Terms Deck 3 Flashcards
honeypot
A decoy system designed to attract hackers. A honeypot usually has all its logging and tracing enabled, and its security level is lowered on purpose. Such systems often include deliberate lures or bait, in the hopes of attracting would-be attackers who think they can obtain valuable items on these systems.
honeyfile
A file used as bait intended to attract an attacker.
honeynet
A network used as bait to attract an attacker.
infrastructure as a service (IaaS)
A cloud computing model in which hardware, storage, and networking components are virtualized and provided by an outsourced service provider.
platform as a service (PaaS)
The delivery of a computing platform, often an operating system with associated services, over the Internet without downloads or installation.
software as a service (SaaS)
A cloud computing model in which software applications are virtualized and provided by an outsourced service provider.
edge computing
Computing that happens near the edge of a network, close to where it’s used or needed.
container
A technology that packages applications and services together with their runtime environment, allowing them to be run anywhere.
software-defined networking (SDN)
A method by which organizations can manage network services through a decoupled underlying infrastructure that allows for quick adjustments based on changing business requirements.
software-defined visibility (SDV)
Visualization combined with the capability to dynamically respond to events across software-defined networks.
virtualization
A technology developed to allow a guest operating system to run along with a host operating system with one set of hardware.
integrity measurement
A method that uses attestation challenges from computed hashes of system or application information to obtain confidence in the trustworthiness and identity of a platform or software.
normalization
The conversion of data to its anticipated, simplest known form.
obfuscation
The act of making something difficult to understand.
Open Web Application Security Project (OWASP)
A nonprofit organization that provides resources to improve the security of software.
elasticity
The capability to expand and reduce cloud resources as needed.
scalability
The capability to handle the changing needs of a system, process, or application within the confines of the current resources.
authentication
The process of identifying users.