Security Architecture Flashcards

1
Q

Responsibility Matrix

A

The division of responsibilities between the cloud service provider and the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Third Party Vendors

A

Provides specialized services that enhance the cloud solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On-Premise Solutions

A

A computing infrastructure that is physically located on-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Resilience

A

The cloud provider’s ability to recover from failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtualization

A

Technology that allows for emulation of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Containerization

A

Lightweight alternative to full machine virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hypervisor Type 1

A

Bare metal runs directly on the host’s hardware and functions like an OS; Microsoft’s Hyper-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hypervisor Type 2

A

Operates within a standard OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Live Migration of Virtual Machines

A

When a VM needs to move from one host to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Serverless Computing

A

Where the responsibility of managing servers, databases, applications, and logic is shifted away from the developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microservices

A

Where large applications are broken down into smaller, independent services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Separation/Air Gapping

A

Isolation of a network by removing direct or indirect connections from other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical Separation

A

Creating boundaries within a network; Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software-Defined Networks

A

Enable efficient network configuration to improve performance and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Defined Network Plane Types

A

Data Plane, Control Plane, and Application Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Plane

A

The forwarding plane that is responsible for handling packets and making decisions based on protocols

17
Q

Control Plane

A

The brain of the network that designs where the traffic is sent; Centralized Plane

18
Q

Application Plane

A

App goes here

19
Q

Infrastructure as Code (IAC)

A

Method in which IT infrastructure is defined and code files; YAML is an example

20
Q

Snowflake system

A

A conflict that lacks consistency that might introduce risk

21
Q

Idempotence

A

The ability of an operation to produce the same result as many times executed

22
Q

Centralized Architecture

A

All the computing functions are coordinated and managed from a single authority

23
Q

Decentralized Architecture

A

Computer functions are distributed across multiple systems or locations

24
Q

Centralized Architecture Risks

A

Single-point failure, scalability, and security

25
Decentralized Architecture Risks
Security, management, and data Inconsistency
26
Internet of Things (IoT)
The network of physical items with embedded systems that enable connection and data exchange
27
Internet of Thing Types
Hub, smart devices, wearable, and sensors
28
Hub
The central point of connecting all IoT devices and sensor commands
29
Industrial Control Systems (ICS)
Controlled systems used to monitor and control industrial processes
30
Distributed control systems
Used to control production systems within a single location
31
Programmable Logic Controllers
Control specific processes such as an assembly line
32
Supervisory Control and Data Acquisition
A type of ICS used to monitor and control geographically dispersed industrial processes
33
Embedded Systems
Computing component is dedicated to performing a specific function
34
Real-Time Operating Systems (RTOS)
Ensures data processing real-time and is crucial for time sensitive applications
35
Strategies for Securing Embedded Systems
Wrappers, network segmentation, firmware code control, and challenges of patching
36
Wrappers
Show only entry and exit points of the data when traveling between networks
37
Challenges of Patching
Refers to the issues that arise when trying to patch systems that are physically hard to reach and are not built to be updated