Glossary- V Flashcards Preview

CISA > Glossary- V > Flashcards

Flashcards in Glossary- V Deck (17):
1

V.35

A standard protocol for sending serial data between computers.

2

variable sampling

A sampling technique used to study the characteristics of a popu- lation to determine the numeric total of a specific attribute from the entire population. See also sampling.

3

vendor standard

A standard that specifies which suppliers and vendors are used for various types of products and services.

4

version control

The techniques and tools used to manage different versions of source code files.

5

video surveillance

The use of video cameras, monitors, and recording systems to re- cord the movement of persons in or near sensitive areas.

6

virtual circuit

A logical communications channel between two endpoints on a packet- switched network.

7

virtual machine

A software implementation of a computer, usually an operating sys- tem or other program running within a hypervisor. See also hypervisor.

8

virtual network (VLAN)

A logical network that may share a physical medium with one or more other virtual networks.

9

virtual private network (VPN)

Any network encapsulation protocol that utilizes au- thentication and encryption; used primarily for protecting remote access traffic and for protecting traffic between two networks. See also tunneling, encapsulation.

10

virtual server

An active instantiation of a server operating system, running on a sys- tem that is designed to house two or more such virtual servers. Each virtual server is logically partitioned from every other so that each runs as though it were on its own physically separate machine.

11

virus

A type of malware where fragments of code attach themselves to executable programs and are activated when the program they are attached to is run.

12

visual notice

A sign or symbol that is used to inform personnel of security controls and/or to warn unauthorized persons.

13

Voice over IP (VoIP)

Several technologies that permit telephony that is transported over IP networks.

14

VoIP client

A computer program designed to communicate using the Voice over IP (VoIP) protocol. See also Voice over IP (VoIP).

15

VoIP handset

A digital telephone designed to communicate using the Voice over IP (VoIP) protocol. See also Voice over IP (VoIP).

16

vulnerability

A weakness that may be present in a system that makes the probability of one or more threats more likely.

17

vulnerability management

A formal business process that is used to identify and mitigate vulnerabilities in an IT environment.