Free Essay

It260 Key Terms

In: Computers and Technology

Submitted By jhen80
Words 691
Pages 3
1. Server and client --describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

2. Active Directory services directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems.

3. File Server Resource Manager-- enables remote configuration of directory quotas, file screens, and storage reports on a server.

4. Windows core server- is a new minimal installation option that is available when you are deploying the Standard, Enterprise, or Datacenter edition of Windows Server

5. Boot-- is the initial set of operations that a computer system performs when electrical power is switched on.

6. HTTP redirection-- element configures settings for Internet Information Services (IIS) 7 that redirect client requests to a new location

7. WPAS- WPAS manages application pools and worker processes running on your machine for both HTTP and non-HTTP requests.

8. Virtual directories--- is a software layer that delivers a single access point for identity management applications and service platforms. A virtual directory operates as a high-performance, lightweight abstraction layer that resides between client applications and disparate types of identity-data repositories, such as proprietary and standard directories, databases, web services, and applications.

9. Site Binding-- element configures binding information for an IIS 7 Web site. It can also define the default bindings for all sites on the Web server

10. Web server-- can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver Web content that can be accessed through the Internet

11. PTR-- pointer record, a type of DNS record in computer network configuration

12. Anonymous Authentication --allows any user to access any public content without providing a user name and password challenge to the client browser.

13. NTLMv2-- is a challenge-response authentication protocol. It is intended as a cryptographically strengthened replacement for NTLMv1.

14. ACL, ACE

15. Public Key --a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext.

16. Database server-- is a computer program that provides database services to other computer programs or computers, as defined by the client–server model.

17. CGI --is a standard method for web server software to delegate the generation of web pages to executable files.

18. UDDI-- Universal Description, Discovery and Integration (UDDI) is a directory service where businesses can register and search for Web services.

19. SMTP-- is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks.

20. ASP NET ---is a Web application framework developed and marketed by Microsoft to allow programmers to build dynamic Web sites

21. Downloading and File transfer-- Downloading is the transmission of a file from one computer system to another, usually smaller computer system. File transfer is a generic term for the act of transmitting files over a computer network

22. Bandwidth-- The amount of data that can be transmitted in a fixed amount of time.

23. Broadcast--- is the distribution of audio and video content to a dispersed audience via any audio visual medium.

24. Windows Sharepoint Services-- helps your team share and manage information and documents in a Web site.

25. Window Media Rights manger --To help content owners control their media material,

26. Application services-- help you develop and migrate applications, manage content, deploy and manage desktops,

27. Virtual Server --a server (computer and various server programs) at someone else's location that is shared by multiple Web site owners so that each owner can use and administer it as though they had complete control of the server.

28. Protocol listener- This default listener, supports no services upon startup, and listens on the following TCP/IP protocol address:

29. Kerebos-- is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

30. Thin Client-- is a computer or a computer program which depends heavily on some other computer (its server) to fulfill its traditional computational roles.

Similar Documents

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18