Security Architecture Flashcards

(34 cards)

1
Q

What is Security Architecture?

A

Design, structure, and behavior of an organization’s information security environment

It encompasses various models and techniques to protect information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of deployment models in security architecture?

A
  • On-Premise
  • Cloud

On-Premise refers to traditional local infrastructure, while Cloud involves delivery of computing services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three cloud security considerations.

A
  • Shared Physical Server Vulnerabilities
  • Inadequate Virtual Environment Security
  • User Access Management

These considerations address potential risks in cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Serverless Computing?

A

Cloud provider manages server allocation; developers focus solely on writing code

It allows developers to deploy functions without managing server infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Microservices Architecture.

A

Collection of small, autonomous services; each performs a specific business process

This architecture contrasts with traditional monolithic systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Infrastructure as Code (IaC) entail?

A

Automation of managing and provisioning technology stack

IaC uses code for infrastructure management, enhancing consistency and efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of Hybrid Solutions?

A
  • Sensitive data protection
  • Regulatory compliance
  • Interoperability
  • Cost-effectiveness

Hybrid solutions combine on-premise and cloud services for flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Single Point of Failure?

A

A reliance on specific resources or processes that can lead to system-wide outages if they fail

Mitigation includes implementing redundancy and failover procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Cloud security is a shared responsibility.

A

TRUE

Both the cloud service provider and the customer share responsibilities for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of Hypervisors?

A
  • Type 1 (Bare Metal)
  • Type 2 (Hosted)

Type 1 runs directly on hardware, while Type 2 operates within a standard OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Data Remnants?

A

Residual data left behind after deletion or erasure processes

In cloud environments, data may not be completely removed, posing a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key benefits of Containerization?

A
  • Efficiency
  • Speed
  • Portability
  • Scalability
  • Isolation

Containerization encapsulates applications with their OS environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does User Access Management aim to prevent?

A

Unauthorized access to sensitive data and systems

Mitigation strategies include enforcing strong password policies and implementing multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Responsibility Matrix in cloud computing?

A

Outlines the division of responsibilities between the cloud service provider and the customer

It clarifies who is responsible for various aspects of security and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Logical Separation?

A

Establishes boundaries within a network to restrict access to certain areas

Implemented using firewalls, VLANs, and network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the challenges of Microservices?

A
  • Complexity
  • Data Management
  • Network Latency
  • Security

The distributed nature of microservices increases the attack surface and management complexity.

17
Q

What is Software-Defined Networking (SDN)?

A

Dynamic, programmatically efficient network configuration

SDN improves network performance and monitoring by decoupling control and forwarding functions.

18
Q

What is the key advantage of IaC?

A

Operation consistently produces the same results

Crucial for consistency and reliability in multiple environments.

19
Q

What is the difference between Physical and Logical Separation?

A
  • Physical Separation: High security, complete isolation
  • Logical Separation: More flexible, easier to implement

Physical separation is often referred to as ‘Air Gapping’.

20
Q

What are the risks associated with centralized architecture?

A
  • Single Point of Failure
  • Scalability Issues
  • Security Risks

Centralized systems can disrupt the entire network if a server fails and struggle to handle growth.

21
Q

What are the benefits of decentralized architecture?

A
  • Resilience
  • Scalability
  • Flexibility

Decentralized systems can continue functioning despite individual node failures and support remote work.

22
Q

What are the considerations for choosing between centralized and decentralized systems?

A
  • Data accuracy and resource management priorities for centralized systems
  • Resilience, flexibility, and rapid scaling needs for decentralized systems

The choice depends on the organization’s specific needs and context.

23
Q

Define Internet of Things (IoT).

A

Network of physical devices with sensors, software, and connectivity

IoT enables data exchange among connected objects.

24
Q

What is the role of a Hub/Control System in IoT?

A

Central component connecting IoT devices

It collects, processes, analyzes data, and sends commands.

25
What are **smart devices**?
Everyday objects enhanced with computing and internet capabilities ## Footnote They sense the environment, process data, and perform tasks autonomously.
26
What are the **risks** associated with **IoT devices**?
* Weak Default Settings * Poorly Configured Network Services ## Footnote Changing default usernames/passwords and keeping IoT devices on a separate network is essential.
27
What are **Industrial Control Systems (ICS)** used for?
Monitor and control industrial processes ## Footnote Found in industries like electrical, water, oil, gas, and data.
28
What is a **Supervisory Control and Data Acquisition (SCADA)** system?
Type of ICS designed for monitoring and controlling geographically dispersed industrial processes ## Footnote Common in electric power generation, water treatment, and oil and gas pipeline monitoring.
29
What are the **risks** associated with **ICS and SCADA systems**?
* Unauthorized Access * Malware Attacks * Lack of Updates * Physical Threats ## Footnote These systems can be manipulated by unauthorized individuals and are vulnerable to malware.
30
What are key **security strategies** for **securing ICS and SCADA systems**?
* Implement Strong Access Controls * Regularly Update and Patch Systems * Use Firewall and Intrusion Detection Systems * Conduct Regular Security Audits * Employee Training ## Footnote These strategies help protect against unauthorized access and vulnerabilities.
31
Define **embedded systems**.
Specialized computing components designed for dedicated functions within larger devices ## Footnote They integrate hardware and mechanical elements and are essential for various daily-use devices.
32
What is a **Real-Time Operating System (RTOS)**?
Designed for real-time applications that process data without significant delays ## Footnote Critical for time-sensitive applications like flight navigation and medical equipment.
33
What are the **risks** associated with **embedded systems**?
* Hardware Failure * Software Bugs * Security Vulnerabilities * Outdated Systems ## Footnote These systems can be prone to failure and are vulnerable to cyber-attacks.
34
What are key **security strategies** for **embedded systems**?
* Network Segmentation * Wrappers (e.g., IPSec) * Firmware Code Control * Challenges in Patching ## Footnote These strategies help maintain system integrity and limit potential damage in case of a breach.