A server that acts on behalf of other servers, receiving and forwarding client requests
to those servers.
Give this one a try later!
Reverse Proxy
SDLC Phase where activities such as initial pen testing and vulnerability scanning
against the application are performed. Will use both dynamic and static testing or
DSAT (Dynamic Application Security Testing) or SAST (Static Application Security
Testing).
Give this one a try later!
Testing
,A system authenticating users and providing access tokens for seamless access across
services.
Give this one a try later!
Identity Provider (IdP)
Acknowledging and living with the risk without active intervention.
Give this one a try later!
Acceptance
qualitative data; natural-language text; incorporate media (audio, video, images);
contains JSON, XML, binary objects (images encoded as text strings); important for
data analytic strategies; noSQL
Give this one a try later!
Unstructured data
allow banks to merge with insurance companies and financial institutions; customer
account information is kept secure and private; customers may opt out of any
information-sharing arrangements from bank/insurer
Give this one a try later!
, GLBA (Gramm-Leach-Bliley Act)
Streams applications to the users desktop.
Give this one a try later!
Application Virtualization
when data owner creates, categorizes, and classifies the data
Give this one a try later!
Data Labeling
Standard for the establishment, implementation, control, and improvement of the
Information Security Management System (ISMS)
Give this one a try later!
ISO/IEC 27001
A system that caches commonly requested content in geographically distributed
servers to improve performance and reduce latency.
Give this one a try later!
, CDN (Content Delivery Network)
The process of combining multiple network interface cards (NICs) into a single logical
interface, known as a team or bond.
Give this one a try later!
NIC Teaming
The maximum acceptable data loss, indicating the point in time to which systems and
data must be recovered after a disruption to ensure business continuity.
Give this one a try later!
Recovery Point Objective (RPO)
Adding more resources (e.g. CPU, memory) to existing servers to meet increased
demand
Give this one a try later!
Vertical Scaling
A category of security training delivery that focuses on providing basic knowledge
and skills to employees or users at the beginning of their engagement with an
organization.
to those servers.
Give this one a try later!
Reverse Proxy
SDLC Phase where activities such as initial pen testing and vulnerability scanning
against the application are performed. Will use both dynamic and static testing or
DSAT (Dynamic Application Security Testing) or SAST (Static Application Security
Testing).
Give this one a try later!
Testing
,A system authenticating users and providing access tokens for seamless access across
services.
Give this one a try later!
Identity Provider (IdP)
Acknowledging and living with the risk without active intervention.
Give this one a try later!
Acceptance
qualitative data; natural-language text; incorporate media (audio, video, images);
contains JSON, XML, binary objects (images encoded as text strings); important for
data analytic strategies; noSQL
Give this one a try later!
Unstructured data
allow banks to merge with insurance companies and financial institutions; customer
account information is kept secure and private; customers may opt out of any
information-sharing arrangements from bank/insurer
Give this one a try later!
, GLBA (Gramm-Leach-Bliley Act)
Streams applications to the users desktop.
Give this one a try later!
Application Virtualization
when data owner creates, categorizes, and classifies the data
Give this one a try later!
Data Labeling
Standard for the establishment, implementation, control, and improvement of the
Information Security Management System (ISMS)
Give this one a try later!
ISO/IEC 27001
A system that caches commonly requested content in geographically distributed
servers to improve performance and reduce latency.
Give this one a try later!
, CDN (Content Delivery Network)
The process of combining multiple network interface cards (NICs) into a single logical
interface, known as a team or bond.
Give this one a try later!
NIC Teaming
The maximum acceptable data loss, indicating the point in time to which systems and
data must be recovered after a disruption to ensure business continuity.
Give this one a try later!
Recovery Point Objective (RPO)
Adding more resources (e.g. CPU, memory) to existing servers to meet increased
demand
Give this one a try later!
Vertical Scaling
A category of security training delivery that focuses on providing basic knowledge
and skills to employees or users at the beginning of their engagement with an
organization.