Security Architecture: Architectural Model Considerations Flashcards

1
Q

What key components we need to look for in Availability?

A

Availability considerations – High Availability - Redundancy

Factors that you should consider with respect to availability in IT architectural models involve designing systems that minimize downtime and ensure continuous operation by implementing redundancy, fault tolerance, and disaster recovery mechanisms.

Additionally, it’s also important to consider factors such as service-level agreements, monitoring, and scalability. They play crucial roles in maintaining high availability and meeting user expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What key components we need to look for in Resiliency?

A

Resiliency considerations – How do you deal with things when you catch on fire? - Redundancy

When considering resiliency, you should focus on building systems that can withstand and recover from failures gracefully, by employing practices such as:

Distributed architecture.

Load balancing.

Automated failover.

Graceful degradation of nonessential functionalities.

These measures ensure that the system can bounce back from disruptions, maintain performance under stress, and provide a consistent user experience even in challenging conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What key components we need to look for in Cost considerations?

A

Cost considerations

Cost factors that you should consider include optimizing the allocation of resources and selecting appropriate technologies to achieve the desired functionalities while minimizing expenses. By carefully evaluating factors such as hardware, software, cloud services, and maintenance requirements, organizations can strike a balance between performance and affordability, making cost-effective decisions that align with their budgetary constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What key components we need to look for in Responsiveness considerations?

A

Responsiveness considerations (Reliability)

Factors that you should consider with respect to responsiveness center around designing systems that offer low-latency and fast response times to meet user expectations for real-time interactions and seamless user experiences. This involves optimizing network communication, database queries, and application processing, as well as employing caching and content delivery networks to reduce latency and ensure swift delivery of data and services to end-users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What key components we need to look for in Scalability considerations?

A

Scalablity considerations / Elastacity

When you’re considering scalability, you should design designing systems that can handle increasing workloads and accommodate growth without compromising performance. By employing techniques such as horizontal scaling, microservices architecture, and elastic cloud resources, organizations can ensure their systems can expand seamlessly to meet the demands of a growing user base or higher data processing requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What key components we need to look for in Ease-of-deployment considerations?

A

Ease-of-deployment considerations

Factors that you should consider with respect to ease of deployment revolve around streamlining the process of deploying and updating software applications or services. By adopting containerization, continuous integration and continuous deployment (CI/CD) pipelines, and infrastructure-as-code (IaC) practices, organizations can achieve faster, automated, and consistent deployments. This will help reduce downtime and minimize the risk of errors during the deployment process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key components do we need to look for in Risk Transference?

A

Considerations for risk transference – How safe can I transfer data

When considering risk transference, you need to identify potential risks and determine whether to mitigate, accept, or transfer them to external parties, such as third-party vendors or insurance providers. By offloading certain risks to specialized entities, organizations can focus on their core competencies while ensuring that potential liabilities are handled by those with the expertise and resources to manage them effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What key components do we need to look for in Ease-of-recovery considerations?

A

Ease-of-recovery considerations – How quickly network infrastructure and security back in place

Factors that you should consider with respect to ease of recovery involve designing systems with robust backup and disaster-recovery mechanisms, enabling swift and efficient restoration of data and services in the event of a failure or outage. Organizations can reduce the impact of disruptions to their operations and end users by implementing measures such as:

Data replication

Automated backups

Failover configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What key components do we need to look for Patch-Availability?

A

Patch-availability considerations

When considering how to make patches available, you need to assess the timely availability and deployment of software updates and security patches to address vulnerabilities and bugs. By implementing a proactive patch management strategy, organizations can:

Enhance the security and stability of their systems.

Minimize the risk of potential exploits.

Ensure that the software remains up-to-date with the latest improvements and fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What key components do we need to look for Considerations when there’s an inability to patch – (take Legacy systems into considerations)?

A

Considerations when there’s an inability to patch – (take Legacy systems into considerations)

Factors to consider with respect to patches not being able to be deployed involve planning for scenarios where certain components or legacy systems can’t be easily updated or patched due to various reasons, such as:

Compatibility issues.

Vendor-support limitations.

Critical dependencies.

In such cases, organizations need to implement compensating controls, isolate vulnerable components, and apply additional security measures to mitigate the risks posed by the unpatched elements, while working towards finding suitable long-term solutions.

Power considerations – UPS/E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What key components do we need to look for Power considerations?

A

Power considerations – UPS/Efficiency of power consumptions

Power considerations involve evaluating the energy requirements and consumption patterns of hardware and infrastructure components to optimize efficiency and reduce operational costs. By employing energy-efficient hardware, data center cooling solutions, and power management strategies, organizations can minimize their environmental impact and enhance the sustainability of their IT operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What key components do we need to look for Compute power considerations?

A

Compute power considerations – Mitigate attacks like DDoS

Factors to consider with respect to computing, you need to evaluate the computational requirements of applications and services to ensure that the underlying infrastructure can handle the workload efficiently.By appropriately selecting the right mix of processing power, such as central processing units (CPUs), graphics processing units (GPUs), or specialized accelerators, organizations can achieve optimal performance and scalability and meet the demands of their computational-intensive tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly