Term
click below
click below
Term
Normal Size Small Size show me how
Chapter 8
Chapter 8 Terms
Term | Definition |
---|---|
Access Logs | A log that provides details for files that have been accessed. |
audit log | A log that records user actions |
cloud computing | A pay per use computing model in which customers pay only for the services they need, easily scaleable. |
cloud storage | Remote file storage. |
community cloud | a cloud open only to specific organizations that have common concerns. |
disabling unused interfaces | Turning off unused ports for security. |
event log | Documents unsuccessful events and most successful ones. |
Fibre Channel | A high speed storage network that can transmit up to 16Gb/s |
Fibre Channel over ethernet | Encapsulates Fibre Channel packets for ethernet transport. |
FTP | Unsecure TCP/IP protocol used for file transfers. |
flood guard | A feature that controls a device's tolerance for unanswered service requests and helps prevent DDoS attacks. |
FTP Secure | TCP/IP protocol that uses SSL or Transport Layer Security to encrypt commands sent over the control port (21) in an FTP session. |
host availability | The ability to make new virtual server machines available. |
host elasticity | The ability to easily expand or contract resources in a virtualized environment. |
host virtualization | A type of virtualization in which an entire operating system environment is simulated. |
hybrid cloud | A combination of public and private clouds. |
IEEE 802.1x | A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails. |
Infrastructure as a Service | A cloud computing model in which customers have the highest level of control and can deploy their own software. |
ICMP (Internet Control Message Protocol) | A TCP/IP protocol used to transmit updates or error information to other devices. |
IPv6 | the next generation of the IP Protocol that addresses limitations in IPv4 and provides significant improvements. |
IP Telephony | using a data based IP network to add digital voice clients and applications to an IP network. |
iSCSI | An IP based storage networking standard for linking data storage facilities. |
log | A record of events. |
loop protection | Technique to prevent broadcast storms by using IEEE 802.1d standard spanning tree algorithm (STA). |
MAC limiting and filtering | Limits the number of MAC addresses allowed on a single port. |
NETBIOS | Network Basic Input/Output System. An older Windows transport protocol for allowing applications on seperate computers to communicate on a LAN. |
Patch compatibility | the impact of a patch on both software and hardware. |
Platform as a Service (PaaS) | A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. |
private cloud | A cloud that is created and maintained on a private network. |
public cloud | A cloud in which the services and infrastructure are offered to all users with access provided remotely over the internet. |
rule-based management | the process of administration that relies on following procedural and technical rules. |
sandboxing | Using a virtual machine to run software which is suspected of being malware. |
Secure Copy Protocol (SCP) | A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting and compressing files and commands. |
Secure FTP | Secure TCP/IP protocol for transporting data and commands via compression and encryption |
security control testing | Testing the existing security configuration. |
Security Log | Log that can reveal the types of attacks that are being directed at the network and if any attacks are successful. |
Simple Network Management Protocol (SNMP) | A TCP/IP protocol that exchanges management information between networked devices. Allows net admins to remotely monitor, manage, and configure devices on the network. |
snapshot | An instance of a particular state of a virtual machine that can be saved for later use. |
Software as a Service | A model of cloud computing in which a vendor provides access to their software which is running on cloud infrastructure. |
storage area network | Dedicated network storage facility that provides data storage over a high speed network. |
Telnet | An older TCP/IP protocol and an application used for text based communications. |