This is the biggest risk to a business associated with any shared cloud model
What is Multitenancy?
A network administrator may use one of these to enable themselves to remotely manage a network in a separate security zone, usually doing out of band management of devices and servers, this special server is hardened as much as possible
What is a Jump Box?
Data type that is essential to the functioning of an organization
What is Critical Data?
This is when multiple servers are used together to perform a task, has redundancy and failover to maintain availability
What is Clustering?
These allow a system to quickly restore to a known state at any time, associated mostly with VMs
What are Snapshots?
This allows you to provision virtual resources by deploying scripts
What is Infrastructure as Code IaC?
This is designed to filter and monitor HTTP requests in order to block malicious traffic going to a web application specifically
What is a Web Application Firewall?
This type of data is proprietary business information that includes things like formulas, processes, or designs, but generally leans into things that can't be patented or copyrighted (not always true, but most of the time it is)
What is Trade Secret?
This kind of site has at least some infrastructure set up and a backup of some data
What is a Warm Site?
This kind of site has basic infrastructure but no active systems or data, but is the least expensive kind of site to maintain
What is a Cold Site?
This is an operating system that you will commonly find in medical devices, vehicles, and industrial control systems, in some situations security methods are compromised to ensure timely operations of the system which can be leveraged as vulnerabilities
What is a Real-time Operating System RTOS?
These distribute traffic across multiple servers for availability and redundancy, used to mitigate DoS and DDoS attacks
What is a Load Balancer?
This type of data is proprietary information that includes inventions, artistic works, and designs that are legally protected through patents and copyrights
What is Intellectual Property?
This is the best mitigation against natural disasters in reference to the cloud
What is Geographic Dispersion?
This is a big benefit of cloud computing, the ability for resources to be added for long term changes to use of cloud resources
What is Scalability?
These can improve security by providing isolation of applications by themselves, but careful management of resources is required to use these and must happen or you may introduce vulnerabilities to your security
What is a Container?
This protocol is used for network authentication for wired AND wireless networks, and enforces authentication before access is granted to the network
What is 802.1x?
This state of data presents the most challenges to security as this data state itself cannot be encrypted
What is Data in Use?
This is like playing IT D&D, where teams discuss strategy while a live simulation of a disaster is presented to them
What is a Tabletop Exercise?
These provide hyperlocal temporary electricity to devices, usually seen at computers that are mission critical and cannot withstand an immediate interruption of power
What is an Uninterruptable Power Supply?
The drive for this can often complicate patching and vulnerability fixes, this is often measured in the number of 9s used to represent the lack of downtime by percent
What is High Availability?
This protocol is used for authentication only on wireless networks, supports methods including passwords and certificates for authentication
What is Extensible Authentication Protocol EAP?
This uses unique identifiers to safeguard the actual data while it is being transmitted, this data would be unusable without the original database and intrinsically has no value
What is Tokenization?
Plan that ensures critical business functions continue in the event of a disaster or other major incident
What is a Business Continuity Plan BCP?
DAILY DOUBLE ***LOUD NOISES DO YOUR BEST ON YOUR OWN***
This kind of system is built in to devices, mostly medical and industrial, and can present security difficulties due to it being hard to update or patch these devices
What is an Embedded System?