(Security+) Security Architecture

Internet Protocol Security (IPSec) – Suite of protocols that secures IP communications by authentication and encrypting each IP packet of a communication session. Operates in two main modes: transport mode (encrypts the payload) and tunnel mode (encrypts the entire IP packet). Used key protocols include Authentication Header (AH), which provides data origin authentication and integrity, and Encapsulating Security Payload (ESP).
Internet Key Exchange (IKE) is used to establish a secure tunnel.

Weighted Least Connection – Load balancing by distributing traffic based on both the server weight and the count of current connections.

Data Sovereignty – Principle that data collected and stored within a specific country is subject to the laws of that country.

Cold Site – Site that usually offers power and bandwidth but lacks the necessary systems or complete equipment.

Warm Site – Site that possesses some or all of the infrastructure and systems required but do not have the data.

Hot Site – Fully functional environment equipped with all the necessary hardware, software, and data to run an organization.

Load Balancer – Offer many features such as distributing load, automatically removing failed nodes from the cluster, enhancing responsiveness, seamless addition or removal of systems from the pool to support scalability. Provides Availability, responsiveness, and scalability.

Tabletop Exercises – Exercises which are conducted without involving actual technical systems and instead take place in a simulated environment.

Tokenization – Tokens should possess the characteristic of being non-reversible, meaning they should not be easily converted back into their original form. Instead, accessing the original tokenization function or a mapping to the original data should be necessary. Often rely on one way hash functions.

Leave a Reply

Your email address will not be published. Required fields are marked *