Sie sind auf Seite 1von 6

Search

Create

47 terms
marudahPLUS

Securing commonly used architecture


STUDY

client/server architecture
Click card to see definition 👆
A network design in which client computers use a centrally
administered server to share data, data storage space, and
devices.
Processing of data is also done at client side
Implies separation of duties and power

Click again to see term 👆


fat or thin client
thin client does majority of the processing in
server.
Nice work!
You just studied 47 terms!

Start over
1/47

Terms in this set (47)


Your stats

Often Missed
Your recent answers have been mostly wrong!
Select this one
-1
Server Side threats
code injection-validate input, aggregate and inference-masking and polyinstatiation

Never Missed
You’ve gotten all of these right!
Select these 44
+1
client/server architecture
A network design in which client computers use a centrally administered server to share data,
data storage space, and devices.
Processing of data is also done at client side
Implies separation of duties and power
+1
fat or thin client
thin client does majority of the processing in server.
+1
distributed computing
A form of computing where systems in different locations communicate and collaborate to
complete a task. Security is a important concern
+1
Peer to peer computing
a connection between any two or more systems for common interest such as file sharing, etc.
Channel security using IPSEC. Data confidentiality-encryption, security in call stack-validation
and authorization should not be circumvented using race condition or dead lock
+1
Service-oriented architecture (SOA) characteristics
Platform neutrality, interoperability, Modularity and reusability, abstracted business
functionality, contract based interfaces and discoverability.
Loosely coupled, abstraction, composable, reusable, autonomous, stateless and discoverable
+1
SOA are implemented using
com, corba, webservices
+1
SOA messaging is by ---------- and secured using
XML and secured using TLS/SSL
+1
Enterprise service bus(ESB)
monitor and control of routing of messaging between system
+1
ESB is configured to
perform protocol conversions and handle translation and transformation of communications
Handle defined events
Perform message queueing and mapping of data flows
+1
Web Services
communication between elements over the internet.
Machine readable format is called WSDL(xml based description language)
+1
REST Web services
manipulate xml representation of web resources using a uniforms set of stateless operations
+1
Rich Internet Application (RIA)
Webservice as transfer mechanism and client as processing device
+1
Client side exploits or threats can be avoided by
using input validation
+1
remote code execution (RCE)
when an attacker obtains control of a target computer through some sort of vulnerability,
gaining the power to execute commands on that remote computer
+1
Pervasive or Ubiquitous Computing
interconnecting the devices/mobile, sharing info between them
+1
To secure pervasive or ubiquitous
defense in depth, fail safe, complete mediation are used.
Each device should be self reliant, self sufficient for security, safety and stability
+1
wireless
can pass through others. need to be secured. When developing a system, security of data is
NOT provided by wireless network.
+1
Location-based data
Store locator or google maps. very valuable but sensitive also. How it can be abused should be
considered and protected
+1
Radio frequency Identification RFID
non contract means of transferring data between two parties. Using a transmitter/receiver and
tags.
When a reader sends signal, tag responds with digital number. Used in tracking passports only
in short distance
+1
remote wipe
A mobile device security feature that can delete all data and possibly even configuration
settings remotely when the device is stolen or lost
+1
Information disclosure can happen by
lost or stolen device, insecure data storage in local or cloud, insufficient data protection on data
transmission, broken cryptography.
+1
Near Field Communication (NFC)
Contactless wireless transmission of data over short distances. Security should be close
proximity.
Time and attendance, credit card payment, hotel key, secure PC logon, ticketing
+1
Sensor Networks
Facilitate new ways of interacting with the environment and with physical systems.
+1
Mobile apps
A software application developed specifically for use on small, wireless computing devices, such
as smartphones and tablets, rather than desktop or laptop computers. Significant quantity of
information is stored on the device
+1
Cloud Architecture
scalable services that are automatically provisioned in response to demand
+1
cloud computing architecture are
on-demand self service, broad network access, resource pooling, rapid elasticity and measured
service. resource utilization monitored and managed
+1
spaghetti code
unstructured go to statements. Hard to understand and difficult to maintain
+1
Advantage of 3 tier architecture
changes in one tier is independent of another. Encapsulates internal makeup -making contract
based interfaces between tiers
+1
IaaS (Infrastructure as a Service)
A method that provides network resources such as for storage and allow the client can deploy
software and add network components such as firewalls.
+1
PaaS (Platform as a Service)
A service model in which various platforms are provided virtually, enabling developers to build
and test applications within virtual, online environments tailored to the specific needs of a
project.
+1
SaaS (Software as a Service)
Services for delivering and providing access to software remotely as a web-based service
+1
Common Architecture are
Distributed computing, soa, ria, ubiqutous computing and cloud computing
+1
RIA threats
Client Side Threats, Server Side Threats,
+1
prevent code injection
validate input
+1
types of Ubiquitous computing are
Wireless networking, RFID, NFC, LBS
+1
Credential management exploits
MITM, unauthorized access and privilege escalation
+1
Credential management solutions
certificates and SSO
+1
traffic flow control
proxies, firewalls, middleware, logging, data loss prevention-extrafiltration of data,
virtualization
+1
Virtualization
Run Virtual server within physicai server. Isolation from applications,
+1
Reference Monitor
set of rules how a subject can acess object
+1
Security Kernel
The s/ware or h/ware that enforces the reference monitor
+1
TPM
Resides in motherboard with the key to unlock harddrive. So the user cannot used the hard
drive in another computer.
+1
Secure State Model
System starts securely, performs all of its function and shut down securely
+1
extrafiltration of data
unauthorized transfer of data from a computer.
NIST 800-145 cloud computing has 4 deployment models
private, public, community and hybrid
polyinstantiation
Multiple instances of information
Add or Remove Terms

YOU MIGHT ALSO LIKE...


Test Preparation TOEIC, SAT, TOEFL
Academic English. Use these se…
25 sets
giflingua
STUDY GUIDE
Unit 3160 terms
Cyanna-EducationTEACHER
Guide to Firewall and VPNs100 terms
JavaProgrammer
MIS 200 Module 4 - 6100 terms
ctansil1