Security Architecture and Engineering Flashcards
Conceptual model that ensures no matter what activity is taking place within a system, it is always trustworthy
State Machine
Security model that addresses the interaction between subjects and objects
Relationship Model
The ability of a system to automatically accommodate larger loads by adding resources
Scalability
The ability to fit the resources needed to cope with loads dynamically
Elasticity
Scalability by Making hardware stronger
scaling up
Scalability by Adding additional nodes
scaling out
Deployment of data-handling activities and operations at or close to the source without having to go through centralized network segments
Edge computing
Ability to process data and perform complex calculations at high speeds
High Performance Computing (HPC)
Devices equipped with features for capturing data and processing
Smart edge devices
Which is of the following is not an industrial control system?
1. Distributed control systems
2. Program logic controllers
3. Supervisory control and data acquisition
4. Distributed network protocol 3
- Distributed network protocol 3
The process of analyzing data with tools that look for trends and correlations:
1. Data warehousing
2. Data mining
3. Aggregation
4. Inference
- Data mining
Community cloud
Cloud provisioned for well-defined group
Public cloud
Cloud provisioned for public use
Private cloud
Cloud provisioned for single organization exclusive use
Term that describes the use of IT solutions that are managed outside of and without the knowledge of the IT department:
1. SecaaS
2. CASB
3. Outsourcing
4. Shadow IT
- Shadow IT