Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Networks
Logz.Io terms to know
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
This is a list of terms that you should be familiar with in any role within logz!
Terms in this set (98)
Active Directory (AD)
Microsoft's directory sevice, which is a central database of all network resources, is used to manage the network and provide users with access to resources.
Agile Methodology
Agile methodology is a set of techniques, values, and principles designed to guide how software development teams work together to deliver new applications and updates.
AIOps (Artificial Intelligence Operations)
AIOps (artificial intelligence for IT operations) is the use of artificial intelligence, machine learning, and pattern recognition to perform and automate tasks.
Application lifecycle management (ALM)
the set of activities that revolve around a new software product, from its inception to when the product matures, service, maintenance, and perhaps when it retires.
Application Migration
The process of moving an app, along with all of the data and servers, from environment to environment.
Application Performance Monitoring (APM)
Tools that capture data, aggregate and analyze data to detect patterns and present actionable insights in an understandable/readable format.
Application Programming Interface (API)
A specified communication protocol that allows two applications to interface with each other, or for a client application to access information with another application.
Application Security
Catch-all term that encompasses any security measures deployed at an application level of an org's tech stack.
Application Whitelisting
Common method used by IT orgs to secure on-prem and cloud-based networks and infrastructure against malicious cyber attacks and unwanted network penetration.
Attack Vector
The path or means by which an attacker gains access to a computer or any target system.
Authentication Factors
A security credential that is used to verify the identity and authorization of a user attempting to gain access or request data from a secured network.
Blue-Green Deployment
Methodology for releasing new code into the production environment whose purpose is to reduce software downtime.
Business Analytics
the use of current business data to solve business problems and discover/interpret patterns using mathematical analysis, statistics, predictive modeling, and other investigative tools.
Business Intelligence (BI)
a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions.
Containers as a Service (CaaS)
A category of cloud services where the service provider offers customers the ability to manage and deploy containerized application and clusters.
Cloud Access Security Broker (CASB)
A software application that mediates user access to cloud-based application. CASB tools can be hosted on-premises or in the cloud.
Content Delivery Network (CDN)
An information system that serves content to Web pages over the Internet. To reduce wait time, data is typically stored and served from many geographic locations. It is a tool for optimizing the performance of these heavily-trafficked websites and applications deployed in cloud environments.
Cloud Application
Simply refers to any software application that is deployed in a cloud environment rather than being hosted on a local server or machine.
Cloud Automation
Practice of using specialized software and methodologies to automate the manual tasks associated with managing cloud-based IT infrastructure.
Cloud Computing
The delivery of computer system resources, including applications, virtual machines, containers, data storage and processing power over the internet.
Cloud Management
The process of maintaining oversight and administrative control of cloud computing products and services.
Cloud Orchestration
To help IT organizations manage interconnections and interactions between disparate systems in increasingly complex cloud environments.
Container
Avirtualized environment whose contents are an application and all of the files, libraries, binaries and dependencies needed to execute that application
Continuous Deployment (CD)
A strategy where any new code change is deployed directly into the live production environment where it will be visible to customers.
Data Security
The set of policies, processes, procedures, and tools that prevent unauthorized access to their networks, servers, and data storage.
Database Management System (DBMS)
Creates, reads, updates, administers, and deletes data in a database while controlling access and security.
DevOps
A set of practices that combines software development and IT operations. It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.
Encapsulation
Keeping details (like data and procedures) together in one part of a program so that programmers working on other parts of the program don't need to know about them.
Endpoint Security
A set of security procedures and technologies designed to restrict network access at a device level.
Enterprise Application Integration (EAI)
Connects the plans, methods, and tools aimed at integrating separate enterprise systems.
Function as a Service (FaaS)
A cloud service model that supports serverless software architecture by provisioning runtime containers in which code is executed in a particular programming language
Hybrid Cloud
includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability
IIS Log Viewer
Log Viewer is a software application whose function is to streamline the process of viewing log files from an IIS web server (an extensible web server that was created by Microsoft to be used on Windows operating systems)
Incident Response
The process of responding to a security incident. Organizations often create an incident response plan that outlines the procedures to be used when responding to an incident.
indicators of compromise (IOCs)
Indications that a system has been compromised by unauthorized activity and further investigation of the incident is necessary.
Information Security Management
The set of policies and procedural controls that organizations implement to secure their informational assets against threats.
Infrastructure as a Service (IaaS)
Delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model.
Infrastructure as Code (IaC)
Refers to the increasingly common practice of provisioning and managing IT infrastructure using coding.
Infrastructure Management (IM)
The management of processes, equipment, data, human resources and external contacts needed to ensure that operations run smoothly and efficiently.
Infrastructure Monitoring
A business process of collecting and analyzing data from the IT infrastructure to leverage that data to improve business results.
IT infrastructure
the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals from a technology standpoint.
Logs
In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software.
Metrics
In software development a metric is the measurement of a particular characteristic of a programs performance or efficiency.
Tracing
Also Distributed Tracing; a method for IT and DevOps teams to monitor applications, especially those composed of microservices. Distributed tracing helps pinpoint where failures occur and what causes suboptimal performance.
Log Aggregation
The practice of gathering up disparate log files for the purposes of organizing the data in them and making them searchable.
Log Analysis
the process of examining logs to identify evidence of possible attacks or other issues.
Machine Data
Digital information that is automatically created by the activities and operations of networked devices, including computers, phones, and more.
Machine Learning
A programming technique used to automate the construction of analytical models and enable applications to perform specified tasks more efficiently.
Managed Detection and Response (MDR)
Security service that helps organizations detect malicious network activity and quickly respond to eliminate the threat.
Cloud SIEM
Security Information and Event Management - offer businesses the ability to collect, store, and analyze security information from across their organization and alert IT admins/security teams to potential attacks.
Microservices
A software architecture that is composed of smaller modules that interact through APIs and can be updated without affecting the entire system.
NIST Compliance
The National Institute of Standards and Technology (NIST) produces guidance on security information and event management through lists of required controls to meet at different levels of security. d
Observability
The ability to understand what is happening inside of a system from the knowledge of its external outputs.
Platform as a Service (PaaS)
A model of cloud service delivery where a cloud service provider delivers some hardware and software tools to customers over the internet.
Polymorphism
In programming languages and type theory, polymorphism is the provision of a single interface to entities of different types or the use of a single symbol to represent multiple different types.
Private Cloud
An on-prem or off-prem deployment model for cloud services where the cloud environment and infrastructure is dedicated to providing services for a single organization.
Predictive Analysis
The use of data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities
Real-time Dashboard
Display data in real-time, providing the most up-to-date information on a variety of performance metrics.
Role-Based Access Control (RBAC)
In computer systems security, role-based access control or role-based security is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control or discretionary access control.
Root Cause Analysis (RCA)
A method of problem solving used for identifying the root causes of faults or problems. It is widely used in IT operations, telecommunications, industrial process control, accident analysis, medicine, healthcare industry, etc.
Software as a Service (SaaS)
The delivery of applications over the cloud using a pay-per-use revenue model
Scrum
The leading agile development methodology for completing projects with a complex, innovative scope of work to produce quality results while quickly adapting as needed.
SecOps
The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks. Often known as a methodology that IT managers implement to enhance the connection, collaboration, and communication between IT security and IT operations teams.
Security Intelligence Operations (SIO)
The "brains" that distinguish good traffic from malicious traffic. This encompasses multi-terabyte traffic monitoring databases, thousands of servers in multiple data centers, and hundreds of engineers and technicians with a single purpose — identifying and stopping malicious traffic.
Log Management
An approach to dealing with large volumes of computer-generated log messages. Log management generally covers: Log collection, Centralized log aggregation, Long-term log storage and retention, Log rotation, Log analysis, Log search and reporting.
Software Development
All of the steps, processes, and activities that are required to make a software system or update available to its intended users.
Software Life Cycle
The application of standard business practices to building software applications. It's typically divided into six to eight steps: Planning, Requirements, Design, Build, Document, Test, Deploy, Maintain.
Software Stack
The set of components that work together to support the execution of the application, which power back-end and front-end processes, as well as interfaces.
Structured Logging
The practice of implementing a consistent, predetermined message format for application logs that allows them to be treated as data sets rather than text.
Technology Stack
All of the hardware and software systems put together to run a company's org, website, app, etc.
Threat Detection and Response
utilizing big data analytics to find threats across large and disparate data sets. The objective is to find anomalies, analyze their threat level, and determine what mitigative action(s) may be required in response.
Managed Security Service Provider (MSSP)
A company that monitors, manages, reports on, protects and maintains computer security, security systems, and network security for other organizations.
Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level- can be done in-house or outsourced.
Web Application Development
Describes the process of designing, building, testing and deploying web-based applications delivered to users or customers via the internet.
Virtual Private Network (VPN)
A private data network that creates secure connections, or "tunnels," over regular Internet lines connecting you to your private network/device.
ELK Stack
An open-source toolset made up of Elasticsearch, Beats, Logstash, Kibana to reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Amazon Web Services (AWS)
A subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis.
Microsoft Azure
A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.
Docker
A set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels.
Kubernetes
An open-source container-orchestration system for automating computer application deployment, scaling, and management.
OpenTelemetry
OpenTelemetry is a collection of tools, APIs, and SDKs. You can use it to instrument, generate, collect, and export telemetry data (metrics, logs, and traces) for analysis in order to understand your software's performance and behavior.
Open-source Software
Computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose.
Proprietary software
Also known as non-free software or closed-source software, is computer software for which the software's publisher or another person reserves some rights from licenses to use, modify, share modifications, or share the software.
Back End
Behind-the-scenes digital operations that it takes to keep the front end of a website, app, software, etc running. Includes coding, styling, plug-ins, etc.
Customer Relationship Management tool (CRM)
Technology for managing all your company's relationships and interactions with customers and potential customers.
Algorithm
A precise sequence of instructions for processes that can be executed by a computer or a methodical, logical rule or procedure that guarantees solving a particular problem.
Bug
A fault or defect in a computer program, system, or machine.
Coding
The use of computer programming languages to give computers and machines a set of instructions on what actions to perform.
Central Processing Unit (CPU)
executes commands from a computer's hardware and software; the principal computer chip that contains several processing components, which determines the computer's operating speed; the "brain" of a computer
Data Center
Facility used to house computer systems, servers, and associated components, such as telecommunications and storage systems.
Encryption
Security measure of manipulating data to prevent accurate interpretation by anyone except for who the data is intended for.
Firewall
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Can be implemented in both hardware & software.
Prometheus
A free software application used for event monitoring and alerting. It records real-time metrics in a time series database built using a HTTP pull model, with flexible queries and real-time alerting.
Grafana
A multi-platform open source analytics and interactive visualization web application. It provides charts, graphs, and alerts for the web when connected to supported data sources.
Instrumentation
Refers to the measure of a product's performance, to diagnose errors, and to write trace information. Instrumentation can be of two types: source instrumentation and binary instrumentation. Implemented in the form of code instructions to monitor specific components in a system.
Mean Time to Repair (MTTR)
The average amount of time a computer repair technician needs to resolve the cause of a failure through replacement or repair of a faulty component or device.
Parsing
To parse is to analyze something in an orderly way. A parser is a software component that takes input data (frequently text) and builds a data structure - often some kind of parse tree, abstract syntax tree or other hierarchical structure, giving a structural representation of the input while checking for correct syntax.
Integrated Development Environment (IDE)
A collection of programs that support software development, such as debuggers, editors, toolkits, and libraries, that lets programmers perform several tasks within the shell of a single application.
Sets with similar terms
Cloud terms - Operation Altus
41 terms
MGSC-300 Exam 1
92 terms
zBonus 1 - CCSP/CCSK - Certified Cloud S…
345 terms
Chapter 8
32 terms
Other Quizlet sets
Med Surg Final
195 terms
AC Fundamentals Yr 2 (Book 2)
92 terms
CALIFORNIA DRIVER'S STUDY GUIDE
224 terms
Physiology Ch. 7
172 terms