Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

614 total results found

Dynamic Host Configuration Protocol

Documentation

aliases: DHCP A system that automatically sets and manages network connection configuration settings for incoming hosts. DHCP removes the need to manually configure the network connection settings of an incoming host, as some do when managing small network...

Access Gateway

Documentation

The second IoT layer. Refers to the point where the analog/physical data captured by the edge technology is converted into digital data and prepared for communication over the Internet. #XI

Internet

Documentation

The global computer network that communicates via standardized protocols. The third IoT layer. Refers to the main bridge between endpoints in an IoT system. This is the point that the data prepared by the access gateway is sent. The Internet is what connects d...

Middleware

Documentation

The fourth IoT layer. Refers to the processing that happens after data captured and prepared by the edge technology and access gateway is received by the cloud. Here: in-depth processing data management device management data aggregation data filtering device...

Printer

Documentation

A type of hardware that converts image and text files on a system and prints them onto a piece of paper. Printers are also peripheral devices. Types of printers include: Laser Printer Second-Impact-Dot-Printers 13.3.5 3D Printers #II

Access Control List

Documentation

aliases: ACL The most basic rulebook used in firewalls. Note: access control lists process rules from top to bottom. When making ACL rules, make sure that the most important rules pointed towards the top. #XIV

Firewall

Documentation

A hardware device or software program that monitors and filters incoming and outgoing network traffic depending on rules. Features traffic type detection source & destination address-port logging usage of an ACL packet filtering (based on destination or type ...

Windows Network Locations

Documentation

An enumeration of the network location profiles used in Microsoft Windows. They're used to set default network privacy settings for a host running Windows. Private all other users and devices are known and trusted network discovery is enabled files and printe...

Network Address Translation

Documentation

A network protocol that is used to allow multiple computers to share a single public IP address for use over the Internet. NAT is required to be enabled on the default gateway for hosts on the internal network to access the Internet. NAT was designed to limit ...

Backup Policy

Documentation

The type of security policy that dictates how data backups are run at an organization. This includes information like: the type of backup that's performed who is permitted to access the restricted/secure areas where the backup data is stored how access is gra...

Asset Management Database

Documentation

A database that stores information about assets procured and owned by an organization. Asset management databases track and optimize the performance, utilization, and lifecycle of assets. They are used to gather information regarding availability, configuratio...

Brownout

Documentation

Undervoltage that lasts seconds (lights may dim)

Blackout

Documentation

Complete power failure.

Knowledge Base

Documentation

A web-based collection of articles and documents related to an organization's FAQ. This collection is accessible by both the company's technicians and their end users. The knowledge base is used to: find/provide simple self-troubleshooting info changing a pa...

Acceptable Use Policy

Documentation

aliases: AUP A security policy that dictates how an employee is permitted to use company property. Items that can be listed under company property can include, but are not limited to: computer equipment computer data storage company Internet access compan...

User Education & Awareness Policy

Documentation

A security policy that dictates a set of Internet safety guidelines that employees should follow to prevent attacks and to avoid unsafe behaviors. #II

Network Node

Documentation

Any hardware device that can connect to a computer network and interact with other devices connected on that network. #XI

Common Internet File System

Documentation

aliases: CIFS A network file system protocol that allows user to access files and printers over a network. CIFS is based on SMB. #XI