Security+ 3.0 Architecture and Design Flashcards
Ad Hoc
Ad Hoc - zone is created when two or more wireless devices connect to one another creating an on-demand network.
Intranet
Intranet- is a private company zone established to allow employees the ability to share content and communicate more effectively.
extranet
extranet is a zone created to allow authorized users access to company assets, separate from the intranet.
VLAN
Virtual Local Area Network (VLAN) is a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer, and group users according to departments.
Aggregation switches
Aggregation switches – a network device that combines multiple ports into a single link in order to enhance redundancy and increase bandwidth
can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.
Air gap
Air gap -a type of network isolation that physically separates a network from all other networks.
Application Containers
Application Containers - a virtualization method where applications run in isolated containers on the host operating system instead of in separate VMS
Containers
Containers use the kernel as a host but do not host an operating system. A container isolates and protects applications from other parts of the system. They require fewer resources than a Type II hypervisor
Deprovisioning
Deprovisioning- is the act of removing or disabling access to a resource. Since the application has been replaced, the application should be deprovisioned to preserve resources.
Provisioning
Provisioning is the process of procuring, configuring and making available an application or system on certain services. Provisioning an application allows it to run on its intended platform. Since the new version has already been released in this scenario, this step has already taken place.
DMZ-
DMZ- a small section of a private network that tis located behind one firewall or between 2 firewalls and made available for public use.
is between the two firewalls providing a layer of protection for the internet facing servers. It is an area of a network that is designed for public and company use. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN.
DNS
DNS- - Domain Name System- the service that maps names of IP addresses on most TCP/IP networks, including the internet.
Elasticity-
Elasticity- the property by which a computing environment can instantly react to both increasing and decreasing demands in a workload.
EMI
EMI- electromagnetic interference- a disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.
EMP
EMP- electromagnetic pulse- a short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short circuit and damage electronic components
are radio frequencies emitted by external sources, such as power lines and lights that disturb data signals.
Extranet
Extranet- a private network that provides some access to outside parties, particularly vendors, partners and select customers.
Fault Tolerance
Fault Tolerance- the ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service.
Distributive allocation
Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes.
SED
A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.
FDE
FED-Full disk encryption- a storage technology that encrypts an entire storage drive at the hardware level.
Full device encryption (FDE) provides encryption for a whole disk and protects the confidentiality of the data.
Firewalls
Firewalls- a software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewalls allow the network administrator to divide the network into different network segments known as zones. A firewall filters traffic. It can be used for a single host or between networks. It regulates both inbound and outbound traffic, providing a layer of security inbound and out.
Wireless
The wireless topology is used to extend a wired local area network through the use of an antenna.
Guest Network
Guest Network- a wireless network used to provide non-employees or guests with internet access. This access is limited to certain functions, such as internet surfing and email.
Hardware root of Trust
Hardware root of trust- is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.
Root of trust
Root of Trust- technology that enforces hardware platforms trusted computing architecture through encryption mechanisms designed to keep data confidential and to prevent tampering
High availability
High availability – the property that defines how closely systems approach the goal of providing data availability 100 percent of the time while maintaining a high level of system performance.
High availability refers to a service that needs to remain operational with minimum downtime. A group of servers are referred to as a node. If one node fails, another can take over to reduce or eliminate downtime. Failover cluster
High availability refers to a service that needs to remain operational with minimum downtime. A group of servers are referred to as a node. If one node fails, another can take over to reduce or eliminate downtime.
Distributive allocation
Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes.
Honeynet
Honeynet- an entire dummy network used to lure attackers.
HSM
HSM- hardware security module- a physical device that provides root of trust capabilities
A Hardware Security Module (HSM) is a device used to generate, maintain and store cryptographic keys. It is an external device and can easily be added to a system as needed.
IAAS
IAAS- Infrastructure as a service- a computing method that uses the cloud to provide any or all infrastructure needs.
provides companies the ability to “rent” hardware and services in a cloud environment. The service provider owns, maintains and manages the equipment while the company pays per use.
Immutable systems
Immutable systems – a system that is not upgraded in place, but is programmatically destroyed and then recreated from scratch every time the configuration changes.
Infrastructure as code
Infrastructure as code – an information technology strategy that asserts that the organizations infrastructure can be quickly configured and deployed as desired through programming scripts and other code files rather than through standard software tools.
Integrity-
Integrity- the fundamental security goal of keeping organizational information accurate, free of errors and without unauthorized modifications
Intranet
Intranet- a private network that is only accessible by the organizations own personnel
Load balancers-
Load balancers-a network device that distributes the network traffic or computing workload among multiple devices in a network.
Load balancers can equalize the traffic load between servers, eliminating unscheduled downtimes. Load balancing uses multiple servers to support a single service. Load balancing can ensure system availability.
Mantrap-
Mantrap- a physical security control system that has a door at each end of a secure chamber.
NAT
NAT- Network address translation- a simple form of internet security that conceals internal addressing schemes from public internet by translating between a single public address on the external side of a router and private non-routable addresses internally.
Static NAT
Static NAT uses a one-to-one approach for disguising IP’s. NAT on the internet facing firewall protects private computers from outside threats.
Dynamic NAT
Dynamic NAT- uses multiple IP addresses to map one private IP to many public IP’s. It chooses which IP to use based on the load presented.
Non-persistence
Non-persistence- the property by which a computing environment is discarded once it has finished its assigned task.