Security/IT Flashcards

1
Q

SCIM

A

System for Cross-domain Identity Management (SCIM) is a standard for automating the exchange of user identity information between identity domains, or IT systems. For example, as a company hires and fires employees, they are added and removed from the company’s electronic employee directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAML

A

Security Assertion Markup Language (SAML, pronounced SAM-el[1]) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). SAML is also:

A set of XML-based protocol messages
A set of protocol message bindings
A set of profiles (utilizing all of the above)

The single most important use case that SAML addresses is web browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. The SAML Web Browser SSO profile was specified and standardized to promote interoperability.[2] (For comparison, the more recent OpenID Connect protocol[3] is an alternative approach to web browser SSO.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OCR

A

Optical Character Reading
Optical character recognition or optical character reader (OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast).[1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BOLO

A

Be on the Look Out - Watch list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RIOCH

A

Japanese company - what else?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API

A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SDK

A

SDK (Software Development Kit) - devkit
An SDK or devkit functions in much the same way, providing a set of tools, libraries, relevant documentation, code samples, processes, and or guides that allow developers to create software applications on a specific platform. If an API is a set of building blocks that allow for the creation of something, an SDK is a full-fledged workshop, facilitating creation far outside the scopes of what an API would allow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TLS

A

Transport Layer Security (TLS), and its now-deprecated predecessor,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL

A

Secure Sockets Layer (SSL),[1] are cryptographic protocols designed to provide communications security over a computer network.[2] Several versions of the protocols find widespread use in applications such as web browsing, email, instant messaging, and voice over IP (VoIP). Websites can use TLS to secure all communications between their servers and web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRUD

A

CRUD stands for Create, Read, Update, and Delete. But put more simply, in regards to its use in RESTful APIs, CRUD is the standardized use of HTTP Action Verbs. This means that if you want to create a new record you should be using “POST.” If you are trying to read a record, you should be using “GET.” To update a record utilizing “PUT” or “PATCH.” And to delete a record, using “DELETE.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PACs

A

Physical Access Control System (waltz/building)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Waltz BRB

A

Background Building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DDS (elevators)

A

Destination dispatch system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICT Systems

A

ICT(Information and Communication technology) security refers the enterprises all incidents like controls, procedures and growth level in an organization. In order to ensure integrity, confidentiality and availability of their data and overall information and technology systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NFC

A

Near Field Communication (NFC) is a radio-frequency technology that allows the transmission of data between an NFC tag and NFC-enabled device. NFC tags can basically do what QR codes are being used for and more because they use embedded chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tenant engagement app

A

clones of the wework app that create community apps for other buildings, co working or otherwise

17
Q

SSID

A

A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN). An SSID is sometimes referred to as a “network name.” This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area.

18
Q

WLAN

A

wireless local area network