|
|
Storing data offsite, usually in a secure location.
A model in which the database and application exist on the same system.
Words added to values during authentication.
Storing backup data at the same site as the servers on which the original data resides.
A Link-State routing protocol used in IP networks.
A model defined by the ISO to categorize the process of communication between computers in terms of seven layers. The seven layers are Application, Presentation, Session, Transport, Network, Data Link, and Physical. See also International Organization for Standardization.
Security as it relates to how an organization does things (operates).
The person primarily responsible for the IDS.
The process of applying all security patches and fixes to an operating system to make it as secure as possible.
See Open Systems Interconnect.
See Open Shortest Path First.
A way to transmit the encryption key by using a method other that the one used to transmit the data. The key is sent by letter, by courier, or by some other separate method.
The person responsible for the current existence of a resource.
|
|