Maximum yearly downtime of a service which claims 99.999% uptime.
What is 5.26 minutes?
Device or tool which captures and analyzes the traffic of a given network.
What is a packet sniffer?
Map of users or groups to permissions.
What is an ACL (Access Control List)?
Technology which allows users to gain access to application software and databases. Cloud providers manage the infrastructure. Users store data on the cloud provider’s servers.
What is Software as a Service (SaaS)
The state data is in during initial input, modification, computation, or output .
What is data processing?
Systems created to duplicate organization data, configuration data and personal data ensures system availability, in order to quickly restore it in an outage or attack scenario
What is a BackUp system?
Policy which makes enterprises not responsible for providing, and therefore securing, the devices their employees use at work
What is "Bring Your Own Device"(BYOD)?
Measures put in place to keep track of user activities: What they access, what they try to access, how long they use a resource, changes they make
What is accounting?
A security policy component that defines what users can and cannot do on the various system components (e.g. what websites the can or not visit on the company network).
What is acceptable use policy (AUP)?
Multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk.
What is a Redundant array of independent discs (RAID)?
The act of grouping multiple devices together to provide a service that appears to be a single entity to a user. If one device fails, the other devices remain available.
What is clustering?
A person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own.
What is a script kiddie?
Value tied to the content of data, used to validate that the data was not modified during a transfer
What is a checksum?
An information security standard published in 2005 and revised in 2013. most commonly used for implementing information security worldwide.
What is ISO 27000?
The two leading providers of cloud storage in the world.
What are AWS & Azure?
Fail-over mechanism which is active and connected, ready to be switched in in case a main component fails.
What is a hot spare/ hot standby?
Attack on a DNS server, redirecting traffic to a machine picked by the attacker.
What is DNS Spoofing?
The current director of the CIA.
Who is Mike Pompeo?
Exploit of the SMB protocol on Microsoft machines, allegedly created by the NSA
What is ETERNALBLUE?
Technical term for one's ability to use removable media to physically move data from one computer to another.
What is sneaker net?
Software tool developed by Netflix to test the resilience of their fleet by randomly shutting down machines
What is chaos monkey?
A software application that examines activities on host systems only. It generates log files and alarm messages when it detects unusual activity. A system storing sensitive data or providing critical services can be a good candidate to that service.
What is Host-based intrusion detection systems (IDS)
What is Authentication, Authorization and Accounting (AAA).
Malicious worm, famous for having attacked Iran's nuclear reactors
What is Stuxnet?
A way to measure the consistency of a collection of data (a file, a picture, or a record), by performing a process called a hash function to take a snapshot of that data at an instant in time to unsure that it was not changed.