Lesson 13: Implementing Secure Network Applications

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

VDE (Virtual Desktop Environment)

A VM that runs a desktop operating system.

VM (Virtual Machine)

A computer that exists in emulation on a physical computer, or host machine.

SECaaS (Security as as Service)

A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security.

IaaS (Infrastructure as a Service)

A computing method that uses the cloud to provide any or all infrastructure needs.

PaaS (Platform as a Service)

A computing method that uses the cloud to provide any platform type services.

SaaS (Software as a Service)

A computing method that uses the cloud to provide application services to users.

Cloud Computing

A method of computing that involves real-time communication over large distributed networks to provide the resources, software, data, and media needs of a user, business, or organization.

SSL (Secure Sockets Layer)

A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version on SSL

SAN (storage area network)

A network of storage devices used in large organizations. Smaller organizations use networked attached storage (NAS).

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet.

SFTP (Secure File Transfer Protocol)

A secure version of the File Transfer Protocol that uses a Secure Shell (SSH) tunnel as an encryption method to transfer, access, and manage files. TCP 22

TLS (Transport Layer Security)

A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP/IP connection.

SIP (Session Initiation Protocol)

A set of Application layer signaling and control protocols for multiservice, packet-based networks. SIP is used to make an initial connection between hosts for transferring multimedia data.

TFTP (Trivial File Transfer Protocol)

A simple version of FTP that uses UDP as the transport protocol, and does not require a logon to the remote host. UDP 69

VDI (Virtual Desktop Infrastructure)

A virtualization implementation that separates the personal computing environment form a user's physical computer.

S/MIME (Secure/Multipurpose Internet Mail Extensions)

An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications.

SSL/TLS accelerators

Appliances that handle the method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) to a hardware accelerator.

RTP (Real-time Transport Protocol)

Defines a standardized packet format for delivering audio and video over IP networks. 5004/5005

Java

Programming language used to create web server applications (J2EE) and client-side applications.

CASB (Cloud Access Security Broker)

Software that sits between cloud service users and cloud applications to monitor all activity and enforce security policies.

POP (Post Office Protocol)

TCP port 110 protocol that enables a client to access email messages stored in a mailbox on a remote server. The server usually deletes messages once the client has downloaded them.

IMAP (Internet Message Access Protocol)

TCP/IP application protocol providing a way for a client to access email messages stored in a mailbox on a remote server.

HTTP (Hypertext Transfer Protocol)

The protocol used for transmitting web pages over the Internet. TCP 80

SMTP (Simple Mail Transfer Protocol)

The protocol used to send mail between hosts on the Internet. TCP 25

VoIP (Voice over Internet Protocol)

protocol that transmits phone calls over the same data lines and networks that make up the Internet; also called Internet telephony


Ensembles d'études connexes

Chapter 59: Assessment and Management of Patients with Hearing and Balance Disorders

View Set

Chapter 2: Evaluating Nutrition Information

View Set

Chapter 8 DMV: Defensive Driving

View Set

Ch. 3: The Chromosome Theory of Inheritance

View Set

PREUP Review/ Med Surg 1 (Jersey College) Chapter 27 Management of Patients w/ Coronary Vascular Disease

View Set

FNU 220: chapter 17 (EXAM 4) *textbook

View Set

Chapter 2: Health History and Interview

View Set