Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
SQL |
relationship table based structuring scheme used in databases |
|
NoSQL |
based system uses hierarchical structuring rather than relationship |
|
ACID |
Atomicity, Consistency, Isolation, Durability |
|
PED |
Portable Electronic Device |
|
FDE |
Full Disk Encryption |
|
RNG |
Random Number Generators |
|
BYOD
|
Bring Your Own Device
|
|
NTFS |
Implement File level Security |
|
EAL |
Evaluation Assurance Level |
|
HIDS |
Host based Intrusion Detection System- monitors all or part of the dynamic behavior and the state of a computer system |
|
DLP |
Data Loss Prevention- ensuring that data does not get outside of your organization or in the hands of people who should not have access to that data |
|
TPM |
Trusted Platform Module- secure crypto processor used to authenticate hardware devices such as PC. INTERNAL |
|
HSM |
Hardware Security Module- high end cryptographic hardware |
|
SCADA |
Supervisory Control and Data Acquisition- a type of Industrial Control System (ICS) |
|
ICS |
Industrial Control System |