Advanced Search
Search Results
614 total results found
Crosstalk
A form of interference where signals transmitted on one cable escape and damage signals being transmitted on another cable. #II
Virtual Container
An alternative to virtual machines, which runs consistent runtime environments for specific programs instead of an entire OS. Virtual containers are initialized using a special software called a container engine. It runs the set program in an isolated manner, ...
Capacitor
A hardware device that stores an electrical charge. The basis for all computer systems. #II
Virtual Desktop Infrastructure
aliases: VDI A type of virtualization that uses remote connection to run multiple operating systems concurrently on a machine. VDI uses a connection between the host machine and a remote device, casting the guest OS to the remote device while processing ev...
Transparent Data Encryption
A form of database encryption that encrypts the entire database and all of its backups. TDE is typically used when the data is at rest - when it's not being actively used. When an authorized user wants to access the data, it's automatically decrypted so that t...
Column Level Encryption
A form of database encryption that allows the database administrator to encrypt each column or section of the database using different access keys. CLE increases the encryption level since multiple access keys are required to view all the data, but the perform...
Application Level Encryption
A form of database encryption where the program that's used to create and manage the stored data is also responsible for encrypting it. ALE works well because the data is encrypted even before it reaches the database for storage. The only drawback is that the ...
Personally Identifiable Information
aliases: PII Information about a person that can be used to compromise computer systems simply by masquerading as that person. #XIV
BitLocker ToGo
A version of Windows-BitLocker that can be used for USB drives. #XIV
Windows BitLocker
A Windows 10 Pro feature that allows for the encryption of entire hard drives. BitLocker utilizes the TPM chip installed on a system's motherboard. The TPM chip has to be at version 1.2+. While BitLocker can be enabled without the TPM chip installed, the boot ...
Standard ATX
A form factor specification for motherboards, defining them as 9.6 x 12 inch motherboards, and the back panel being 6.25 x 1.75. The seven expansion slots are 0.8 inches apart. Power Supply Specifications 24 pin ATX power connector soft-power control (OS can...
NLX
An uncommon form factor specification for defining motherboard sizes, using a unique back panel design that attaches to a riser card for more expansion slots. #III
Riser Card
A hardware extension to a motherboard that allows for more expansion slots to be installed and connected to the system. #III
Hardware
A reference to the physical devices and circuits that make up the different parts of a computer system.
Multifactor Authentication
A form of user authentication that requires several methods instead of just one in order to grant access to secured property. There are three basic types of authentication: something you know (username/password; PIN) something you have (key; keycard; key fob)...
Password Policy
A document that defines password requirements on company-owned systems. It specifies: Minimum length of a password (usually 8 char.) Character types required in a password (upper/lower; numbers; special characters/punctuation) How many failed attempts before ...
Physical Security Policy
A document that defines restricted areas within company premises, identifies which employees are granted access to those restricted areas and outlines how that access is granted and under which terms access should be revoked. Authentication methods include: A...
Network Medium
The physical channel through which data communications travel; the connecting method between network hosts. Network mediums can be divided into several categories: Bound-Media Unbound-Media Fiber-Optic-Media #III