Study

Unit 14 - Software development - Vocabulary Revi ...

  •   0%
  •  0     0     0

  • A type of cyber-attack aimed at making a service unavailable by overwhelming it with excessive requests, preventing legitimate users from accessing it.
    Denial of Service Attack
  • Web Server Operating Systems
    The operating systems specifically designed to run web servers, such as Linux, Windows Server, or UNIX, providing the necessary environment for web hosting.
  • A telecommunications standard used to provide high-speed internet access over cable television systems.
    Data Over Cable Service Interface Specification (DOCSIS)
  • File and Print Server
    A server that handles sending, receiving, and storing email messages for users within a network or the internet.
  • Shared Network Resources Protection
    The process of securing network resources (such as files, printers, or databases) from unauthorized access or misuse on a shared network.
  • The set of features and actions that a firewall performs, including filtering traffic, monitoring network activity, and blocking unauthorized access
    Firewall Functionality
  • The specific needs and measures that must be taken to protect systems, data, and networks from unauthorized access or threats
    Security Requirements
  • The use of software or strategies to detect, prevent, and remove malware (malicious software) like viruses, worms, and trojans.
    Malware Protection
  • A cryptographic protocol used to secure communications over a computer network, often seen as the successor to SSL for encrypting data transfers.
    Transport Layer Security (TLS)
  • A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
    Virus
  • Web-Server Operating Systems
    The systems that provide the platform for web servers to run on, often optimized for hosting websites and handling web traffic.
  • Firewall
    A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to protect systems from unauthorized ac
  • A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.
    Application Server
  • Desktop Computer Security
    Measures taken to protect desktop computers from threats such as unauthorized access, malware, and data loss.
  • Web Server
    A server that delivers web pages to users' browsers using the HTTP or HTTPS protocol, enabling access to websites.
  • Proxy or Cache Server
    A server that acts as an intermediary between a client and other servers, caching data to improve performance and providing security by filtering requests.
  • Virus
    A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
  • The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
    Server Security
  • A set of rules and guidelines that define how an organization manages, protects, and handles sensitive information and resources.
    Security Policy
  • Hypertext Transfer Protocol (HTTP)
    The protocol used for transmitting web pages over the internet, allowing clients (browsers) to request and receive web content from servers.
  • A protocol for securing credit card transactions over the internet, ensuring confidentiality, integrity, and authentication.
    Secure Electronic Transactions (SET)
  • IEEE 802.11 Protocol
    A set of standards used for implementing wireless local area networks (WLANs), including security features for protecting wireless communications.
  • Malware
    Software specifically designed to cause harm or gain unauthorized access to computer systems, including viruses, worms, and trojans
  • Servers
    Specialized computers or systems that provide services (such as web hosting, email, file sharing) to other computers or devices in a network.
  • Secure Multipurpose Internet Mail Extensions (S/MIME)
    A standard for encrypting and signing email messages to provide confidentiality, authentication, and integrity.
  • Measures taken to protect email communications from threats such as phishing, malware, and unauthorized access.
    Email Security
  • A server that handles sending, receiving, and storing email messages for users within a network or the internet.
    E-mail Server
  • Measures to ensure the security of data transmitted over the internet, including protecting Internet Protocol (IP) addresses and ensuring secure connections.
    Internet Protocol Security
  • A protocol used to establish secure encrypted connections between web browsers and servers, ensuring the privacy and integrity of data transferred.
    Secure Socket Layer
  • A server that provides firewall functions, controlling incoming and outgoing network traffic to protect systems from unauthorized access or attacks.
    Firewall Server
  • Virus Protection
    The use of tools and techniques to detect and eliminate viruses from a system, ensuring the integrity and security of data and applications.
  • Password Protection
    Methods and technologies used to secure passwords from unauthorized access, including encryption and strong password policies
  • Ensuring that communication protocols (used to transfer data between systems) are secure and cannot be exploited by malicious users.
    Protocol Security
  • User Account Permissions
    The rights or privileges assigned to user accounts, determining what actions users can perform within a system or network, such as read, write, or execute.
  • Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption
    Password Obscurity