click below
click below
Normal Size Small Size show me how
Chapter 8
Chapter 8 Terms
| Term | Definition |
|---|---|
| Access Logs | A log that provides details for files that have been accessed. |
| audit log | A log that records user actions |
| cloud computing | A pay per use computing model in which customers pay only for the services they need, easily scaleable. |
| cloud storage | Remote file storage. |
| community cloud | a cloud open only to specific organizations that have common concerns. |
| disabling unused interfaces | Turning off unused ports for security. |
| event log | Documents unsuccessful events and most successful ones. |
| Fibre Channel | A high speed storage network that can transmit up to 16Gb/s |
| Fibre Channel over ethernet | Encapsulates Fibre Channel packets for ethernet transport. |
| FTP | Unsecure TCP/IP protocol used for file transfers. |
| flood guard | A feature that controls a device's tolerance for unanswered service requests and helps prevent DDoS attacks. |
| FTP Secure | TCP/IP protocol that uses SSL or Transport Layer Security to encrypt commands sent over the control port (21) in an FTP session. |
| host availability | The ability to make new virtual server machines available. |
| host elasticity | The ability to easily expand or contract resources in a virtualized environment. |
| host virtualization | A type of virtualization in which an entire operating system environment is simulated. |
| hybrid cloud | A combination of public and private clouds. |
| IEEE 802.1x | A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails. |
| Infrastructure as a Service | A cloud computing model in which customers have the highest level of control and can deploy their own software. |
| ICMP (Internet Control Message Protocol) | A TCP/IP protocol used to transmit updates or error information to other devices. |
| IPv6 | the next generation of the IP Protocol that addresses limitations in IPv4 and provides significant improvements. |
| IP Telephony | using a data based IP network to add digital voice clients and applications to an IP network. |
| iSCSI | An IP based storage networking standard for linking data storage facilities. |
| log | A record of events. |
| loop protection | Technique to prevent broadcast storms by using IEEE 802.1d standard spanning tree algorithm (STA). |
| MAC limiting and filtering | Limits the number of MAC addresses allowed on a single port. |
| NETBIOS | Network Basic Input/Output System. An older Windows transport protocol for allowing applications on seperate computers to communicate on a LAN. |
| Patch compatibility | the impact of a patch on both software and hardware. |
| Platform as a Service (PaaS) | A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. |
| private cloud | A cloud that is created and maintained on a private network. |
| public cloud | A cloud in which the services and infrastructure are offered to all users with access provided remotely over the internet. |
| rule-based management | the process of administration that relies on following procedural and technical rules. |
| sandboxing | Using a virtual machine to run software which is suspected of being malware. |
| Secure Copy Protocol (SCP) | A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting and compressing files and commands. |
| Secure FTP | Secure TCP/IP protocol for transporting data and commands via compression and encryption |
| security control testing | Testing the existing security configuration. |
| Security Log | Log that can reveal the types of attacks that are being directed at the network and if any attacks are successful. |
| Simple Network Management Protocol (SNMP) | A TCP/IP protocol that exchanges management information between networked devices. Allows net admins to remotely monitor, manage, and configure devices on the network. |
| snapshot | An instance of a particular state of a virtual machine that can be saved for later use. |
| Software as a Service | A model of cloud computing in which a vendor provides access to their software which is running on cloud infrastructure. |
| storage area network | Dedicated network storage facility that provides data storage over a high speed network. |
| Telnet | An older TCP/IP protocol and an application used for text based communications. |