click below
click below
Normal Size Small Size show me how
Chapter 8
Chapter 8 Terms
Term | Definition |
---|---|
access log | A log that can provide details regarding requests for specific files on a system. |
audit log | A log that is used to record which user performed an action and what that action was. |
cloud computing | A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled. |
cloud storage | A cloud system that has no computational capabilities but provides remote file storage. |
community cloud | A cloud that is open only to specific organizations that have common concerns. |
disabling unused interfaces | A security technique to turn off ports on a network device that are not required. |
event log | Log that documents any unsuccessful events and the most significant successful events. |
Fibre Channel | A high-speed storage network protocol that can transmit up to 16 gigabits per second. |
Fibre Channel over Ethernet | A high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks. |
File Transfer Protocol (FTP) | An unsecure TCP/IP protocol that is commonly used for transferring files. |
flood guard | A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack. |
FTP Secure | A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session. |
host availability | The ability to quickly make new virtual serer machines available. |
host elasticity | The ability to easily expand or contract resources in a virtualized environment. |
hybrid cloud | A combination of public and private clouds. |
IEEE 802.1x | A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails. |
Infrastructure as a Service (laaS) | A cloud computing model in which customers have the highest level of control and can deploy and run their own software. |
Internet Control Message Protocol (ICMP) | A TCP/IP protocol that is used by devices to communicate updates or error information to other devices. |
Internet Protocol version 6 | The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements. |
IP telephony | Using a data-based IP network to add digital voice clients and new voice applications onto the IP network. |
iSCSI(Internet Small Computer System Interface) | An IP-based storage networking standard for linking data storage facilities. |
log | A record of events that occur. |
loop protection | Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA). |
MAC limiting and filtering | A security technique to limit the number of media access control (MAC) addresses allowed on a single port. |
NetBIOS (Network Basic Input/Output System) | An older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN. |
patch compatiblity | The impact of a patch on other software or even hardware. |
Platform as a Service (PaaS) | A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. |
private cloud | A cloud that is created and maintained on a private network. |
public cloud | A cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet. |
rule-based management | The process of administration that relies on following procedural and technical rules. |
sandboxing | Using a virtual machine to run a suspicious program to determine if it is malware. |
Secure Copy Protocol (SCP) | A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands. |
Secure FTP (SFTP) | A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands. |
security control testing | Testing the existing security configuration. |
security log | Log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful. |
Simple Network Management Protocol (SNMP) | A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network. |
snapshot | An instance of a particular state of a virtual machine that can be saved for later use. |
Software as a Service (SaaS) | A model of cloud computing in which the vendor provides access to the vendor's software applications running on a cloud infrastructure. |
storage area network (SAN) | A dedicated network storage facility that provides access to data storage over a high-speed network. |
Telnet | An older TCP/IP protocol and an application used for text-based communication. |
Transmission Control Protocol/Internet Protocol (TCP/IP) | The most common protocol suite used today for local area networks (LAN) and the Internet. |
Trivial File Transfer Protocol (TFTP) | A light version of FTP that uses small amount of memory and has limited functionality. |
virtualization | A means of managing and presenting computer resources by function without regard to their physical layout or location. |