• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back

Redundancy

Having more than one of a system, service, device, or other components.


Common Elements:


Geographic dispersal


Separation of servers


Multiple network paths


Redundant network devices


Protection of power


Storage and system


Diversity of technologies

Load Balancers

Make multiple systems or servers appear to be a single resource, allowing both redundancy and increased ability to handle loads by distributing it to more than one system

NIC Teaming

Combines multiple network cards into a single virtual network connection. Used in tandem with redundant network interface cards to ensure connectivity in situations where a system’s availability is important

UPS

Uninterruptible power supply provide battery or other backup power options for short periods of time. Generator

PDU

Power distribution units are used to provide intelligent power management and remote control of power delivered inside server racks and other environments

RAID

Redundant array of inexpensive disks, is a common solution that uses multiple disks with data either striped or mirrors and technology to ensure that data is not corrupted or lost (parity)


RAID 0: Striping, data spread across all drives in the array


RAID 1: Mirroring, data copied exactly to another drive


RAID 5: Striping with parity


RAID 6: Striping with double parity


RAID 10 or 1+0: Mirroring and Striping

Full Backup

Copies the entire device or storage system

Incremental backup

Captures the changes since the last backup and is faster to back up but slower to recover

Differential backup

Captures the changes since the last full backup and is faster to recover but slower to backup

Snapshot

Captures the dull state of a system or device at the time the backup is completed. Common in virtual machines where they allow the machine state to be restored at the point int time that the snapshot was taken

Image

Similar concept to snapshots, but most often the refer to a complete copy of a system or server, typically down to the bit level for the device.

Tape

One of the lowest cost per capacity options for large scale backups.

Disks

Either in magnetic or solid state drive form are typically more expensive for the same backup capacity as tape but are often faster

Optical

Blu-ray or DVD’s still in use but for capacity reasons they are not in common use as a large scale backup tool

Flash

MicroSD cards and USB thumb drives are used for short term copies and even longer term backups. Not frequently used at the enterprise level.

Online vs Offline

Online backups are always available as offline are not. Offline need to be retrieved making online a quick retrieval option, but offline can be kept in a secure location without power and other expense and ensure that organizations cannot have a total data loss

Off-Site Storage

Either at a site they own and operate or through a third part service. It forms a geographic diversity and helps ensure that a single disaster cannot destroy an organization’s data entirely

SAN

Storage Area Network, provides block level access to its storage making it look like a physical drive. Viewed as both a way to replicate data using RAID and as a type of backup.

NAS

Network attacked storage, usually present data as files considered more as a smaller storage device

Cloud and Third Party Storage

Have become increasing common. Considerations need to be taken when exploring these options.


Bandwidth: for both backing up and restoring


Time to retrieve and cost to retrieve files


Reliability


New security models required for backups

Nonpersistence

The ability to have systems or services that are spun up and shut down as needed.

Scalability

The ability to respond to high demand scenarios as well as to failures in individual systems. Common design element designed to scale across many servers instead of requiring a larger server to handle more workload.

Vertical Scalability

Requires a larger or more powerful system or device. Can help when all tasks or functions need to be handled on the same system or infrastructure. Very expensive to increase

Horizontal Scalability

Uses smaller systems or devices but adds mor of them. It can take advantage of adding and removing resources allowing it to shrink and grow as needs change.

Hot Sites

Have all the infrastructure and data needed to operate the organization. Operated full time and makes sure staff are in place, but very expensive

Warm Sites

Have some or all of the systems needed to perform the work required by the organization, but the live data is not in place. Expensive to maintain but they can reduce the time to restoration

Cold Sites

Have space, power, and often network connectivity but they are not prepared with systems or data. Presents challenges of transporting and acquiring hardware during disasters but the least expensive option

Restoration Order

Decisions to balance the criticality of systems and services to the operation of the organization against the need for other infrastructure to be in place and operational to allow each component to be online, secure, and otherwise running properly.

Industrial Camouflage

Security through obscurity by having a building in a nondescript location rather than making it visible allowing angry customers to seek out.

Fences

Act as a deterrent by both making it look challenging to access a facility and as an actual physical defense. Barbed wire and razor wire are commonly used as well

Bollards

Posts or other obstacles that prevent vehicles from moving through an area

Lighting

Plays a part in exterior and interior security by not leaving showed areas and automated lights to show movement inside and outside a building

Badges

Be used for entry access via magnetic stripe and RFID they also often include a picture and other information that can quickly allow personnel and guards to determine if a person is who they say they are and what areas they are allowed to be in

Alarms

Are used to detect and alert about issues, including unauthorized access, environmental problems, and fires. Can be monitored remotely or locally and need to be properly configured as to not cause false positives

Fire suppression systems

Help with resilience by reducing the potential for disastrous fires. There are several types of systems:


Water based sprinklers, Gaseous agents, and Chemical agents

Sinage

Effective signage can serve a number of purposes. It can remind authorized personnel that they are in a secure area and that others who are not authorized should not be permitted to enter and should be reported if they are seen.

Access Control Vestibules

Used to prevent piggyback attacks by requiring authentication to enter a room and then requiring it again to leave that room to enter a secure facility

Locks

Are the most common physical security control. They are not a real deterrent for most deterred attackers since they can be bypassed in many different ways and are not considered a genuine physical access control

Guards

Used in areas where human interaction is either necessary or helpful. They can make decisions that technical control systems cannot and provide both detection and response capabilities, but are expensive and fallible.

Cameras

Allows security to view events in real time or from the past and come in many different forms and features including motion recognition and object detection. Considered a sensor

Sensor Systems

Motion, noise, moisture, and temperature detection sensors

Hot/Cold Aisles

Play into the ability to safely house servers and other devices by placing air intakes and exhausts on alternating aisles to ensure proper airflow

Faraday Cage

Blocks electromagnetic fields. Enclosure made up of conductive mesh that distributes charges from wireless device signals thus stopping them

DMZ

Demilitarized Zone is a screened subnet that can logically or physically segment a network to separate the outside world. They rely on firewalls to prove segmentation that limits the flow of traffic into and out of the screened subnet, thus keeping higher security zones secure

Protected Cable Distribution

A scheme that comes into play if organizations are concerned about attacks that tap into cables or that attempt to access them through any means. It is rarely deployed except for government installations and other high security facilities

Secure Data Destruction

When data reaches the end of its lifespan destroying the media that contains it is an important security measure. It can be done several ways:


Burning


Shredding


Pulping


Pulverizing


Degaussing: magnetically wiping

Air Gap

A system that is not physically connected to another system