Term
|
Definition
| A log that can provide details regarding requests for specific files on a system. |
|
|
Term
|
Definition
| A log that is used to record which user performed an action and what that action was. |
|
|
Term
|
Definition
| A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled. |
|
|
Term
|
Definition
| A cloud system that has no computational capabilities but provides remote file storage. |
|
|
Term
|
Definition
| A cloud that is open only to specific organizations that have common concerns. |
|
|
Term
| disabling unused interfaces |
|
Definition
| A security technique to turn off ports on a network device that are not required. |
|
|
Term
|
Definition
| Log that documents any unsuccessful events and the most significant successful events. |
|
|
Term
|
Definition
| A high-speed storage network protocol that can transmit up to 16 gigabits per second. |
|
|
Term
| Fibre Channel over Ethernet (FCoE) |
|
Definition
| A high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks. |
|
|
Term
| File Transfer Protocol (FTP) |
|
Definition
| An unsecure TCP/IP protocol that is commonly used for transferring files. |
|
|
Term
|
Definition
| A feature that controls a device |
|
|
Term
|
Definition
| A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session. |
|
|
Term
|
Definition
| The ability to quickly make new virtual server machines available. |
|
|
Term
|
Definition
| The ability to easily expand or contract resources in a virtualized environment. |
|
|
Term
|
Definition
| A type of virtualization in which an entire operating system environment is simulated. |
|
|
Term
|
Definition
| A combination of public and private clouds. |
|
|
Term
|
Definition
| A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails. |
|
|
Term
| Infrastructure as a Service (IaaS) |
|
Definition
| A cloud computing model in which customers have the highest level of control and can deploy and run their own software. |
|
|
Term
| Internet Control Message Protocol (ICMP) |
|
Definition
| A TCP/IP protocol that is used by devices to communicate updates or error information to other devices. |
|
|
Term
| Internet Protocol version 6 (IPv6) |
|
Definition
| The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements. |
|
|
Term
|
Definition
| Using a data-based IP network to add digital voice clients and new voice applications onto the IP network. |
|
|
Term
| iSCSI (Internet Small Computer System Interface) |
|
Definition
| An IP-based storage networking standard for linking data storage facilities. |
|
|
Term
|
Definition
| A record of events that occur. |
|
|
Term
|
Definition
| Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA). |
|
|
Term
| MAC limiting and filtering |
|
Definition
| A security technique to limit the number of media access control (MAC) addresses allowed on a single port. |
|
|
Term
| NetBIOS (Network Basic Input/Output System) |
|
Definition
| An older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN. |
|
|
Term
|
Definition
| The impact of a patch on other software or even hardware. |
|
|
Term
| Platform as a Service (PaaS) |
|
Definition
| A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. |
|
|
Term
|
Definition
| A cloud that is created and maintained on a private network. |
|
|
Term
|
Definition
| A cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet. |
|
|
Term
|
Definition
| The process of administration that relies on following procedural and technical rules. |
|
|
Term
|
Definition
| Using a virtual machine to run a suspicious program to determine if it is malware. |
|
|
Term
| Secure Copy Protocol (SCP) |
|
Definition
| A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands. |
|
|
Term
|
Definition
| A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands. |
|
|
Term
|
Definition
| Testing the existing security configuration. |
|
|
Term
|
Definition
| Log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful. |
|
|
Term
| Simple Network Management Protocol (SNMP) |
|
Definition
| A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network. |
|
|
Term
|
Definition
| An instance of a particular state of a virtual machine that can be saved for later use. |
|
|
Term
| Software as a Service (SaaS) |
|
Definition
| A model of cloud computing in which the vendor provides access to the vendor |
|
|
Term
| storage area network (SAN) |
|
Definition
| A dedicated network storage facility that provides access to data storage over a high-speed network. |
|
|
Term
|
Definition
| An older TCP/IP protocol and an application used for text-based communication. |
|
|
Term
| Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
| The most common protocol suite used today for local area networks (LANs) and the Internet. |
|
|
Term
| Trivial File Transfer Protocol (TFTP) |
|
Definition
| A light version of FTP that uses a small amount of memory and has limited functionality. |
|
|
Term
|
Definition
| A means of managing and presenting computer resources by function without regard to their physical layout or location. |
|
|