Domain 4 Flashcards
Application programming interface or API
A set of routines standards or protocols and tools for building software applications to access a web-based software application or web tool
Bit
The most essential representation of data parentheses 0 or 1 ( at layer 1 of the open systems interconnection or OSI model
Broadcast
Broadcast transmission is a one too many or one to everyone form of sending internet traffic
Byte
The byte is a unit of digital information that most commonly consists of 8 Bits
Cloud computing
A model for enabling ubiquitous convenient on demand network access to a shared pool of configurable computing resources
Community cloud
A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns
D encapsulation
The opposite process of ncapsulation in which bundles of data are unpacked or revealed
Denial of service
The prevention of authorized access to resources or the delaying of time critical operations
Domain name service or DNS
This Acronym can be applied to three interrelated elements a service, a physical server and a network protocol
Encapsulation
Enforcement of data hiding and code hiding during All Phases of software development and operational use
Encryption
The process and act of converting the message from its plain text to ciphertext sometimes it is also referred to as inciphering
File transfer protocol or FTP
The Internet Protocol and program used to transfer files between hosts
Fragment attack
In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together
Hardware
The physical parts of a computer and related devices
Hybrid cloud
A combination of public cloud storage and private cloud storage or some critical data resides in the Enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider
Infrastructure as a service or iaas
The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. Iaas is popular in the data center where software and servers are purchased as a fully outsourced service and usually build on usage and how much of the resource is used
Internet control message protocol or icmp
An IP network protocol standardized by the internet engineering task force or ietf through rfc792 to determine if a particular service or host is available
Internet Protocol or ipv4
Standard protocol for transmission of data from source to destinations in packet switched Communications networks and interconnected systems of such Networks
Man in the middle
An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them
Microsegmentation
Part of a zero trust strategy that breaks Lans into very small highly localized zones using firewalls or similar technologies. At the limit, this place is firewall at every connection point
Oversized packet attack
Purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly
Packet
Representation of data at layer 3 of the open systems interconnection or OSI model
Payload
The primary action of a malicious code attack
Payment card industry data security standard or pcidss
An information security standard administered by the payment card industry security standards Council that applies to Merchants and service providers who process credit or debit card transactions