click below
click below
Normal Size Small Size show me how
Security Ch. 8 Terms
Term | Definition |
---|---|
Access log | A log that can provide details regarding requests for specific files on a system. |
Audit log | A log that is used to record which user performed an action and what that action was. |
Cloud computing | A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled. |
Cloud storage | A cloud system that has no computational capabilities but provides remote file storage. |
Community cloud | A cloud that is open only to specific organizations that have common concerns. |
Disabling unused interfaces | A security technique to turn off ports on a network device that are not required. |
Event log | Log that documents any unsuccessful events and the most significant successful events. |
Fibre Channel |