _____ only because of regulatory restrictions that mandate the company to maintain absolute control over the hardware and software that run a particular system.
Private Cloud
the cloud provider is responsible for maintaining the hardware and repairing the infrastructure instead of the customer. multi-tenancy, meaning when multiple tenants share the same physical resource. In any multi-tenant situation, there are potential security and performance implications because you are sharing hardware with other companies, though the risks may not be as significant as they seem.
Public Cloud
These clouds are data centers that are jointly owned and operated by the tenants. Think of it as a semi-private cloud for each tenant, with the added benefit that the maintenance and management of the underlying infrastructure is shared by all the tenants.
Community Cloud
combo of private and public cloud, hybrid cloud computing, the customer will require a dedicated connection between their on-premises data center and the public cloud provider. This connection may be a virtual private network (VPN) established over the internet or a dedicated wide area network (WAN) connection maintained by a telecommunications provider.
hybrid cloud
is the concept of leveraging the services of multiple public cloud providers, such as hosting your website at AWS and GCP and balancing the users between these providers. This concept, in practice, can add redundancy and flexibility.
Multi-Cloud