Security Ch. 8 Terms Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Term | Definition |
Access log | A log that can provide details regarding requests for specific files on a system. |
Audit log | A log that is used to record which user performed an action and what that action was. |
Cloud computing | A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled. |
Cloud storage | A cloud system that has no computational capabilities but provides remote file storage. |
Community cloud | A cloud that is open only to specific organizations that have common concerns. |
Disabling unused interfaces | A security technique to turn off ports on a network device that are not required. |
Event log | Log that documents any unsuccessful events and the most significant successful events. |
Fibre Channel |
Created by:
BWallace9311
Popular Science sets