• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

SQL

relationship table based structuring scheme used in databases

NoSQL

based system uses hierarchical structuring rather than relationship

ACID

Atomicity, Consistency, Isolation, Durability

PED

Portable Electronic Device

FDE

Full Disk Encryption

RNG

Random Number Generators

BYOD
Bring Your Own Device

NTFS

Implement File level Security

EAL

Evaluation Assurance Level

HIDS

Host based Intrusion Detection System- monitors all or part of the dynamic behavior and the state of a computer system

DLP

Data Loss Prevention- ensuring that data does not get outside of your organization or in the hands of people who should not have access to that data

TPM

Trusted Platform Module- secure crypto processor used to authenticate hardware devices such as PC. INTERNAL

HSM

Hardware Security Module- high end cryptographic hardware

SCADA

Supervisory Control and Data Acquisition- a type of Industrial Control System (ICS)

ICS

Industrial Control System