SY0-701: 3.0 (Security Architecture) Flashcards
Data Classifications (Companies) (3.3)
Sensitive
Confidential
Public
Restricted
Private
Critical
Sensitive Data (3.3)
Has minimal impact if released (e.g. organizations financial data)
Confidential Data (3.3)
Contains items such as trade secrets, intellectual property data, and source code that affect the business if disclosed (only viewed by approved personnel)
Public Data (3.3)
Has no impact on the company if released and is often posted in an open-source environment
Restricted Data (3.3)
Proprietary data including trade secrets
Private Data (3.3)
Contains data that should only be used within the organization (e.g. personnel records, salaries. etc.)
Critical Data (3.3)
Contains valuable data (e.g. credit card #’s
Data Classifications (Government) (3.3)
Unclassified
Sensitive but Unclassified
Confidential
Secret
Top Secret
Unclassified data (3.3)
Data that can be released to the public or under the Freedom of Information Act
Sensitive but Unclassified (3.3)
Data that would not hurt national security if released but could impact those whose data was being used (e.g. medical records)
Confidential Data (3.3)
Data that could seriously affect the government if unauthorized disclosures happen
Secret Data (3.3)
Data that could seriously damage national security if disclosed
Top Secret (3.3)
Data that would gravely damage national security if disclosed
Data at Rest (3.3)
Refers to any data stored in databases, file systems, or other storage systems (prime target for threat actors)
Methods to secure data at rest (3.3)
Full disk encryption- Encrypts entire hard drive
Partition encryption- Encrypts specific partition of drive
File encryption- Encrypts individual files
Volume encryption- Encrypts a set of selected files/directories
Database encryption- Encrypts data stored in database (table, row, column)
Record encryption- Encrypts specific record in database
Data in Transit/Data in Motion (3.3)
Data that is actively moving from one location to another, such as across the Internet or through a private network
Methods to secure data in transit/motion (3.3)
SSL (Secure Socket Layer) and TLS (Transport Layer Security)
VPNs (Virtual Private Networks)
IPSec (Internet Protocal Security)
SSL/TLS (3.3)
Secure Socket Layer/Transport Layer Security
Cryptographic protocols designed to provide secure communication over a computer network
VPN (3.3)
Virtual Private Network
Technology that creates a secure connection over a less secure network (e.g. over the Internet)
IPSec (3.3)
Internet Protocal Security
Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream
Data in Use (3.3)
Data that is in the process of being created, retrieved, updated, or deleted
Methods of securing data in use (3.3)
Encryption at application level
Access controls
Secure Enclave (dedicated secure subsystem integrated into Apple System on Chip- SoC)
Intel software guard (encrypts data in memory)
Data Types (3.3)
Regulated Data
Trade Secrets
Intellectual Property
Legal Information
Financial Information
Human Readable vs Non-Human Readable Data
Regulated Data (3.3)
Information controlled by laws, regulations, or industry standards (e.g. GDPR- General Data Protection Regulation, HIPAA- Health Insurance Portability and Accountability Act)
Trade Secrets (3.3)
Type of confidential business information that provides a company with a competitive edge
Intellectual Property (IP) (3.3)
Creations of the mind, such as inventions, literary and artistic works, designs, and symbols
Legal Information (3.3)
Includes and data related to legal proceedings, contracts, or regulatory compliance
Financial Information (3.3)
Data that is related to an organizations financial transactions, such as sales records, invoices, tax documents, and bank statements
Human Readable and Non-Human Readable Data (3.3)
Information that a human can read and information a human cannot read (e.g. encrypted, ciphertext, etc.)
Data Sovereignty (3.3)
The concept that digital information is subject to the laws of the country in which it is stored, collected, or processed
Data Geolocation Considerations (3.3)
If data is stored in another county the organization must abide by those laws (e.g. Europe’s GDPR has strict laws granting individuals rights over their personal data)
Methods for Securing Data- General (3.3)
Geographic restrictions
Encryption
Hashing
Masking
Tokenization
Obfuscation
Segmentation
Permission restrictions / Access control
Geographic restrictions (Securing Data) (3.3)
Involves setting up virtual boundaries to restrict data access based on geographic location (geofencing)
Encryption (Securing Data) (3.3)
Fundamental data security method that transforms readable data (plaintext) into unreadable data (ciphertext) using an algorithm and an encryption key
Hashing (Securing Data) (3.3)
Technique that convert data into a fixed size of numerical or alphanumeric characters, known as a hash value or hash digest
Masking (Securing Data) (3.3)
Involves replacing some or all of the data in a field with a placeholder, such as “x” to conceal original content
Tokenization (Securing Data) (3.3)
Replaces sensitive data with non-sensitive substitutes, known as tokens (e.g. payment processing to protect credit card information)
Obfuscation (Securing Data) (3.3)
Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand (e.g. encryption, masking, pseudonyms)
Segmentation (Securing Data) (3.3)
Involves dividing a network into separate segments, each with its own security controls
Permission Restrictions (Securing Data) (3.3)
Involves defining who has access to specific data and what they can do with it (e.g. RBAC- Role Based Access Control)
High Availability (3.4)
The ability of a service to be continuously available by minimizing the downtime to the lowest amount possible
Uptime (3.4)
The number of minutes or hours that the system remains online over a given period, and the uptime is usually expressed as a percentage (9’s of availability, e.g. 99.999% = five nines)
Load Balancing (3.4)
The process of distributing workloads across multiple computing resources
Clustering (3.4)
The use of multiple computers, multiple storage devices, and redundant network connections that all work together as a single system to provide high levels of availability, reliability, and scalability
Redundancy (3.4)
The duplication of critical components or functions of a system with the intention of increasing the reliability of the system
RAID 0 (3.4)
Provides data striping across multiple disks to increase performance; used for performance as opposed to data protection
RAID 1 (3.4)
Mirrors data for redundancy across two drives
RAID 5 (3.4)
Stripes data with parity, using at least three storage devices (can lose 1 disk w/o data loss)
RAID 6 (3.4)
Uses data striping across multiple devices with two pieces of parity data (can lose 2 disks w/o data loss)
RAID 10 (3.4)
Combines RAID 1 and RAID 0 featuring mirrored array in a striped setup (can lose 1 disk per mirrored array)
Failure-Resistant (3.4)
Use of redundant storage to withstand hardware malfunctions (RAID 1 or RAID 10)
Fault-Tolerant (3.4)
Use of RAID 1, 5, 6, and 10 for uninterrupted operation during hardware failures (no downtime)
Disaster-Tolerant (3.4)
Protects data from catastrophic events (RAID 1 and RAID 10 due to having full mirrors)
Capacity Planning (3.4)
Crucial strategic planning to meet future demands cost-effectively
People (Capacity Planning) (3.4)
Involves analyzing current skills and forecasting future needs for hiring or training (e.g. seasonal positions)
Technology (Capacity Planning) (3.4)
Involves assessing current resources, utilization, and anticipating future technological needs
Infrastructure (Capacity planning) (3.4)
Involves considering physical space and utilities to support organizational operations
Process (Capacity Planning) (3.4)
Aims to optimize business processes to handle demand fluctuations
Surge (Power) (3.4)
A small and unexpected increase in the amount of voltage that is being provided
Spike (Power) (3.4)
A short transient voltage that is usually caused by a short circuit, a tripped circuit breaker, a power outage, or a lightning strike
Sag (Power) (3.4)
A small and unexpected decrease in the amount of voltage that is being provided
Undervoltage Event (Power) (3.4)
Occurs when the voltage is reduced to lower levels and usually occur for a longer period of time than a sag
Power Loss Event (3.4)
Occurs when there is a total loss of power for a given period of time
Line Conditioner (3.4)
Used to overcome any minor fluctuations in the power being received by the given system
UPS (3.4)
Uninterruptible Power Supply- A device that provides emergency power to a system when the normal input power source has failed
PDC (3.4)
Power Distribution Center- Acts as a central hub where power is received and then distributed to all systems in the data center
Data Backup (3.4)
The process of creating duplicate copies of digital information to protect against data loss, corruption, or unavailability
Data Backup considerations (3.4)
Onsite / Offsite
Frequency
Encryption
Snapshots
Recovery
Replication
Journaling
Frequency (Data Backup) (3.4)
How much data are you willing to lose?
How frequently does the data change?
Encryption (Data Backup) (3.4)
Data-at-rest encryption as well as data-in-transit encryption
Snapshots (3.4)
Point-in-time copies of the data that capture a consistent state that is essentially a frozen in time copy of the data
Journaling (3.4)
Maintaining a meticulous record of every change made to an organizations data over time
Data Recovery Process (3.4)
Selection of the backup
Initiating the recovery process
Data validation
Testing and validation
Documentation and reporting
Notification
Continuity of Operations Plan (3.4)
Ensures an organizations ability to recover from disruptive events or disasters
BCP (3.4)
Business Continuity Plan- Addresses responses to disruptive events; 2 parts
1. BCP (Deals w/ incidents)
2. DRP (Deals w/ disasters)
DRP (3.4)
Disaster Recovery Plan- Considered as a subset of the BCP, it focuses on how to resume operations swiftly after a disaster
Site Considerations (3.4)
Hot Site- Fully equipped backup facility
Warm Site- Partially equipped, operational w/i days
Cold Site- No immediate equipment
Mobile Site- Can be hot, warm, or cold; independent mobile site; self sufficient
Virtual Site- Utilizes cloud-based environments and is highly flexible; hot, warm, and cold
Hybrid Model- Critical staff=hot, the rest=warm
Platform Diversity (3.4)
A vital aspect in redundant site design that uses different platforms to prevent single points of failure in disaster recovery (e.g. cloud provider platform diversity = spreading resources across multiple cloud providers reducing the risk of a single platform outage)
Recovery Testing (3.4)
Evaluates the systems ability to return to regular functioning following a disruptive incident; Tests efficiency to recover from multiple failure points
Tabletop Exercise (3.4)
A simulated discussion to improve crisis readiness without deploying resources
Failover Test (3.4)
Verifies seamless system transition to a backup for uninterrupted functionality during disasters
Simulation (3.4)
Computer-generated representations of real-world scenarios