Chapter 1 Vocab

12345678910111213141516171819202122
Across
  1. 8. services are delivered from a business' data center to internal users. This model offers versatility and convenience, while preserving management, control and security.
  2. 10. (Quality of Service) the capability of a network to provide better service to selected network traffic over various technologies
  3. 11. large secure locations for server farms
  4. 12. plugging a machine in which secures a frequency in your power line that is used for data transfer
  5. 15. security software that protects a system from malicious software
  6. 17. (Access Control Lists) a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee
  7. 18. Firewalls that allow only certain ports to be used
  8. 19. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it
  9. 20. using smartphones to control functions of your house
  10. 22. cloud technology that can be changed to adapt to the needs of the user
Down
  1. 1. the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
  2. 2. that covertly steals personal information from one computer
  3. 3. the property that enables a system to continue operating properly in the event of the failure of some components
  4. 4. allows companies to use computers as a utility that they get services for and from on demand rather than having to maintain their own infrastructure
  5. 5. the ability to add your own device onto a network, separate from the other machines on the network.
  6. 6. a third-party provider delivers the cloud service over the Internet, sold on-demand, typically by the minute or the hour.
  7. 7. (Virtual Private Network) a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
  8. 9. self-replicating piece of code used for malicious purposes
  9. 13. the design of the communication on a network. It is a framework for the specification of the network’s physical components and their roles on the network
  10. 14. wireless ISP, get all data from an antenna outside your house
  11. 16. (Intrusion Prevention System) a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  12. 20. The authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority.
  13. 21. a combination of public cloud services and on-premises private cloud – with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud while using the public cloud for bursty workloads that must scale on-demand. The goal of hybrid cloud is to create a unified, automated, scalable environment which takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.