click below
click below
Normal Size Small Size show me how
Security + CompTIA
Domain 3 Architecture and design
| Term | Definition |
|---|---|
| COBIT | a framework for developing, implementing, monitoring and improving information technology (IT) governance and management best practices. |
| COSO | a widely accepted control framework for enterprise governance and risk management |
| SDN | Software Defined Network - technology that separates the control plane management of network devices from the underlying data plane that forwards network traffic - network is intelligent and has broad perspective |
| NAT | Name Address Translation - acts as liaison between internal and internet, allowing multiple computers to connect to the internet using 1 IP address |
| air gaps | physically isolated machines not connected to the internet |
| Mirror ports | used on a network switch to send a copy of network packets seen on one switch port to a network monitoring connection on another switch port |
| SPAN | Switched Port Analyzer, fancy name for Mirror Ports |
| TPMs | secure cryptoprocessors used to authenticate hardware devices |
| TPM's | Bitlocker full disk encryption requires this kind of chip |
| EFS | Encryption File System, basically NTFS 3.0 - doesn't require TPM |
| EMI Shielding | seeks to reduce electronic signals that "leak" from computer and electronic equipment. Uses Faraday cages & TEMPEST shielding |
| Netstat | Port 15 |
| FTP | Port 20 & 21 |
| SSH/SFTP/SCP | Port 22 |
| Telnet | Port 23 |
| SMTP | Port 25 |
| DNS | Port 53 |
| HTTP | Port 80 |
| NTP | Port 123 |
| LDAP | Port 389 |
| HTTPS | Port 443 |
| LDAPS | Port 636 |
| FTPS | Port 989 & 990 |
| Radius | Port 1812 |
| RDP | Port 3389 |
| The Lightweight Directory Access Protocol (LDAP) is a directory service protocol that runs on a layer above the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories. Service is based on a client-server model | LDAP |
| Same as Lightweight Directory Access Protocol, except with secure information transfer | LDAPS |
| Network Time Protocol | NTP |
| File Transfer Protocol - secure, however, it's just an addition onto FTP, completely different from SFTP | FTPS |
| Baseline | help establish pattern of use that later help identify variations that identify unauthorized access attempts |
| Smart Cards - often used with personal identification | use embedded systems with an OS included on chip |
| Waterfall Software Development Life Cycle | SDLC model starts with defined requirements & well-developed plan, adjustments confined to the current development stage |
| Agile Software Development Life Cycle | SDLC model starts with less rigorous guidelines and allows for adjustments during the entire process |
| Secure DevOps | Includes security in the SDLC ensuring that security is built in during the development process |
| CI server | server that compiles, builds and tests each new version of code committed to central repository without user interaction - continual integration |
| Immutability | An approach to upgrading & change management. A new version (usually virtual) is created, and once working well, the original will be deleted. V1, V2. no v1.5/1.6 etc... |
| Static Code Analysis | white box software testing process by which semi-random is injected into a program or protocol stack to detect bugs |
| Dynamic Code Analysis | Based on observing how code behaves during execution |
| Fuzzing | black box software testing process by which semi-random data is injected into a program or protocol stack to detect bugs |
| Public Cloud | cloud that provides shared resources over the internet |
| SAAS | Delivery of a licensed application to customers over the internet for use as a service on demand - zendesk, paypal and facebook are examples of this cloud model |
| IAAS | delivery of computer infrastructure in a hosted service model: Amazon EC2, Rackspace, digital ocean are examples of this cloud model |
| PAAS | delivery of a computing platform, often an operating system with associated services, over the internet without downloads or installation Salesforce, heroku |
| hypervisor | software installed directly on top of server and it's underlying hardware. |
| Type I Hypervisor | virtual OS platform that runs directly on a hardware environment t doesn't have to load an underlying OS first |
| CASB | Cloud Access Security Broker - address security requirements such as visibility, data protection, threat protection and compliance across public cloud services |
| Scalability | based on capability to handle the changing needs of a system within the confines of current resources |
| Elasticity | capability to expand and reduce resources as needed at any given point in time |
| Raid 0 | Raid with no fault tolerance |
| Raid 1 | Raid with mirroring and duplexing |
| Raid 5 | Independent data disk with distributed parity blocks -Longer rebuild times are one of the major drawbacks |
| Raid 10 | Requires min of 4 disks, disk 1 & 2 are Raid 1, disk 3 & 4 are also Raid 1. Together Raid 1 and second Raid 1 are Raid 0 |
| Physical detective controls | motion detectors, CCTV Monitors & alarms |
| Mantrap | holding area between two entry points where one door cannot be unlocked/opened until opposite door has been locked and closed |
| HVAC System | Overcooling with this air system causes condensation, over heating causes excessive static |
| Wet Pipe Fire Suppression System | A typical indoor sprinkler system using water |
| Dry Pipe Fire Suppression System | Instead of water for sprinklers, pipes are filled with pressurized air |
| Class A Fires | trash, wood and paper decrease temperature of fire and extinguishes blaze |
| Class B Fires | Fires usually extinguished with foam, fueled by liquids, gases or grease. Foam quenches oxygen supply. |
| Class C Fires | Fires characterized by equipment energized by electrical equipment, electrical fires, burning wires - put out using extinguishers based on Carbon Dioxide |
| PDS | A protective distribution system also called protected distribution system, makes physical access difficult by enclosing equipment and electronic access difficult by using different cables and patch panels |