Study sets, textbooks, questions
Upgrade to remove ads
Logz.Io terms to know
This is a list of terms that you should be familiar with in any role within logz!
Terms in this set (98)
Active Directory (AD)
Microsoft's directory sevice, which is a central database of all network resources, is used to manage the network and provide users with access to resources.
Agile methodology is a set of techniques, values, and principles designed to guide how software development teams work together to deliver new applications and updates.
AIOps (Artificial Intelligence Operations)
AIOps (artificial intelligence for IT operations) is the use of artificial intelligence, machine learning, and pattern recognition to perform and automate tasks.
Application lifecycle management (ALM)
the set of activities that revolve around a new software product, from its inception to when the product matures, service, maintenance, and perhaps when it retires.
The process of moving an app, along with all of the data and servers, from environment to environment.
Application Performance Monitoring (APM)
Tools that capture data, aggregate and analyze data to detect patterns and present actionable insights in an understandable/readable format.
Application Programming Interface (API)
A specified communication protocol that allows two applications to interface with each other, or for a client application to access information with another application.
Catch-all term that encompasses any security measures deployed at an application level of an org's tech stack.
Common method used by IT orgs to secure on-prem and cloud-based networks and infrastructure against malicious cyber attacks and unwanted network penetration.
The path or means by which an attacker gains access to a computer or any target system.
A security credential that is used to verify the identity and authorization of a user attempting to gain access or request data from a secured network.
Methodology for releasing new code into the production environment whose purpose is to reduce software downtime.
the use of current business data to solve business problems and discover/interpret patterns using mathematical analysis, statistics, predictive modeling, and other investigative tools.
Business Intelligence (BI)
a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions.
Containers as a Service (CaaS)
A category of cloud services where the service provider offers customers the ability to manage and deploy containerized application and clusters.
Cloud Access Security Broker (CASB)
A software application that mediates user access to cloud-based application. CASB tools can be hosted on-premises or in the cloud.
Content Delivery Network (CDN)
An information system that serves content to Web pages over the Internet. To reduce wait time, data is typically stored and served from many geographic locations. It is a tool for optimizing the performance of these heavily-trafficked websites and applications deployed in cloud environments.
Simply refers to any software application that is deployed in a cloud environment rather than being hosted on a local server or machine.
Practice of using specialized software and methodologies to automate the manual tasks associated with managing cloud-based IT infrastructure.
The delivery of computer system resources, including applications, virtual machines, containers, data storage and processing power over the internet.
The process of maintaining oversight and administrative control of cloud computing products and services.
To help IT organizations manage interconnections and interactions between disparate systems in increasingly complex cloud environments.
Avirtualized environment whose contents are an application and all of the files, libraries, binaries and dependencies needed to execute that application
Continuous Deployment (CD)
A strategy where any new code change is deployed directly into the live production environment where it will be visible to customers.
The set of policies, processes, procedures, and tools that prevent unauthorized access to their networks, servers, and data storage.
Database Management System (DBMS)
Creates, reads, updates, administers, and deletes data in a database while controlling access and security.
A set of practices that combines software development and IT operations. It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.
Keeping details (like data and procedures) together in one part of a program so that programmers working on other parts of the program don't need to know about them.
A set of security procedures and technologies designed to restrict network access at a device level.
Enterprise Application Integration (EAI)
Connects the plans, methods, and tools aimed at integrating separate enterprise systems.
Function as a Service (FaaS)
A cloud service model that supports serverless software architecture by provisioning runtime containers in which code is executed in a particular programming language
includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability
IIS Log Viewer
Log Viewer is a software application whose function is to streamline the process of viewing log files from an IIS web server (an extensible web server that was created by Microsoft to be used on Windows operating systems)
The process of responding to a security incident. Organizations often create an incident response plan that outlines the procedures to be used when responding to an incident.
indicators of compromise (IOCs)
Indications that a system has been compromised by unauthorized activity and further investigation of the incident is necessary.
Information Security Management
The set of policies and procedural controls that organizations implement to secure their informational assets against threats.
Infrastructure as a Service (IaaS)
Delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model.
Infrastructure as Code (IaC)
Refers to the increasingly common practice of provisioning and managing IT infrastructure using coding.
Infrastructure Management (IM)
The management of processes, equipment, data, human resources and external contacts needed to ensure that operations run smoothly and efficiently.
A business process of collecting and analyzing data from the IT infrastructure to leverage that data to improve business results.
the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals from a technology standpoint.
In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software.
In software development a metric is the measurement of a particular characteristic of a programs performance or efficiency.
Also Distributed Tracing; a method for IT and DevOps teams to monitor applications, especially those composed of microservices. Distributed tracing helps pinpoint where failures occur and what causes suboptimal performance.
The practice of gathering up disparate log files for the purposes of organizing the data in them and making them searchable.
the process of examining logs to identify evidence of possible attacks or other issues.
Digital information that is automatically created by the activities and operations of networked devices, including computers, phones, and more.
A programming technique used to automate the construction of analytical models and enable applications to perform specified tasks more efficiently.
Managed Detection and Response (MDR)
Security service that helps organizations detect malicious network activity and quickly respond to eliminate the threat.
Security Information and Event Management - offer businesses the ability to collect, store, and analyze security information from across their organization and alert IT admins/security teams to potential attacks.
A software architecture that is composed of smaller modules that interact through APIs and can be updated without affecting the entire system.
The National Institute of Standards and Technology (NIST) produces guidance on security information and event management through lists of required controls to meet at different levels of security. d
The ability to understand what is happening inside of a system from the knowledge of its external outputs.
Platform as a Service (PaaS)
A model of cloud service delivery where a cloud service provider delivers some hardware and software tools to customers over the internet.
In programming languages and type theory, polymorphism is the provision of a single interface to entities of different types or the use of a single symbol to represent multiple different types.
An on-prem or off-prem deployment model for cloud services where the cloud environment and infrastructure is dedicated to providing services for a single organization.
The use of data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities
Display data in real-time, providing the most up-to-date information on a variety of performance metrics.
Role-Based Access Control (RBAC)
In computer systems security, role-based access control or role-based security is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control or discretionary access control.
Root Cause Analysis (RCA)
A method of problem solving used for identifying the root causes of faults or problems. It is widely used in IT operations, telecommunications, industrial process control, accident analysis, medicine, healthcare industry, etc.
Software as a Service (SaaS)
The delivery of applications over the cloud using a pay-per-use revenue model
The leading agile development methodology for completing projects with a complex, innovative scope of work to produce quality results while quickly adapting as needed.
The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks. Often known as a methodology that IT managers implement to enhance the connection, collaboration, and communication between IT security and IT operations teams.
Security Intelligence Operations (SIO)
The "brains" that distinguish good traffic from malicious traffic. This encompasses multi-terabyte traffic monitoring databases, thousands of servers in multiple data centers, and hundreds of engineers and technicians with a single purpose — identifying and stopping malicious traffic.
An approach to dealing with large volumes of computer-generated log messages. Log management generally covers: Log collection, Centralized log aggregation, Long-term log storage and retention, Log rotation, Log analysis, Log search and reporting.
All of the steps, processes, and activities that are required to make a software system or update available to its intended users.
Software Life Cycle
The application of standard business practices to building software applications. It's typically divided into six to eight steps: Planning, Requirements, Design, Build, Document, Test, Deploy, Maintain.
The set of components that work together to support the execution of the application, which power back-end and front-end processes, as well as interfaces.
The practice of implementing a consistent, predetermined message format for application logs that allows them to be treated as data sets rather than text.
All of the hardware and software systems put together to run a company's org, website, app, etc.
Threat Detection and Response
utilizing big data analytics to find threats across large and disparate data sets. The objective is to find anomalies, analyze their threat level, and determine what mitigative action(s) may be required in response.
Managed Security Service Provider (MSSP)
A company that monitors, manages, reports on, protects and maintains computer security, security systems, and network security for other organizations.
Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level- can be done in-house or outsourced.
Web Application Development
Describes the process of designing, building, testing and deploying web-based applications delivered to users or customers via the internet.
Virtual Private Network (VPN)
A private data network that creates secure connections, or "tunnels," over regular Internet lines connecting you to your private network/device.
An open-source toolset made up of Elasticsearch, Beats, Logstash, Kibana to reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Amazon Web Services (AWS)
A subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis.
A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.
A set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels.
An open-source container-orchestration system for automating computer application deployment, scaling, and management.
OpenTelemetry is a collection of tools, APIs, and SDKs. You can use it to instrument, generate, collect, and export telemetry data (metrics, logs, and traces) for analysis in order to understand your software's performance and behavior.
Computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose.
Also known as non-free software or closed-source software, is computer software for which the software's publisher or another person reserves some rights from licenses to use, modify, share modifications, or share the software.
Behind-the-scenes digital operations that it takes to keep the front end of a website, app, software, etc running. Includes coding, styling, plug-ins, etc.
Customer Relationship Management tool (CRM)
Technology for managing all your company's relationships and interactions with customers and potential customers.
A precise sequence of instructions for processes that can be executed by a computer or a methodical, logical rule or procedure that guarantees solving a particular problem.
A fault or defect in a computer program, system, or machine.
The use of computer programming languages to give computers and machines a set of instructions on what actions to perform.
Central Processing Unit (CPU)
executes commands from a computer's hardware and software; the principal computer chip that contains several processing components, which determines the computer's operating speed; the "brain" of a computer
Facility used to house computer systems, servers, and associated components, such as telecommunications and storage systems.
Security measure of manipulating data to prevent accurate interpretation by anyone except for who the data is intended for.
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Can be implemented in both hardware & software.
A free software application used for event monitoring and alerting. It records real-time metrics in a time series database built using a HTTP pull model, with flexible queries and real-time alerting.
A multi-platform open source analytics and interactive visualization web application. It provides charts, graphs, and alerts for the web when connected to supported data sources.
Refers to the measure of a product's performance, to diagnose errors, and to write trace information. Instrumentation can be of two types: source instrumentation and binary instrumentation. Implemented in the form of code instructions to monitor specific components in a system.
Mean Time to Repair (MTTR)
The average amount of time a computer repair technician needs to resolve the cause of a failure through replacement or repair of a faulty component or device.
To parse is to analyze something in an orderly way. A parser is a software component that takes input data (frequently text) and builds a data structure - often some kind of parse tree, abstract syntax tree or other hierarchical structure, giving a structural representation of the input while checking for correct syntax.
Integrated Development Environment (IDE)
A collection of programs that support software development, such as debuggers, editors, toolkits, and libraries, that lets programmers perform several tasks within the shell of a single application.
Sets with similar terms
Cloud terms - Operation Altus
MGSC-300 Exam 1
zBonus 1 - CCSP/CCSK - Certified Cloud S…
Other Quizlet sets
Med Surg Final
AC Fundamentals Yr 2 (Book 2)
CALIFORNIA DRIVER'S STUDY GUIDE
Physiology Ch. 7