The physical components in a computer system.
The practice of isolating functions by placing them on separate hardware platforms.
Evidence that isn’t based on personal, first-hand knowledge of the witness but was obtained through other sources.
Under the Federal Rules of Evidence, hearsay evidence is normally not admissible in court.
An attack whereby secret (and usually malicious) computer code is embedded within another program.
Federal act that addresses security and privacy requirements for medical systems and information.
A decoy system deployed by a security administrator to discover the attack methods of potential hackers.
A fully configured alternate computer facility with electrical power, HVAC, and functioning file/print servers and workstations. See also HVAC.
A point-to-point WAN connection protocol.
A network device used to connect several LAN devices together. Also known as a Concentrator.
Heating, ventilation, and air conditioning.