WITH COMPLET SOLUTIONS RATED A++
AAA
Authentication, authorization, and accounting.
A group of technologies used in remote access systems. Authentication verifies a user's
identification. Authorization determines if a user should have access. Accounting tracks
a user's access with logs.
ACL
Access control list.
A list of rules used to grant access to a resource. In NTFS, a list of ACEs makes up the
access control list for a resource. In a firewall, an access control list identifies traffic that
is allowed or blocked based on IP addresses, networks, ports, and some protocols
(using the protocol ID).
BYOD
Bring your own device.
A policy allowing employees to connect personally owned devices, such as tablets and
smartphones, to a company network. Data security is often a concern with such policies
and organizations often use VLANs to isolate mobile devices.
, CAWFE
IACIS Certified Advanced Windows Forensic Examiner
CIRT
Computer Incident Response Team.
A group of experts that respond to security incidents. Also known as CERT, SIRT, or
IRT.
DNS
Domain Name System
The Internet's system for converting alphabetic names into numeric IP addresses.
DoS
Denial of Service
an attack meant to shut down a machine or network, making it inaccessible to its
intended users
DRP
Disaster Recovery Planning
is a function of operational security which entails planning for a disruptive event. The
goal of this activity is to reduce the risk of financial loss and to enhance a company's
ability to recover from a disruptive event promptly. It's enacted during a major and very