1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
client side
runs in browser
server side
Runs on server.
Relative
based on current location
absolute
full path or URL.
TCO(total cost ownership)
Total direct and indirect costs.
Pros of cloud services
Scalability, cost-effective
ER Diagrams
Visual representation of database entities and relationships.
Primary Keys
Unique identifiers for table entries.
SQL
Language for database management and queries.
Poka Yoke
Design processes to prevent mistakes.
Sources of Data
Databases and logs.
Neural Networks/Machine Learning
AI systems that learn from data.
Push publishing
sent to user automatically
Pull publishing
user requests info.
Big data
Extremely large data sets analyzed for trends.
risk vs cost curve
Balance between security investment and risk.
CIA Triad
Confidentiality, Integrity, Availability.
Ways to Respond to Risk
Avoid, Accept, Transfer, Mitigate.
4 A’s of Risk
Authentication, Authorization, Accounting, Auditing.
Replication
live copy
Backups
saved data snapshots.
Synchronous replication
instant write to all nodes
asynchronous treplication
delay in replication.
RTO( recovery time objective)
Maximum allowable downtime.
RPO (Recovery Point Objective)
Maximum acceptable data loss (in time).
DDoS:
Multiple computers overwhelming a server.
SQL Injection
It's a security vulnerability that allows unauthorized access to or manipulation of data by entering harmful input.
Brute Force
Trying many username/password combinations.
Man-in-the-Middle
Fake site intercepting user data.
social Engineering:
Tricking people to gain access.
Private/Public Key Encryption
Encrypt with public key, decrypt with private key.
PCI Compliance
Secure handling of credit card information.
Risk Maps
Visual tools plotting risks by likelihood and impact.
Infrastructure/Operations
Backend support like servers and networking.
Development
Programmers building software.
Business
Process improvement, project management.
Security
Cybersecurity and auditing.
Support
Help desk and technical support services.
ITIL
Framework for IT service management, not strict rules.
service catalog
Menu listing available IT services.
KMS (Knowledge Management System)
Documented solutions for tech issues.
SOP (Standard Operating Procedure)
Step-by-step process instructions.
CAB (Change Advisory Board)
Reviews/approves IT changes.
RACI Charts
Define who is Responsible, Accountable, Consulted, and Informed.
CMDB (Configuration Management Database)
Database of IT assets and configurations.
Incident Request
problem to fix
Service request
something user asks for.
Problem Management
Finding and solving recurring IT issues.
IaaS (Infrastructure as a Service)
Renting basic IT resources like servers, storage, and networking.
PaaS (Platform as a Service)
Renting a platform where you can build and run your apps without managing servers.
SaaS (Software as a Service)
renting ready-to-use software over the internet.
SLA (Service Level Agreement)
A contract between a service provider and a customer that defines expected service levels (like uptime, response time).
OLA (Operational Level Agreement)
An internal agreement between parts of a company that support the SLA.
Page/Swap Files
Used when RAM fills up — moves data temporarily to hard disk.
CapEx (Capital Expenditure)
Big, upfront purchases for assets you own long-term.
OpEx (Operating Expenditure)
Ongoing expenses you pay as you go.