Term
|
Definition
| A family of specifications for wireless LAN communication. |
|
|
Term
|
Definition
| A fast, secure, but relatively expensive protocol for wireless communication. supports speeds up to 54Mbps un the 5 GHz frequency at 60'. |
|
|
Term
|
Definition
| 2GBps 5GHz and uses Beamforming to transmit. |
|
|
Term
|
Definition
| Wi-Fi for short, most commonly used. 11 Mbps 2.4 Ghz range up to 1000'. |
|
|
Term
|
Definition
| compatible with 802.11b 54Mbps 2.4GHz 150' range. |
|
|
Term
|
Definition
| 600Mbps at either 2.4GHz or 5GHz 150' indoors and 300' outdoors. |
|
|
Term
|
Definition
| Mobile technology that can determine the orientation of a device with a sensor that measure the acceleration of the device direction. |
|
|
Term
|
Definition
| An indicator on a network adapter that flickers when packets are recieived or sent. |
|
|
Term
|
Definition
| A method for wireless devices to communicate directly with each other without the use of an AP. |
|
|
Term
|
Definition
| A hidden share created by default on every Windows system. If admin shares are deleted, by default, the system recreated them when it restarts. |
|
|
Term
|
Definition
| Unwanted software loaded onto a system for the putposes of presenting commercial advertisements to the user. |
|
|
Term
|
Definition
| A color scheme available in Windows Vista and 7. |
|
|
Term
|
Definition
| In encryption, the rule, system, or mechanism used to encrypt data. |
|
|
Term
|
Definition
| The transfer of information in the form of a continuous wave. |
|
|
Term
|
Definition
| An operating system for mobile devices. |
|
|
Term
|
Definition
| Software that is specifically designed to protect systems against spyware attacks. |
|
|
Term
|
Definition
| An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with viruses. |
|
|
Term
|
Definition
| A file name or directory name that indicates the files on which a command will operate. |
|
|
Term
|
Definition
| A characteristic of display devices that indicates the ration of width to height. |
|
|
Term
|
Definition
| A technique that is used to exploit a vulnerability in any application on a device without the authorization to do so. |
|
|
Term
|
Definition
| A server or server role that deremines whether or not access credentials suppied by a user should enable them access to resources. |
|
|
Term
|
Definition
| An application that generates single-use security tokens that are used as part of a two-step verification and multifactor authentication. |
|
|
Term
|
Definition
| Negotiates a speed that is compatible with the network router or switch. |
|
|
Term
|
Definition
| The typical form of illumination used in a full-sized LCD display. |
|
|
Term
|
Definition
| Also called a security card, and id card or token that can be used to swipe through an id system or can be used as a proximity card. |
|
|
Term
|
Definition
| A transmission scheme where a single signal sends data using the entire bandwidth of a the transmission media. |
|
|
Term
|
Definition
| Baseband real time operating system. (Radio Firmware) Signals are sent via RF waves in the 10KHz-1GHz range to wireless antennas. |
|
|
Term
|
Definition
| A subset of a security profile, and a document that outlines the minimum level of security required for a system, device, network, or premises. |
|
|
Term
|
Definition
| A feature of 802.11ac that transmits radio signals directly at a specific device using smart antennas. |
|
|
Term
|
Definition
| An automated method of recognizing a person based on a physiological or behavioral characteristic unique to the individual. Retina, fingerprint, or voice. |
|
|
Term
|
Definition
| Special memory that keeps track of its data even when the power is turned off, and is stored in the EEPROMS. |
|
|
Term
|
Definition
| A security feature in Windows 7 and Server 2008 that provides full disk encryption protection for your operating system as well as all the data stored on the operating system volume. |
|
|
Term
|
Definition
| A Windows security feature that encrypts removable storage deveces such as USB flash frives or portable hard drives. |
|
|
Term
|
Definition
| A complete loss of electrical power. |
|
|
Term
|
Definition
| A wireless radio technology that facilitates short-range (usually less that 30') wireless communication between devices such as PCs, Laptops, mobile phones, wireless headsets, and gaming consoles, thus creating a wireless PAN. |
|
|
Term
|
Definition
| Bayonet Neill-Concelman. A twist lock connector that is used with coaxial cables to carry radio frequencies to and from devices. |
|
|
Term
|
Definition
| An OS X app that enables users to install Microsoft Windows and then switch between OS X and the Windows operating system. |
|
|
Term
|
Definition
| A series of sequential steps that occur when you start a computer. |
|
|
Term
|
Definition
| A command line tool used via the Command Prompt in the Windows Recovery Enviroment (Win7 and Vista) to troubleshoot or repair startup issues. |
|
|
Term
|
Definition
| A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks. |
|
|
Term
|
Definition
| A software-based network device that has the same functionality as a switch. |
|
|
Term
|
Definition
| The amount of light emitted from a display device, as measured in lumens. |
|
|
Term
|
Definition
| A category of network transmission technologies that provide high throughput by splitting communications pathways into multiple channels transmitted simultaniously over the nerwork media. |
|
|
Term
|
Definition
| A temporary power reduction that is used by electrical power comanies to deal with high power demands. |
|
|
Term
|
Definition
| An attack that uses password-cracking software to attempt every possible alphanumeric password combination. |
|
|
Term
|
Definition
| In a computer system, a group of wires that connect component. They provide a pathway for data transfer. |
|
|
Term
|
Definition
| Transmissions that use a cable television connection and a specialized interface device known as a cable modem to provide high-speed Internet access to home and small businesses. |
|
|
Term
|
Definition
| A hardware device that connects a subscriber's device to a service provider's cable systems. |
|
|
Term
|
Definition
| A device that enables you to remove the protective coating from wiring to facilitate installing a media connector. |
|
|
Term
|
Definition
| An electrical instrument that verifies if a signal is present on a cable. AKA Media Tester. |
|
|
Term
|
Definition
| High-Speed memory that the CPU can access directly. |
|
|
Term
|
Definition
| Uses radio signals to transmmit network data over the cellular telephone system. |
|
|
Term
|
Definition
| The record of evidence history from collection to presentation in court, to disposal. |
|
|
Term
|
Definition
| The set of chips on the system board that support the CPU and other basic functions. |
|
|
Term
|
Definition
| A method for concealing the meaning of text. |
|
|
Term
|
Definition
| Data that has been encoded with a cipher and is unreadable. |
|
|
Term
|
Definition
| The unencrypted form of data. AKA Plaintext. |
|
|
Term
|
Definition
| A computer that makes use of the services and resources of other computers. |
|
|
Term
| Client side virtualization |
|
Definition
| Takes place at the endpoints and separates the elements of a user's logical desktop enviroment (The applications, operating system, programs, etc.) and divides them from each other and from the physical hardware or a physical machine. |
|
|
Term
|
Definition
| A network in which some computers act as servers to provide special services for other client computers. |
|
|
Term
|
Definition
| A type of cable that features a central conductior surrounded by braided or foil shielding. A diaelectric insulator separates the conductor and shield and the entire package is wrapped in a jacket. The data signal is transmitted over the central conductor. The outer shielding serves to reduce electromagnetic interference. |
|
|
Term
|
Definition
| When printing multiple copies of a multipage document the collection and combination of pages are kept in the proper order. |
|
|
Term
|
Definition
| A program that implements the commands entered in the text interface. |
|
|
Term
|
Definition
| In a CLI, the area of the screen where users enter commands to interact with the OS. |
|
|
Term
|
Definition
| An Admin tool that is used to deploy component applocations and configure the behaviors of components and applications. |
|
|
Term
|
Definition
| A type of analog video information that is transmitted or stored as two or more separate signals. |
|
|
Term
|
Definition
| The format of an analog (picture only) signal before it is combined with a sound signal and modulated onto a radio frequency carrier. |
|
|
Term
|
Definition
| Collecting and analyzing data from storage devices, computer systems, networks, and wireless communications and presenting this information as a form of evidence in a court of law. |
|
|
Term
|
Definition
| The primary Admin tool used to manage and configure the system. It consolidates several Admin utilities into a single console to provide easy access to the most common system tools. |
|
|
Term
|
Definition
| A method of setting limits on user browser sessions. |
|
|
Term
|
Definition
| A system unit component that prevents damage to computer parts by dissipating the heat generated inside a computer chassis. |
|
|
Term
|
Definition
| An assembly within a laser printer that contains a wire (the corona wire)m which is responsible for charging the paper. |
|
|
Term
|
Definition
| The science of hiding information to protect sensitive information and communications from unauthorized access. |
|
|
Term
|
Definition
| A system -maintenance task that enables you to store copies of critical files and folders on another medium for safekeeping. |
|
|
Term
|
Definition
| On a mobile device, a scheme for isolating business data from personal data. |
|
|
Term
|
Definition
| A system recovery task that enables you to access the backed-up data. |
|
|
Term
|
Definition
| An Admin tool that uses Open Database Connectivity (ODBC) to move data berween different types of databases on the system. |
|
|
Term
|
Definition
| The process of automatically merging and updating common data that is stored on multiple devices. |
|
|
Term
|
Definition
| A method used to remove any sensitive data from a mobile device and permanently delete it. |
|
|
Term
|
Definition
| Any circuit board that plugs into another circuit board. |
|
|
Term
|
Definition
| Distributed Denial of Service. A type of denial service attack that uses multiple devices on disaparate networks to launch the coordinated attack from many simultaneous sources. |
|
|
Term
|
Definition
| Pixels that do not display light as expected and wil show up as black dots on the screen. cannot be fixed, must be replaced. |
|
|
Term
|
Definition
| The process of reversing a cipher. |
|
|
Term
|
Definition
| An IP addres of the router that routes remote traffic from the device's local subnet to remote subnets. |
|
|
Term
|
Definition
| The anti-spyware software that is included with Windows XP, Vista, and 7. |
|
|
Term
|
Definition
| A code pattern that identifies a virus. Also called a signiture. |
|
|
Term
|
Definition
| In Windows, an Admin tool that is used to manage and configure system devices in a hardware profile. |
|
|
Term
|
Definition
| Local-Loop phone connections that use modems and standard telephone technology. |
|
|
Term
|
Definition
| An attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values. |
|
|
Term
|
Definition
| The transfer of information in a signal that comprises only 1's and 0's. |
|
|
Term
|
Definition
| On touch screen displays, a layer of sensors between the LCD display and a layer of glass that enables the translatin of the analog touch signal to a digital signal. |
|
|
Term
|
Definition
| A thermal printer that uses heated pins to form images directly onto specially coated thermal paper. |
|
|
Term
|
Definition
| A component in a file system hierarchy that provides a container to orhanize files and other directories (folders). Also called a folder. |
|
|
Term
|
Definition
| On a network, a centralized database that includes objects such as computers, user names, servers, clients, and passwords and provides a centralized Admin and authentication. |
|
|
Term
|
Definition
| A device mode that will transmit a friendly signal to another device in close proximity. |
|
|
Term
|
Definition
| Circuitry that manages the transfer of data to and from a disk drive, whether it is a hard disk drive or an optical drice. The disk controller provides the communication path between the CPU and the disk drive. |
|
|
Term
| Disk Defragmenter (DEFRAG) |
|
Definition
| A system untility available in all versions of Windows that scans and analyzes how file fragments are arranged and accessed on the hard disk. |
|
|
Term
|
Definition
| Disk mirroring in which the two drives in the mirror each have a dedicated disk controller. |
|
|
Term
|
Definition
| The process of monitoring and adjusting the configuration of HDDs and the file systems contained on those HDDs. |
|
|
Term
|
Definition
| An isolated section of a disk that functions like a separate physical drive. |
|
|
Term
|
Definition
| A personal computer component that enables users to view the text and graphical data output from a computer. |
|
|
Term
|
Definition
| A digital display standard that aims to replace DVI and VGA standards. |
|
|
Term
|
Definition
| A conductor, but with high resistance that loses its electrical charge slowly. |
|
|
Term
|
Definition
| A complete Linux implementation, including kernal, shell, applications, and utilities, that is packaged, distributed, and supported by a software vendor. |
|
|
Term
|
Definition
| A bar along the bottom or side of the screen that contains icons for apps that come with a Macintosh computer. |
|
|
Term
|
Definition
| Desktop devices that connect portable computers to standard desktop peripherals without the need to connect and disconnect the peripherals themselves when the user switches from stationary to mobile use. |
|
|
Term
|
Definition
| A Microsoft network model that an Admin implements by grouping computers together for the purpose of sharing a centralized user account database. Sharing this user account database enables users to use these accounts to log on at any computer in the domain. |
|
|
Term
|
Definition
| A server that stores the user account darabase for the domain and is responsible for authernticating users when they log on to the domain. |
|
|
Term
|
Definition
| A small hardware component that, when attached to a computing device, enable addition functionality such as wireless connectivity. |
|
|
Term
|
Definition
| An impact printer that forms images out of dots on paper by using a set of pins to strike an inked ribbon. |
|
|
Term
|
Definition
| Metal strips that can be screwed onto an internal drive before installation. |
|
|
Term
|
Definition
| The file that stores the contents of a memory dump. |
|
|
Term
|
Definition
| A feature that scans both sides of a document automatically. |
|
|
Term
|
Definition
| The process that enables automatic printing on both sides of printing media. |
|
|
Term
|
Definition
| A method used to assign addresses using the DHCP service. |
|
|
Term
|
Definition
| A mobile digital device designed primarily for reading digital publications such as e-books and digital periodicals. |
|
|
Term
|
Definition
| A built in data migration utility in Windows Vista and 7 that helps transfer files, data, and settings from on PC to another. |
|
|
Term
|
Definition
| An attack that uses special monitoring software to intercept private network communications, either to steal the content of the communication itself or to obtain user names and passwords for future software attacks. |
|
|
Term
|
Definition
| A general term for unwanted signals on the network media that can interfere with network transmissions. |
|
|
Term
|
Definition
| The software installed that allows the computer to virtually run another operating system, or another instance of the same operating system. |
|
|
Term
|
Definition
| A document for all visitors to sign in and out when entering and leaving the building. |
|
|
Term
|
Definition
| Electrostatic Photographic drum. The component in a laser printer that carries the electrical charge to attract toner and then to transfer the toner to the paper. |
|
|
Term
|
Definition
| A family of networking technologies that provide connectivity by using ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media. |
|
|
Term
|
Definition
| An admin tool that is used to view the contents of event logs, which contain information about signifigant events that occur on your computer. |
|
|
Term
|
Definition
| A printed circuit board that is installed in a slot on a system board to provide special functions for customizing or extending a computers capabilities. AKA adapter card, I/O card, add in, add on, or board. |
|
|
Term
|
Definition
| A mobile expansion card designed by the PCMCIA to replace traditional PC Cards to provide PCI Express and USB 2.0 connectivity. |
|
|
Term
|
Definition
| A method used to connect devices to the Internet using fiber optic cable. |
|
|
Term
|
Definition
| A type of cable in which one or more glass or plastic strands, plus addition fuber strands or wraps, are suttounded by a protective outer jacker. Light pulses carry the signal through fiber optic cable. |
|
|
Term
|
Definition
| A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users. |
|
|
Term
|
Definition
| Software that can recover deleted files from you computer system. |
|
|
Term
|
Definition
| A computer that store programs and files that are intended to be shared amond network users. |
|
|
Term
|
Definition
| A method that is used by an operating system to store, retrieve, organize, and manage files and directories on mass storage devices. |
|
|
Term
|
Definition
| The degree of correctness and validity of a filesystem. |
|
|
Term
|
Definition
| The file and folder management app that is included with OS X. |
|
|
Term
|
Definition
| A software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic. |
|
|
Term
|
Definition
| Software stored in memory chips that retains data whether or not power to the computer is on. |
|
|
Term
|
Definition
| Refers to the individual and the immediate actions that follow an incident. |
|
|
Term
|
Definition
| The size and shape of a given component. Often used n tems of motherboard and drive characteristics. |
|
|
Term
|
Definition
| Any type of impact ptinter that functions like a typewritter, by pressing preformed characters against the ink ribbon to deposit the ink on the page. |
|
|
Term
|
Definition
| The number of complete cycles per second in an analog wave or radio wave. |
|
|
Term
|
Definition
| A form of lighting devices from the front of the display. |
|
|
Term
|
Definition
| Permits simultaneous two-way communication. |
|
|
Term
|
Definition
| A component in a laser printer that uses two rollers to heat toner particles, melting them onto the paper. |
|
|
Term
|
Definition
| A mini application in Windows that can perform an information display task. |
|
|
Term
|
Definition
| A device, sofware, or system that converts data between incompatible systems. |
|
|
Term
|
Definition
| A power protection device that creates its own electricity through the use of motors. |
|
|
Term
|
Definition
| Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content. |
|
|
Term
|
Definition
| A cursor that jumps around on the screen randomly, or moves too slow, or opens windows and menus on its own. |
|
|
Term
|
Definition
| Grand unified Bootloader 2. A program used in Linux distributions that loads operating system kernals. |
|
|
Term
|
Definition
| A subset of a security profile, and a document that outlines best practices and recommendations to help conform to policies. |
|
|
Term
|
Definition
| Permits two-way communication, but only one direction at a time. |
|
|
Term
|
Definition
| A passive heat exchanger that dissipates heat from a source such as the CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water. |
|
|
Term
|
Definition
| A unit of measurement that indicates cycles or occurrences per second. |
|
|
Term
|
Definition
| A power option available in Windows enviroments that the computer will store whatever is currently on memory on the hard disk and then shut down, and then return to the state it was in upon hibernation when it is awakened. |
|
|
Term
|
Definition
| Any message containing incorrect or misleading information that is desseminated to multiple userd through unofficial channels. |
|
|
Term
|
Definition
| A firewall installed on a single or home computer. |
|
|
Term
|
Definition
| A networking device used to connect the drops in a physical star topology network into a logical bus topology. AKA Multiport repeater. |
|
|
Term
|
Definition
| In virtualization technology an application that is installed on the host machine and is used to configure and manage the VMs running on the host. |
|
|
Term
|
Definition
| A cloud storage solution that is accessed by using the user's Apple ID. |
|
|
Term
|
Definition
| Any type of printer that strikes a component directly against the paper or ink to create characters on the paper. |
|
|
Term
|
Definition
| An approach that an attacker will pretend to be someone else. typically a user in distress or a help-desk representative. |
|
|
Term
|
Definition
| The process of installing a newer version of an existing operating system that is currently installed on the computer. |
|
|
Term
|
Definition
| A surge or spike that is caused when a device that uses a large amount of current is started. |
|
|
Term
|
Definition
| A set of practices and procedures that govern how an organization will respond to an incident in progress. |
|
|
Term
|
Definition
| A record of any instance where a person is injured or computer equipment is damaged due to enviromental issues. Also, a record of accidents involving hazardous materials that could have an impact on the environment itself. |
|
|
Term
|
Definition
| A method for wireless devices to communicate with other devices by first connecting to an AP. |
|
|
Term
|
Definition
| A printer that forms images by spraying ink on the paper. |
|
|
Term
|
Definition
| A personal computer component that enables users to enter data or instructions into a computer. |
|
|
Term
|
Definition
| The point at which two devices connect and communicate with each other. |
|
|
Term
|
Definition
| A relatively inexpensive PC that enables internet access and a specific activity. |
|
|
Term
|
Definition
| A laptop component that converts DC power to AC power for the display. |
|
|
Term
|
Definition
| In printing, a page orientation that is wider than it is tall. |
|
|
Term
|
Definition
| A type of printer that forms high-quality images on one page of paper at a time, by using a laser beam, toner, and an electophotographic drum. |
|
|
Term
|
Definition
| The principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them. |
|
|
Term
|
Definition
| A power problem that is caused by a fluctuation in electrical current. |
|
|
Term
|
Definition
| A typr of impact printer that can print a full line of text at a time. |
|
|
Term
|
Definition
| An indicator on a network adapter that lights up when a network signal is detected. |
|
|
Term
|
Definition
| An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds. |
|
|
Term
|
Definition
| A complete Linux implementation, including kernal, shell, applications,, and utilities, that is packaged, distributed, and supported by a software vendor. |
|
|
Term
|
Definition
| A standalone Linx program for troubleshooting a corrupt Linux installation. |
|
|
Term
|
Definition
| Cooling methinds that circulate a liquid or liquified gas, water or freon, past the CPY to keep it cool. |
|
|
Term
|
Definition
| A logical printer that is managed by the local computer, where the pring device is generally directly attached. |
|
|
Term
|
Definition
| An Admin tool that is used to view and edit the security settings for group policies. |
|
|
Term
|
Definition
| A folder that is created on the local nerwork by an individual user and then shared with other nerwork users via share folder permissions. |
|
|
Term
|
Definition
| In OS X, a copy of altered files that is stored on the startup drive until the Time Machine backup drive is available. |
|
|
Term
|
Definition
| An Admin tool that is used to manage user accounts on the local system. |
|
|
Term
|
Definition
| An error condition that causes the system or an application to stop responding to user input. |
|
|
Term
|
Definition
| A piece of code that sits dormant on a user's computer until it is triggered by a specific event, such as a specific update. Once the code is triggered, the logic bomb "detonates" and corrupts the data on the user's computer. |
|
|
Term
|
Definition
| A special connecor used for diagnosing network transmission problems that redirects electrical signals back to the transmitting system. |
|
|
Term
|
Definition
| The process of writing track sector markings on a hard disk. |
|
|
Term
|
Definition
| The unit of measurement for visible light that is being emitted from a light-source. |
|
|
Term
|
Definition
| A computer that stores incoming email messages and forwards outgoing email messages. |
|
|
Term
|
Definition
| Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition. |
|
|
Term
|
Definition
| A form of eavesdropping where the attacker makes an independent connection between the victims as if they are directly talking to each other over a closed connection, when in reality the attacker is controlling the information that travels between the victims. |
|
|
Term
|
Definition
| Two sets of interlocking doors inside a small cpace, where the first set of doors must be closed before the second set will open. |
|
|
Term
|
Definition
| A series of pages that contain the complete documentation specific to every Linux command. AKA Man pages. |
|
|
Term
|
Definition
| A PC component that provides temporary workspace for the processor. |
|
|
Term
|
Definition
| The process of writting the contents of a system memory at the time of a stop error to a file on the HDD prior to system shutdown. |
|
|
Term
|
Definition
| A system unit component that holds a group of memory chips that act as a single memory chip. |
|
|
Term
|
Definition
| Introduced in late 1997, and is often referred to as µATX, has a max size of 9.6" by 9.6". |
|
|
Term
|
Definition
| Micro Dual Inlin Memory Module. A memory module standard used in some laptops. |
|
|
Term
|
Definition
| A smaller version of the full ATX board with a max size of 11.2" by 8.2". |
|
|
Term
|
Definition
| An older motherboard that was introduced by Intel in 1995 to provide better I/O support, lower cost, easier use, and better process support. |
|
|
Term
|
Definition
| A bayonet-style connector using the traditional BNC connection method. |
|
|
Term
|
Definition
| A smaller version of the full size HDMI, specified more for portable devices. |
|
|
Term
|
Definition
| A small compact board that fit the same form factor as the ATX, an the microATX. Max size of 6.7" by 6.6". |
|
|
Term
|
Definition
| An extremely small expansion card, often just a few centimeters in length, used to increase communication abilities by providing network adapters or modems and supports variuos connections and buses. |
|
|
Term
|
Definition
| A disk fault-tolerence method in which data from an entire partition is copied onto a secod drive. |
|
|
Term
|
Definition
| A feature in OS X that allows users to use multiple Spaces as if they were multiple desktops. |
|
|
Term
|
Definition
| An electronic device that provides computing pwer in a portable format. |
|
|
Term
|
Definition
| A device that converts digital data to an analog signal that can be sent over a telephone line. |
|
|
Term
|
Definition
| The main Circuit board in a computer that acts as the backbone for the entire computer system. AKA system board. |
|
|
Term
| Multi-factor Authentication |
|
Definition
| Any authentication scheme that requires calidation of at least two of the possible authentication factors. |
|
|
Term
|
Definition
| The technology used on the surface of the touch screen on tablets and other moblie devices that can recognize more than one contact on the surface at once. |
|
|
Term
|
Definition
| A security mechanism that requires that each party in a communication verifies its identity. |
|
|
Term
|
Definition
| A set of rectangular rods with number etched into them that let users do multiplication by addint the numbers on properly positioned rods. a precursor to the slide rule. |
|
|
Term
|
Definition
| The fixed resolution for LCD or other flat panel display devices. |
|
|
Term
|
Definition
| A group of computers that are connected together to communicate and share resources. |
|
|
Term
|
Definition
| A shared print device managed by a network print server. It's represented as a logical printer object on the client computer that accesses the server. |
|
|
Term
|
Definition
| A hardware/ Software combination that protects all the computers on a network beind the firewall. |
|
|
Term
| Network-Connected Printer |
|
Definition
| Any print device that can connect directly to the network with a network adapter rather than using a physical cable to connet to a local computer or print server device. |
|
|
Term
|
Definition
| Any system that tries to connect to an organizations network and that doesn't meet the minimum requirements of the network. |
|
|
Term
|
Definition
| A component of the chipset that controlls the system memory and thAGP cideo ports, and sometime the cache memory. |
|
|
Term
|
Definition
| An association of 84 firms for developing open standards for mobile devices. |
|
|
Term
|
Definition
| An open source implementation of the SSH protocol that is included with most Linux distributions. |
|
|
Term
|
Definition
| A PC storage device that stores data optically. |
|
|
Term
|
Definition
| A computer drive that is either intenal or external to a computer system that reads and writes data to an optical disc. |
|
|
Term
|
Definition
| In printing, the position of the page and the direction of the content printed on the page. |
|
|
Term
|
Definition
| A power condition where the voltage in a circuit is raised above the circuit's upper voltage limit. |
|
|
Term
|
Definition
| A section of memory addresses in which a unit of data can be stored. |
|
|
Term
|
Definition
| An interrupt generated when an application requests data that is no longer present in its cirtual memory location. |
|
|
Term
|
Definition
| In a virtual-memory system, the section of the hard disk used to store memory contents that have been swapped out of physical RAM. |
|
|
Term
|
Definition
| An error correction method for electronic communications. |
|
|
Term
|
Definition
| The process of creating, destroying, and manipulating patitions to optimize system performance. |
|
|
Term
|
Definition
| The process of dividing a single HDD into isolated sections that function as seperate physical hard drives, called partitions. |
|
|
Term
|
Definition
| A Linux program that updates the kernal with partition table changes. |
|
|
Term
|
Definition
| A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance. |
|
|
Term
|
Definition
| A network in which resource sharing, processing, and communications control are completely decetralized. |
|
|
Term
|
Definition
| An Admin tool that monitors the state of services or daemons, processes, and resources on a system. |
|
|
Term
|
Definition
| In Windows, security settings that control access to individual objects, such as files. |
|
|
Term
|
Definition
| Amobile digital device that is larger than a standard sized smartphone and smaller than a tablet. |
|
|
Term
|
Definition
| Similar to phishing, this type of social engineering attack redirects a request for a website, typically and e-commerce sire, to a similar but fake site to gain username and password information. |
|
|
Term
|
Definition
| A type of e-mail based social engineering attack in which the attacker sends an e-mail from a spoofed source, such as a bank, to try to elicit information from the victim. |
|
|
Term
|
Definition
| For network adapter cards, a globally unique hexadecimal number burned into each adapter by the manufacturer. |
|
|
Term
|
Definition
| A network of two to eight Bluetooth-enabled devices. |
|
|
Term
|
Definition
| A technology that allows images to be printed directly on a printer from digital cameras. |
|
|
Term
|
Definition
| The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot. |
|
|
Term
|
Definition
| A type of flat panel that uses a gas mixture placed between two sheets of glass that have electrodes attached to their surface. |
|
|
Term
|
Definition
| A grade of cable that does not give off noxious gases when burned. used in walls in place of PVC cable. |
|
|
Term
|
Definition
| A situation where the mouse ponter moves accross the screen without the user touching the touchpad or mouse. |
|
|
Term
|
Definition
| A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet. |
|
|
Term
|
Definition
| A hardware connection interface on a PC that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs. |
|
|
Term
|
Definition
| A technique of selectively enabling or disabling TCP and UDP ports on computers or network devices. It ensures that no traffic, except for the protocol that the Admin has chosen to allow, can pass through an open port. |
|
|
Term
|
Definition
| A scaled-down version of a docking station with only the standard ports available. |
|
|
Term
|
Definition
| In printing, a page orientation that is taller than wide. |
|
|
Term
|
Definition
| An internal computer component that converts line voltage AC power from an electrical outlet to the low-voltage DC power needed by system components. |
|
|
Term
|
Definition
| A tool that connects to the power supply's 24 pin connector that test functionality of the unit, |
|
|
Term
|
Definition
| The process of creating computer accounts in Windows Active Directory before joining the computers domain. |
|
|
Term
|
Definition
| An Admin tool that is used to view and manage all of the printers and print servers installed on a network. |
|
|
Term
|
Definition
| A combination of parameters that define the appearance of the printed output. |
|
|
Term
|
Definition
| A list of print jobs waiting to be printed. |
|
|
Term
|
Definition
| A computer that enables network users to share printers. |
|
|
Term
|
Definition
| A cover for a device's screen, making it difficult to read the screen when not directly in front. |
|
|
Term
|
Definition
| Addresses used by organizations for nodes that require IP connectivity within their enterprise network, but do not require external connections to the global internet. |
|
|
Term
|
Definition
| A subset of a security profile, ad a document that provides detailed information about specific devices and technologies that support policies. |
|
|
Term
|
Definition
| A record that summarizes the current running processes on a system. |
|
|
Term
|
Definition
| A system that acts as an intermediay for rquests for resources. |
|
|
Term
|
Definition
| A computer or application that isolates internal clients from external servers by downloading and storing files on behalf of the clients. |
|
|
Term
|
Definition
| Addresses that can be used by organizations that can also be chared with external networks. |
|
|
Term
|
Definition
| A tool used in a wiring closet to connect cable wires directly to a patch panel. |
|
|
Term
|
Definition
| In a mobile device, memory that contains an operating system that is separate from the end user operating system and that controls all of the low-level timing-dependent functions of the mobile device. |
|
|
Term
|
Definition
| A form of wireless communication in which signals are sent cia RF waves, in the 10KHz to 1GHz range to wireless antennas. |
|
|
Term
|
Definition
| A cloud computing feature that provides seamless, scalable provisioning. |
|
|
Term
|
Definition
| A performance enhancer, available on Windows Vista and 7 that allows the user to supplement the computers memory with an external storage device like a flash drive. |
|
|
Term
|
Definition
| A file used by Windows to refresh your PC. |
|
|
Term
|
Definition
| The number of times per second that the monitor is "refreshed" or scanned to illuminate pixels. |
|
|
Term
|
Definition
| The central configuration database where Windows stores and retrieves startup setting, information, and infromation for local user accounts. |
|
|
Term
|
Definition
| A filesystem that handles small files better than ext2 or 3. |
|
|
Term
|
Definition
| A software application that operates a Windows computer from a remote location. |
|
|
Term
|
Definition
| A feature of OS X that enables users to access external drives or share discs from another computer. |
|
|
Term
|
Definition
| The number of pixels that make up the dimension of a display, represented in a ratio calue as the number of horizontal pixels by vertical pixels. |
|
|
Term
|
Definition
| A board that is plugged into the system board and provides additional slots for adapter cards. |
|
|
Term
|
Definition
| Malicious code that is designed to hide the existence of processes or programs from normal detection methods and to gain continuous privileged access to a computer system. |
|
|
Term
|
Definition
| The schedule that determines how many back up tapes or other media sets are needed, and the sequence in which they are used and reused. |
|
|
Term
|
Definition
| A networking device that connects multiple networks that use the same protocol. |
|
|
Term
|
Definition
| A Windows system startup method that loads only a minimal set of drivers and services and that is used in troubleshooting Windows computers. |
|
|
Term
|
Definition
| Provides extremely long-range wirelessnetwork transmissions to relay network signals from the network service provider to individual customers. |
|
|
Term
|
Definition
| A safeguard or prevention method to avoid, counteract, or minimize security risks relating to personal or company property. |
|
|
Term
|
Definition
| A specific instance of a risk event occuring, whether or ot it causes damage. |
|
|
Term
|
Definition
| Documentation of a security incident, including the type and severity of the incident, personnel involved, a description of the incident, and any mitigating actions taken. |
|
|
Term
|
Definition
| A large, comprehensive document that defines how security will be implemented within a particular organization. |
|
|
Term
|
Definition
| A computer that provides services and resources on the network. |
|
|
Term
|
Definition
| Takes place centrally on a server and utilizes one logical device, typically the server, to act as the host machine for the "guest" machines that virtually use the applications and programs provided by the host. |
|
|
Term
|
Definition
| Comprehensive software update that generally includes all prior patches and updates, but which can also include important new features and function. |
|
|
Term
|
Definition
| A device that converts video content to a format that can be viewed on a television. also reffered to as steaming players or media players. |
|
|
Term
|
Definition
| A feature available on Windows XP and newer operating systems that creates backup copies or snapshots of the system's data and stores them locally or to an external location, either manually or regularly scheduled intervals. |
|
|
Term
|
Definition
| A network resource, such as a disk, folder, or printer, that is available to other computer users on the network. |
|
|
Term
|
Definition
| A component that interacts directly with users and fuctions as the command interpreter for the Linux operating system. |
|
|
Term
|
Definition
| A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN. |
|
|
Term
|
Definition
| Adesignated area of the Windows 7 and Windows Vista desktop, displayed vertically along the side of the destop, where users can add gadgers of their choice to provide information and access to frequently used tools or programs. |
|
|
Term
|
Definition
| A code pattern that identifies a virus. also called a definition. |
|
|
Term
|
Definition
| A digital camera that includes a processor, memory, cellular and Wi-Fi support, and a mobile operating system. |
|
|
Term
|
Definition
| A device similar to a credit card that can store authentic information, such as a user's private key, on an embedded chip. |
|
|
Term
|
Definition
| A hybrid TV that is basically a television set with web and internet features built into it. |
|
|
Term
|
Definition
| A multipurpose device that runs computing applications and that is worn on a preson's wrist. |
|
|
Term
|
Definition
| A mobile digital device that combines the functionality of a portable phone with that of media players, GPS navigation, personal digital assistants, and cameras. |
|
|
Term
|
Definition
| A printer that produces snapshot-sized images of acceptable photographic quality. |
|
|
Term
| Social Engineering Attack |
|
Definition
| A type of attack where the goal is to obtain sensitive data, including user names and passwords, from network users through deception and trickery. |
|
|
Term
|
Definition
| A computer repair program that can analyze hardware and software components and test them for problems. Also referred to as software diagnostic utility. |
|
|
Term
|
Definition
| A means of securing the electronic components to a circuit board using a comination of lead, tin, and silver (solder) and a tool called a soldering iron. |
|
|
Term
|
Definition
| A type of printer that uses ink from melted solid-ink sticks. |
|
|
Term
|
Definition
| A component of the cipset that controls input/output functions, the system clock, drives and buses, APM power management, and various other devices. |
|
|
Term
|
Definition
| In OS X, a virtual desktop consisting of a collection of related windows, as created and managed by Mission Control. |
|
|
Term
|
Definition
| Originally, and frequent and repetitive postings in electronic bulletin boards; more commonly, an unsolicited or distasteful commercial email from anonymous sources. |
|
|
Term
|
Definition
| A very short increase in the electrical supply coltage or current carried on any wire such as a power line, phone lines, and network lines. Usually only last for a few milliseconds. |
|
|
Term
|
Definition
| An IBM-based attack similar to spam that is propagated through instant messaging instead of through email. |
|
|
Term
|
Definition
| A human-based or sofware-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. Spoofing can occur in IP addresses, MAC addresses and email. |
|
|
Term
|
Definition
| A feature of OS X that enables users to search for apps, documents, images, and other files. |
|
|
Term
|
Definition
| A subset of a security profilem, and a tactical document that specifies processes to follow to meet policy requirements. |
|
|
Term
|
Definition
| An operating system function that builds file systems on drives and partitions. |
|
|
Term
|
Definition
| Configuring TCP/IP statically on a network. Requires that an administrator visit each node to manually enter IP address information for that node. |
|
|
Term
|
Definition
| The buildup of stationary electrical charge on any object. |
|
|
Term
|
Definition
| A system error serious enough to stop all processes and shut down without warning. |
|
|
Term
|
Definition
| A computer component that enables users to save data for reuse at a later time, even after restarted. |
|
|
Term
|
Definition
| A disk-performance-enhancement featyre in which data is spread acress multiple drives to improve read and write access speeds. |
|
|
Term
|
Definition
| pixels that only show one color of light, so they appear out of place when the display is on. |
|
|
Term
|
Definition
| A 32-bit number that is assigned to each host to divide the 32-bit binary IP address into network and node portions. |
|
|
Term
|
Definition
| A sudden sharp increase in voltage or current that can last up to 50 microseconds. |
|
|
Term
|
Definition
| A power protection device that provides power protection curcuits that can reduce or eliminate the impact of surges and spikes. |
|
|
Term
|
Definition
| A power option available in Linux, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excludidng RAM. |
|
|
Term
|
Definition
| A portion of the HDD that is used in situations when Linux runs out of physical memory and needs more of it. |
|
|
Term
|
Definition
| In a virtual memory system, the process of moving data back and forth from physical RAM to the pagefile. also called paging. |
|
|
Term
|
Definition
| A smart network hardware device that joins multiple network segments together. |
|
|
Term
|
Definition
| The BIOS that sets the computer's configuration and environment when the system is powered on. |
|
|
Term
|
Definition
| The promary communication pathway between a CPU and other parts of the chipset. The system bus enables data transfer between the CPU, BIOS, memory, and the other buses in the computer. Aslo referred to as frontside bus or local bus. |
|
|
Term
|
Definition
| An admin tool that is used to identify and manage issues that may be causing the system to run improperly at start up. |
|
|
Term
|
Definition
| The files necessary for the operating system to function properly. |
|
|
Term
|
Definition
| A copy of Windows, applications, system settings, and data files that is stored in a separate location than when=re the originals of these items are stored. |
|
|
Term
|
Definition
| A utility used in Windows XP, Windows Vista, and Windows 7 that monitores the system for changes to core system files, drivers, and the Registry, and creates restore points to be used to help restore the system if a failure occurs. |
|
|
Term
|
Definition
| A snapshot of the system configuration at a given moment in time that contains info about any changes to these components and is stored on the computer's HDD. |
|
|
Term
|
Definition
| A personal computer component that ncludes other devices necessary for the computer to function, including the chassis, power supply, cooling sustem, system board, microprocessor, memory chips, disk drives, adapter cards, and ports for conneting external devices. often referred to as a box, main unit, or base unit. |
|
|
Term
|
Definition
| A mobile device that includes an integrated tough screen display, virtual onscreen keyboard, and flash memory for data storage. |
|
|
Term
|
Definition
| A personal computer storage device that stores data magnetically on a removable tape. |
|
|
Term
|
Definition
| A basic system-diagnostic and performance-monitoring tool included with the Windows operating system. |
|
|
Term
|
Definition
| An admon tool that allows the uset to create and manage certain system tasks that will be automatically carried out by the computer at predetermined times. |
|
|
Term
|
Definition
| Adding a resistor to the end of a coax network segment to prevent reflections wht would interfere with the proper reception of network signals. |
|
|
Term
| Thermal dye transfer printer |
|
Definition
| A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuouse-tone output similar in quality to a photographic print. also called dye sublimation printer. |
|
|
Term
|
Definition
| Paper that contains a chemical designed to react with the heating element of a thermal printer to create images on paper. |
|
|
Term
|
Definition
| A pate that is used to connect a heat sink to a CPU to provide a liquid thermaly conductive compound gel that fills any gaps between the CPU and the heat sink to permit a more efficient transference of heat from the processor to the heat sink. |
|
|
Term
|
Definition
| Any printer that uses heat to create the image on the paper with dye or ink from ribbons or with heated pins. |
|
|
Term
| Thermal wax tranfer printer |
|
Definition
| A printer that uses a thermal printhead to melt wax-based ink from a trasfer ribbon onto the paper. |
|
|
Term
|
Definition
| A buisiness computer that performs most or all computeing functions on its own. AKA fat clien. |
|
|
Term
|
Definition
| A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and servers. |
|
|
Term
|
Definition
| A hardware interface that supports connecting a wide variety of peripheral devices to PC's and that can use optical fiber or copper wire to transmit signals. |
|
|
Term
|
Definition
| An OS X application that provides automated file backups. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| An electronic device that sends an electrical signal through one set of UTP cables. |
|
|
Term
|
Definition
| An electronic device that emits an audible tone when it detects a signal in a set of wires. |
|
|
Term
|
Definition
| An electrostatic-sensitive dry ink substance used in laser printers. |
|
|
Term
|
Definition
| Wires etched onto the motherboard to provide electrical pathways. |
|
|
Term
|
Definition
| A small button found on some laptops that enables you to move the mouse pointer when no mouse is connected to the computer. |
|
|
Term
|
Definition
| Switches that are etched on one sliver of semicondutor that can be opened or closed when conducting electricity. |
|
|
Term
|
Definition
| The use of friction to create a static charge. |
|
|
Term
|
Definition
| Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the users HDD. |
|
|
Term
|
Definition
| A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating outer jacket. |
|
|
Term
|
Definition
| A collection a credentials and important info about a person with access to the system, including the rights and privileges assigned to the user. |
|
|
Term
|
Definition
| A security measure in which a computer user proves its identity in order to gain access to its resources. |
|
|
Term
|
Definition
| The allocation be the computer system of a portion of the HDD as if it was a physical RAM. |
|
|
Term
|
Definition
| A software-based alternative to a physical printer that enables you to print to a file. |
|
|
Term
|
Definition
| The technological process of creating a virtual version of a computer environment by separating the elements of the computing environment from each other and from the physical hardware it runs on via an additional software layer. |
|
|
Term
| Virtualization Workstation |
|
Definition
| A computer that uses both hardware virtualization and client cirtualization resources to provide a comprehensive virtual workstation for users. |
|
|
Term
|
Definition
| A piece of code that spreads from one computer to another by attaching itself to other files. |
|
|
Term
|
Definition
| A human-based attack where the goal is to extract personal, financial, or confidential info from the victim by using services such as the telephone system and IP-based voice messaging services (VoIP) as the communication medium. |
|
|
Term
|
Definition
| An error or anomaly in the visual display of a picture. |
|
|
Term
|
Definition
| The shape of an analog signal when plotted on an oscilloscope or graph. |
|
|
Term
|
Definition
| Small monile computing devices that are designed to be worn under, with, or on top of a person's clothing. |
|
|
Term
|
Definition
| A computer that provides access to personal, corporate, or educational website content. |
|
|
Term
|
Definition
| A form of phishing that targets individuals who are known or are believed to be wealthy. |
|
|
Term
|
Definition
| Worldwide Interoperability for Microwave Access. A packet-based wireless technology that provides wireless broadband access over long distances. |
|
|
Term
|
Definition
| The anti-spyware software that is included with Windows Vista and 7 installations. |
|
|
Term
| Windows Firewall with Advanced Security |
|
Definition
| An admin tool that is used to manage advanced firewall settings for the computer and any remote computers connected to the network. |
|
|
Term
| Windows Memory Diagnostic |
|
Definition
| An admin tool that is used to check the RAM on the system and make sure that it is functioning appropriately and efficiently. |
|
|
Term
| Windows Security Policies |
|
Definition
| Configuration settings within Windows operating systems that control the overall security behavior of the system. |
|
|
Term
|
Definition
| Windows pre-installation environment. A lightweight version of Windows or Windows server that can be used for deployment of the full version of the OS or for troubleshooting OS problems. |
|
|
Term
|
Definition
| A tool that attaches media connectors to the ends of cables. |
|
|
Term
|
Definition
| A tool that is often incorporated into a wire crimper and that enable the user to remove the protective coating from electrical wires. |
|
|
Term
|
Definition
| A network connection that transmits signals without using physical network media. |
|
|
Term
|
Definition
| The process of conceiling and protecting data during wireless transmissions. |
|
|
Term
| Wireless Network Connection |
|
Definition
| A Windows troubleshooting tool used to verify that a computer or other wireless device is connected to the network and able to send and recieve data. |
|
|
Term
|
Definition
| A Wi-Fi spectrum analyzer used to detect devices and points of interference as well as analyze and troubleshoot network issues on a WLAN or other wireless networks. |
|
|
Term
|
Definition
| A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices. |
|
|
Term
|
Definition
| A piece of code that spreads from on computer to another on its own, not by attaching itself to another file. |
|
|
Term
|
Definition
| A mechanism by which programs are run on one machine and the X window output is displayed on another efficiently. |
|
|
Term
|
Definition
| A 64-bit, high-performance journaling fliesystem that provides fast recovery and can handle large files efficiently. |
|
|
Term
|
Definition
| A downloadable add-on for Windows 7 that allows users running Windows 7 to access and use Windows XP-compatible software and programs directly on their desktops. |
|
|
Term
|
Definition
| An attack that exploits a preciously unknown vulnerability in an application or operating system. |
|
|
Term
|
Definition
| Unauthorized software that directis the devices to launch a DDoS attack. |
|
|