asdasd
Application virtualization
deceives an app into believing it is interfacing with an OS when it isn't...virtualization layer between app and OS...run on central server
Protocols
define the standards for communication between nodes on the network
Secure Socket Layer (SSL)
provides security to the data that is transferred between the web browser your users are operating and the server it is connecting to for its requested information
Session Management
refers to the process of securely handling multiple requests to a web-based application or service from a single user or entity
Schema
schema of a database is its structure described in a formal language supported by the Database Management System (DBMS).
Cloud computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Client virtualization
virtualization technology used to separate desktop computer environment from the physical device used to access it.
Service
A software functionality or a set of software functionalities with a purpose that different clients can reuse for different purposes, together with the policies that should control its usage.
Guest OS
An operating system running within a virtual machine.
Base level Comm Focal Point (CFP)
personnel will remediate assets owned and operated by the host base personnel.
Incident Reporting
CFP, NOSCs, and AFNOSC record suspicious and unauthorized network and information systems access and activity.
CSS
Cascading Style Sheets; Used for describing the presentation of a document written in a markup language such as HTML.
JavaScript
Client scripting language that is used for creating web pages. Standalone language originally developed by Netscape (and not associated with Java). Special Effects.
Port
Communication endpoint
Python
Considered one of the easiest languages to use and work with
Relational Database
Consists of numerous tables containing rows and columns of data
Flat Files
Database consisting of only one large table
SaaS
End user
Event Logs
Event logs consist of a header, a description of the event (based on the event type), and other optional data.
XML
Extensible Markup Language, Software and hardware independent tool used to transport and store data.
Virtual desktop infrastructure
Hosting of desktop environments on a central server
HTML
Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
PaaS
Information Tech Devlopers
IaaS
Information Tech Managers
NoSQL (Non-Relational)
Mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.
Server Virtualization
Most common type of virtualization Partitioning of a physical server into smaller virtual servers
Java
One of the most popular programming languages. Used to develop website content, games, applications, and software.
Hypervisor
Software that enables a single computer to run multiple operating systems simultaneously.
Application Log
The Application log records events logged by programs, ex a database program might record a file error in the Application log
Event Viewer
The Event Viewer enables administrators to monitor events that occur on a system. The Event Log service starts automatically when a computer is started. All users can view Application and System logs.
Security Log
The Security log records security events, such as valid and invalid logon attempts, and events related to resource use, such as creating, opening, or deleting files/objects.
System Log
The System log records events logged by the system components, ex failure of a driver or other system component to load during startup is recorded in the System log
Event Descriptions
The description indicates what happened or the significance of the event
Mandatory Deployments
These will target all machines that require the update, are not a part of an exemption, and are not designated a PMO/Medical.
Available Deployments
These will target all systems, unless otherwise stated by the tasking authority
Presentation virtualization
Using this virtualization, a remote application running on a server is controlled by a local computer.
Host Server
any computer that provides services and connections to other computers on a network