What are you implying?
The Principles Office
if true=1 loop f(BIG) D(ata)
Can't stop me now
I Was Having Such a Good Time
100

This is the biggest risk to a business associated with any shared cloud model

What is Multitenancy?

100

A network administrator may use one of these to enable themselves to remotely manage a network in a separate security zone, usually doing out of band management of devices and servers, this special server is hardened as much as possible

What is a Jump Box?

100

Data type that is essential to the functioning of an organization

What is Critical Data?

100

This is when multiple servers are used together to perform a task, has redundancy and failover to maintain availability

What is Clustering?

100

These allow a system to quickly restore to a known state at any time, associated mostly with VMs

What are Snapshots?

200

This allows you to provision virtual resources by deploying scripts

What is Infrastructure as Code IaC?

200

This is designed to filter and monitor HTTP requests in order to block malicious traffic going to a web application specifically

What is a Web Application Firewall?

200

This type of data is proprietary business information that includes things like formulas, processes, or designs, but generally leans into things that can't be patented or copyrighted (not always true, but most of the time it is)

What is Trade Secret?

200

This kind of site has at least some infrastructure set up and a backup of some data

What is a Warm Site?

200

This kind of site has basic infrastructure but no active systems or data, but is the least expensive kind of site to maintain

What is a Cold Site?

300

This is an operating system that you will commonly find in medical devices, vehicles, and industrial control systems, in some situations security methods are compromised to ensure timely operations of the system which can be leveraged as vulnerabilities

What is a Real-time Operating System RTOS?

300

These distribute traffic across multiple servers for availability and redundancy, used to mitigate DoS and DDoS attacks

What is a Load Balancer?

300

This type of data is proprietary information that includes inventions, artistic works, and designs that are legally protected through patents and copyrights

What is Intellectual Property?

300

This is the best mitigation against natural disasters in reference to the cloud

What is Geographic Dispersion?

300

This is a big benefit of cloud computing, the ability for resources to be added for long term changes to use of cloud resources

What is Scalability?

400

These can improve security by providing isolation of applications by themselves, but careful management of resources is required to use these and must happen or you may introduce vulnerabilities to your security

What is a Container?

400

This protocol is used for network authentication for wired AND wireless networks, and enforces authentication before access is granted to the network

What is 802.1x?

400

This state of data presents the most challenges to security as this data state itself cannot be encrypted

What is Data in Use?

400

This is like playing IT D&D, where teams discuss strategy while a live simulation of a disaster is presented to them

What is a Tabletop Exercise?

400

These provide hyperlocal temporary electricity to devices, usually seen at computers that are mission critical and cannot withstand an immediate interruption of power

What is an Uninterruptable Power Supply? 

500

The drive for this can often complicate patching and vulnerability fixes, this is often measured in the number of 9s used to represent the lack of downtime by percent

What is High Availability?

500

This protocol is used for authentication only on wireless networks, supports methods including passwords and certificates for authentication

What is Extensible Authentication Protocol EAP?

500

This uses unique identifiers to safeguard the actual data while it is being transmitted, this data would be unusable without the original database and intrinsically has no value

What is Tokenization?

500

Plan that ensures critical business functions continue in the event of a disaster or other major incident

What is a Business Continuity Plan BCP?

500

DAILY DOUBLE ***LOUD NOISES DO YOUR BEST ON YOUR OWN***

This kind of system is built in to devices, mostly medical and industrial, and can present security difficulties due to it being hard to update or patch these devices


What is an Embedded System?