Term
|
Definition
A log that can provide details regarding requests for specific files on a system. |
|
|
Term
|
Definition
A log that is used to record which user performed an action and what that action was. |
|
|
Term
|
Definition
A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled. |
|
|
Term
|
Definition
A cloud system that has no computational capabilities but provides remote file storage. |
|
|
Term
|
Definition
A cloud that is open only to specific organizations that have common concerns. |
|
|
Term
disabling unused interfaces |
|
Definition
A security technique to turn off ports on a network device that are not required. |
|
|
Term
|
Definition
Log that documents any unsuccessful events and the most significant successful events. |
|
|
Term
|
Definition
A high-speed storage network protocol that can transmit up to 16 gigabits per second. |
|
|
Term
Fibre Channel over Ethernet (FCoE) |
|
Definition
A high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks. |
|
|
Term
File Transfer Protocol (FTP) |
|
Definition
An unsecure TCP/IP protocol that is commonly used for transferring files. |
|
|
Term
|
Definition
A feature that controls a device |
|
|
Term
|
Definition
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session. |
|
|
Term
|
Definition
The ability to quickly make new virtual server machines available. |
|
|
Term
|
Definition
The ability to easily expand or contract resources in a virtualized environment. |
|
|
Term
|
Definition
A type of virtualization in which an entire operating system environment is simulated. |
|
|
Term
|
Definition
A combination of public and private clouds. |
|
|
Term
|
Definition
A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails. |
|
|
Term
Infrastructure as a Service (IaaS) |
|
Definition
A cloud computing model in which customers have the highest level of control and can deploy and run their own software. |
|
|
Term
Internet Control Message Protocol (ICMP) |
|
Definition
A TCP/IP protocol that is used by devices to communicate updates or error information to other devices. |
|
|
Term
Internet Protocol version 6 (IPv6) |
|
Definition
The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements. |
|
|
Term
|
Definition
Using a data-based IP network to add digital voice clients and new voice applications onto the IP network. |
|
|
Term
iSCSI (Internet Small Computer System Interface) |
|
Definition
An IP-based storage networking standard for linking data storage facilities. |
|
|
Term
|
Definition
A record of events that occur. |
|
|
Term
|
Definition
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA). |
|
|
Term
MAC limiting and filtering |
|
Definition
A security technique to limit the number of media access control (MAC) addresses allowed on a single port. |
|
|
Term
NetBIOS (Network Basic Input/Output System) |
|
Definition
An older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN. |
|
|
Term
|
Definition
The impact of a patch on other software or even hardware. |
|
|
Term
Platform as a Service (PaaS) |
|
Definition
A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. |
|
|
Term
|
Definition
A cloud that is created and maintained on a private network. |
|
|
Term
|
Definition
A cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet. |
|
|
Term
|
Definition
The process of administration that relies on following procedural and technical rules. |
|
|
Term
|
Definition
Using a virtual machine to run a suspicious program to determine if it is malware. |
|
|
Term
Secure Copy Protocol (SCP) |
|
Definition
A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands. |
|
|
Term
|
Definition
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands. |
|
|
Term
|
Definition
Testing the existing security configuration. |
|
|
Term
|
Definition
Log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful. |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network. |
|
|
Term
|
Definition
An instance of a particular state of a virtual machine that can be saved for later use. |
|
|
Term
Software as a Service (SaaS) |
|
Definition
A model of cloud computing in which the vendor provides access to the vendor |
|
|
Term
storage area network (SAN) |
|
Definition
A dedicated network storage facility that provides access to data storage over a high-speed network. |
|
|
Term
|
Definition
An older TCP/IP protocol and an application used for text-based communication. |
|
|
Term
Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
The most common protocol suite used today for local area networks (LANs) and the Internet. |
|
|
Term
Trivial File Transfer Protocol (TFTP) |
|
Definition
A light version of FTP that uses a small amount of memory and has limited functionality. |
|
|
Term
|
Definition
A means of managing and presenting computer resources by function without regard to their physical layout or location. |
|
|