Term | Definition |
Access Log | A log that can provide details |
Audit Log | A log that is used to record which user performed an action and what that action was |
Cloud Computing | A pay per use computing model in which customers pay only for the online computing resources that they need and the resources can be easily scaled |
Cloud Storage | A cloud system that has no computational capabilities but provides remote file storage |
Community Cloud | A cloud that is open only to specific organizations that have common concerns |
Disabling Unused Interfaces | A security technique to turn off ports on a network device that are not required |
Event Log | Log that documents any unsuccessful events and the most significant successful events |
Fibre Channel | A high speed storage network protocol that can transmit up to 16 gigabits per second |
Fibre Channel over ethernet | A high speed storage network protocol that encapsulates fibre channel frames over ethernet networks |
File Transfer Protocol | An unsecure TCP/IP protocol that is commonly used for transferring files |
Flood Guard | A feature that controls a devices tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack |
FTP Secure | A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port in an FTP session |
Host Availability | The ability to quickly make new virtual server machines available |
Host Elasticity | The ability to easily expand or contract resources in a virtualized enviroment |
Host Virtualization | A type of virtualization in which an entire operating system environment is simulated |
Hybrid Cloud | A combination of public and private clouds |
IEEE 802.1X | A standard that authenticates users on a per switch port basis by permitting access to valid uses but effectively disabling the port if authentication fails |
Infrastructure as a Service | A cloud computing model in which customers have the highest level of control and can deploy and run their own software |
Internet Control Message Protocol | A TCP/IP protocol that is used by devices to communicate updates or error information to other devices |
Internet Protocol Version 6 | The next generation of the IP protocol that addresses weaknesses of IPv4 and provides signifigant improvements |
IP Telephony | Using a data bases IP network to add digital vioce clients and new voice applications onto the IP network |
ISCSI | An IP based storage networking standard for linking data storage facilities |
Log | A record of events that occur |
Loop Protection | Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning tree algorithm |
MAC Limiting and Filtering | A security technique to limit the number of media access control addresses allowed on a single port |
NetBIOS | An older transport protocol used by microsoft windows systems for allowing on a single port |
Patch Compatibility | The Impact of a patch on other software or even hardware |
Platform as a Service | A cloud service in which consumers can install and run their own specialized applications on the cloud computing network |
Private Cloud | A cloud that is created and maintained on a private network |
Public Cloud | A cloud in which the services and infrastructure are offered to all users with access provide remotely through the internet |
Rule Based Management | The process of administration that relies on following procedural and technical rules |
Sandboxing | Using a virtual machine to run a suspicious program to determine if it is malware |
Secure Copy Protocol | A TCP IP protocol used mainly UNIX and Linux devices that securely transports files by encrypting files and commands |
Secure FTP | A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands |
Security Control Testing | Testing the exsisting security configuration |
Security Log | Log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful |
Simple Network Management Protocol | A TCP/IP protocol that exchanges management information between networked devices. it allows network administrators to remotely monitor manage and configure devices on the network |
Snapshot | An instance of a particular state of a virtual machine that can be saved for later use |
Software as a Service | A model of cloud computing in which the vendor provides access to the vendors software applications running on a cloud infrastructure |
Storage Area Network | A dedicated network storage facility that provides access to data storage over a high speed network |
Telnet | An older TCP/IP protocol and an application used for text-based communication |
Transmission Control Protocol | The Most Common Protocol suite used today for local are networks and the internet |
Trivial File Transfer Protocol | A light version of FTP that used a small amount of memory and has limited functionality |
Virtualization | A means of managing and presenting computer resources by function without regard to their physical layout or location |