Flashcards in Glossary- V Deck (17):
A standard protocol for sending serial data between computers.
A sampling technique used to study the characteristics of a popu- lation to determine the numeric total of a specific attribute from the entire population. See also sampling.
A standard that specifies which suppliers and vendors are used for various types of products and services.
The techniques and tools used to manage different versions of source code files.
The use of video cameras, monitors, and recording systems to re- cord the movement of persons in or near sensitive areas.
A logical communications channel between two endpoints on a packet- switched network.
A software implementation of a computer, usually an operating sys- tem or other program running within a hypervisor. See also hypervisor.
virtual network (VLAN)
A logical network that may share a physical medium with one or more other virtual networks.
virtual private network (VPN)
Any network encapsulation protocol that utilizes au- thentication and encryption; used primarily for protecting remote access traffic and for protecting traffic between two networks. See also tunneling, encapsulation.
An active instantiation of a server operating system, running on a sys- tem that is designed to house two or more such virtual servers. Each virtual server is logically partitioned from every other so that each runs as though it were on its own physically separate machine.
A type of malware where fragments of code attach themselves to executable programs and are activated when the program they are attached to is run.
A sign or symbol that is used to inform personnel of security controls and/or to warn unauthorized persons.
Voice over IP (VoIP)
Several technologies that permit telephony that is transported over IP networks.
A computer program designed to communicate using the Voice over IP (VoIP) protocol. See also Voice over IP (VoIP).
A digital telephone designed to communicate using the Voice over IP (VoIP) protocol. See also Voice over IP (VoIP).
A weakness that may be present in a system that makes the probability of one or more threats more likely.