0-9   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Amazon Aurora

Aurora is part of the Amazon RDS family of database services. It is a high performance managed relational database that is compatible with MySQL and PostgreSQL.


Amazon DynamoDB

A fully managed NoSQL (Not Only SQL) database service.


Amazon ElastiCache

Caching is a method to store frequently accessed information in a temporary memory location on a server. Amazon ElastiCache is a Caching-as-a-Service that provides this caching layer. It provides two caching engine types, Memcached and Redis.


antispyware software

A program that specializes in detecting and blocking or removing forms of spyware.
Related Term(s): spyware
Adapted from: NCSD Glossary


antivirus software

A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
Adapted from: NCSD Glossary


ARRAY

A method used for storing information on multiple devices. In storage terms ‘array’ is commonly a collection of hard disk drives in a server arranged in a particular way, that stores the same defined data as each other but can have different values. 


ASYNCHRONOUS REPLICATION

After data has been written to the primary storage site, new data can be written to that site, without having to wait for the secondary (remote) storage site to also finish writing data. Asynchronous Replication does not have the latency impact that synchronous replication does, but has the disadvantage of incurring data loss, should the primary site fail before the data has been written to the secondary site.


attack

 An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
Extended Definition: The intentional act of attempting to bypass one or more security services or controls of an information system.
Related Term(s): active attack, passive attack
From: NCSD Glossary. NTSSI 4009 (2000), CNSSI 4009


attack method

 The manner or technique and means an adversary may use in an assault on information or an information system.
Adapted from: DHS Risk Lexicon, NCSD Glossary


attack path

The steps that an adversary takes or may take to plan, prepare for, and execute an attack.
Adapted from: DHS Risk Lexicon, NCSD Glossary



Display #