Definition: The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities.Related Term(s): access control mechanismAdapted from: CNSSI 4009
Definition: The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.From: CNSSI 4009
Definition: Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.Adapted from: CNSSI 4009
All-flash storage array is running SAN or NAS protocols on a set of controllers and is best when optimized software is engaged to take advantage of all enterprise SSD drives allowing quick IOPs and throughout. All-flash systems will not run spinning hard drives and must be all SSDs.
A list of entities that are considered trustworthy and are granted access or privileges.Related Term(s): BlocklistAdapted from: DHS personnel
Aurora is part of the Amazon RDS family of database services. It is a high performance managed relational database that is compatible with MySQL and PostgreSQL.
A fully managed NoSQL (Not Only SQL) database service.
Caching is a method to store frequently accessed information in a temporary memory location on a server. Amazon ElastiCache is a Caching-as-a-Service that provides this caching layer. It provides two caching engine types, Memcached and Redis.
A program that specializes in detecting and blocking or removing forms of spyware.Related Term(s): spywareAdapted from: NCSD Glossary
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.Adapted from: NCSD Glossary
Page 1 of 3