SATA
A hard drive interface providing faster transfer times. it has thinner and more flexible cabling, and easier plug-and-play connections.
Serial bursts
In what way does SATA transfer data.
Network-Attached Storage (NAS)
A specialized storage device or group of storage devices providing centralized fault-tolerant data storage for a network.
Storage-Area Network (SAN)
A Specialized high-speed network of storage devices and switches connected to servers or computer systems. Supports centralized storage management.
Fibre Channel
Connects devices within the SAN and also connects the SAN to other networks.
Hardware RAID
Set of disks and a separate disk controller.
Software RAID
Software to implement and control RAID over virtually any type of hard disk.
RAID 0
Offers striping with no parity or mirroring.
RAID 1
Carries out mirroring or duplexing wherein the data present on a disk is copied onto one disk or a pair of disks.
RAID 5
Both data and parity information are striped across three or more drives. Good for large data transfers.
RAID 6
Two parity blocks are written in this level to help in the data recovery process. Good for small data transfers.
RAID 10
Minimum of four physical hard disks required, combines two raids for both performance and fault-tolerance.
Inputting the data
First even in the information processing cycle.
Input Device
Any peripheral device helping feed data and control signals to a compute system.
Output Device
Any peripheral hardware connected to the computer either using cables or over a wireless network that emits somthin.
Plotter
Creates a hard copy rendition of a digitally rendered design. Draws an image using a series of straight lines.
Blade technology
Allows for saving space and increasing the efficiency of the servers.
Backplane
Provides a central connection point for each blade.
Virtualization (Abstraction)
Separates Hardware from the Software
Mimic Physical Machines
VM’s have a BIOS, hard disks, memory, CPUs, OSs, and applications because they __________________
Hypervisor
Software that runs the virtual machines. It controls the interaction between the virtual machines and the hardware that is in the physical device.
Type 1
Referred to as bare-metal, runs directly on top of the system hardware.
Type 2
Referred to as hosted, runs on a hosted operating system that provides the virtualization services like input/output, device support, memory management, etc.
Examples of Type 1
XenServer, Microsoft Hyper-V, and VMware’s ESXi
Examples of Type 2
Oracle’s VirtualBox and VMWare’s Workstation
Application cells and containers.
Used to create a sandbox for applications, providing portability of the application as well as isolation from the OS.
Virtual Trusted Platform Module
Used to provide a high degree of security. Allows programs to interact with a TPM in a virtual system.
Trusted Platform Module
Uses a secure storage functionality and its underlying cryptographic methods are available to operating systems and applications.
Server Virtualization
Most common type of virtualization. It is the partitioning of a physical server into smaller virtual servers.
Host Server Operating System
Multiple operating systems installed on VMs can reside on the same host server.
Host Server Hardware
Faster and higher-capacity hard drives, better cooling, and a UPS
Server consolidation
Condense multiple physical servers into one server running many virtual machines.
Operating-System-Level Virtualization
Referred to as container virtualization, Single shared OS to host many users simultaneously.
Hardware Emulation
Well-established form of virtualization. Software presents a software representation of the underlying hardware an operating system would typically interact with.
Client Virtualization
Defined as a virtualization technology used to separate a desktop computer environment from the physical device used to access it. Lets multiple end users make use of a single host device.
Presentation Virtualization
Referred to as Terminal Services/Remote Desktop Services, most mature and most widely used client virtualization architecture. Applications run on a shared Windows servers hosted in a remote location. Only the applications user interface presented to the users desktop.
Virtual Desktop Infrastructure
Referred to as Server-Hosted Virtual Desktops, Shared infrastructure hosted in a central data center. Uses a standard desktop operating system running on a hypervisor.
Intelligent Desktop Virtualization
Referred to as Distributed-Desktop Virtualization. Retains a conventional desktop PC at the endpoint running a locally installed client hypervisor.
Application Virtualization/Streaming
Applications are packaged so they run inside a virtualization layer controlling access to the underlying operating system. Removing OS specific dependencies, extends application virtualization to the data center.
Cloud Computing
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Abstraction
Process in which specific details are hidden or ignored to simplify or generalize something.
On-Demand Self-Service
A consumer can get access to computing capabilities such as storage and server time is required, without any human interaction with a cloud service provider.
Broad Network Access
Hosted application should be reachable to any network device. Available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick clients.
Resource Pooling
Enables users to enter and use data within business management software hosted on the cloud at the same time, from any location and at any time. Multitenant model
Measured Service
Consumers only pay for the resources they consume.
Rapid Elasticity
Cloud is flexible, scalable, and users can quickly and easily add or remove software features and other resources.
Software as a Service (SaaS)
Different types of applications are offered to the customers as a service on-demand.
Platform as a Service (PaaS)
A layer of software or development environment is encapsulated and offered as a service over which other higher levels of services can be built. Generally used by developers.
Infrastructure as a Service (IaaS)
Basic computing capabilities and storage as standardized services over the network.
Public Cloud
Cloud infrastructure is open for use by the general public. Gives each individual clients an attractive low-cost, “pay-as-you-go” model.
Private Cloud
Built exclusively for a single enterprise, addresses concerns on data security and offer greater control.
On-premise Private Cloud
Called internal clouds, are hosted within one’s own data center, limited in size and scalability.
Externally hosted Private Cloud
Facilitated with an exclusive cloud environment with a full guarantee of privacy and security. Hosted externally with a cloud provider.
Hybrid Cloud
Combination of private and public clouds.
Community Cloud
Multi-tenant cloud service model, it is a hybrid form of private cloud built and operated specifically for a targeted organization and communities.
Personal Cloud
Small server in a a home or small network that can be accessed over the internet.
Advantages of cloud computing
Cost Efficient, Unlimited Storage, Backup and Recovery, Automatic Software Integration, Easy Access to Information, Quick Deployment, and Scalability.
Disaster
A sudden, unplanned event that causes great damage and loss to an organization.
Disaster Recovery
Your IT response to a sudden, unplanned event, which will enable your organization to continue critical business functions until normal IT-related services can resume.
Continuity Planning
The ability to continue critical functions and processes during and after an emergency event.
Contingency Planning
Information systems and provides the steps needed to recover the operation of all or part of designated information systems at an existing or new location in an emergency.
Continuity of Operations Plan (COOP)
Provides procedures and guidance to sustain an organizations MEFs at an alternate site for up to 30 days.
Disaster Recovery Plan (DRP)
Provides procedures for relocating information systems operations to an alternate location.
Information System Contingency Plan (ISCP)
Provides procedures and capabilities for recovering an information system.
Cyber Incident Response Plan (CISR)
Provides procedures for mitigating and correcting a cyber-attack, such as a virus, worm, or trojan.
Business Continuity Plan (BCP)
Provides procedures for sustaining mission/business operations while recovering from a significant disruption.
Occupant Emergency Plan (OEP)
Provides coordinated procedures for minimizing loss of life or injury and protecting property damage in response to a physical threat.
Information
Your organization’s most valuable asset.
Data Backup Strategy
Goal of all data backup jobs is to ensure lost data, no matter how it got lost, can be recovered quickly, efficiently and as completely as possible.
Full Data Backup
Starting point for all other backups, contains all files and folders. Entire data set is copied and afterwards unchecks the file’s archive bit.
Incremental Data Backup
Processes only new files or files changed since the last full or incremental backup. Saves only those files whose archive bit is checked, then unchecks the bit.
Differential Data Backup
Copies only selected files and folders changed since the last full backup as indicated by the archive flag, does not uncheck the archive flag for files.
Faster restoration of data
Differential backups have ________________ as compared to incremental backups.
Priority Restoration Plan
Certain network systems and devices are of primary consideration in a contingency backup and restoration plan, as such this may be a requirement to follow during an established contingency plan.
Cold Site
Consists of a facility with adequate space and infrastructure to support the IT system. Does not contain IT equipment.
Warm Site
Partially equipped office spaces containing some or all of the system hardware, software, telecommunications, and power sources. May need to be prepared before receiving the system and recovery personnel.
Hot Site
Office spaces appropriately sized to support system requirements and fully configured, ready to operate in a few hours. Only missing data and personnel.
Mirrored Site
One site is equipped and configured exactly like the primary site. It is a redundant environment owned by the organization.
Mobile Hot Site
Large truck or trailer turned into a data processing or systems allowing for immediate processing.
Multiple Processing Centers
Able to move all data processing from one facility to another in a matter of seconds when an interruption is detected.
Hotbox/Recovery box
Tool to help aid in the process for disaster recovery, up-to-date copy of the disaster recovery plan, all server software infrastructure components, and the recovery CDs.
Unscheduled Service Interruptions (USI)
Unscheduled network, equipment, or application outages or degradations caused by such things as environment problems, equipment malfunctions, system crashes, etc.
Uninterruptable Power Supplies (UPS)
Critical component of the server room’s power-support system. A ‘battery backup’ maintains a continuous supply of electrical power to all connected equipment in the event of a power irregularities.