Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

614 total results found

Crosstalk

Documentation

A form of interference where signals transmitted on one cable escape and damage signals being transmitted on another cable. #II

Virtual Container

Documentation

An alternative to virtual machines, which runs consistent runtime environments for specific programs instead of an entire OS. Virtual containers are initialized using a special software called a container engine. It runs the set program in an isolated manner, ...

Capacitor

Documentation

A hardware device that stores an electrical charge. The basis for all computer systems. #II

Virtual Desktop Infrastructure

Documentation

aliases: VDI A type of virtualization that uses remote connection to run multiple operating systems concurrently on a machine. VDI uses a connection between the host machine and a remote device, casting the guest OS to the remote device while processing ev...

Transparent Data Encryption

Documentation

A form of database encryption that encrypts the entire database and all of its backups. TDE is typically used when the data is at rest - when it's not being actively used. When an authorized user wants to access the data, it's automatically decrypted so that t...

Column Level Encryption

Documentation

A form of database encryption that allows the database administrator to encrypt each column or section of the database using different access keys. CLE increases the encryption level since multiple access keys are required to view all the data, but the perform...

Application Level Encryption

Documentation

A form of database encryption where the program that's used to create and manage the stored data is also responsible for encrypting it. ALE works well because the data is encrypted even before it reaches the database for storage. The only drawback is that the ...

Personally Identifiable Information

Documentation

aliases: PII Information about a person that can be used to compromise computer systems simply by masquerading as that person. #XIV

BitLocker ToGo

Documentation

A version of Windows-BitLocker that can be used for USB drives. #XIV

Windows BitLocker

Documentation

A Windows 10 Pro feature that allows for the encryption of entire hard drives. BitLocker utilizes the TPM chip installed on a system's motherboard. The TPM chip has to be at version 1.2+. While BitLocker can be enabled without the TPM chip installed, the boot ...

Standard ATX

Documentation

A form factor specification for motherboards, defining them as 9.6 x 12 inch motherboards, and the back panel being 6.25 x 1.75. The seven expansion slots are 0.8 inches apart. Power Supply Specifications 24 pin ATX power connector soft-power control (OS can...

NLX

Documentation

An uncommon form factor specification for defining motherboard sizes, using a unique back panel design that attaches to a riser card for more expansion slots. #III

Riser Card

Documentation

A hardware extension to a motherboard that allows for more expansion slots to be installed and connected to the system. #III

Hardware

Documentation

A reference to the physical devices and circuits that make up the different parts of a computer system.

Multifactor Authentication

Documentation

A form of user authentication that requires several methods instead of just one in order to grant access to secured property. There are three basic types of authentication: something you know (username/password; PIN) something you have (key; keycard; key fob)...

Password Policy

Documentation

A document that defines password requirements on company-owned systems. It specifies: Minimum length of a password (usually 8 char.) Character types required in a password (upper/lower; numbers; special characters/punctuation) How many failed attempts before ...

Physical Security Policy

Documentation

A document that defines restricted areas within company premises, identifies which employees are granted access to those restricted areas and outlines how that access is granted and under which terms access should be revoked. Authentication methods include: A...

Network Medium

Documentation

The physical channel through which data communications travel; the connecting method between network hosts. Network mediums can be divided into several categories: Bound-Media Unbound-Media Fiber-Optic-Media #III