eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 74 of 82

70 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. command-and-control (C2): Communications traffic between malware and/or compromised systems and an attacker's remote server infra- structure used to send and receive malicious commands or exfiltrate data. continuous delivery: Software code in a CI pipeline must go through manual technical checks before it is implemented in production. See also continuous integration (CI). continuous deployment (CD): Software code in a CI pipeline passes automated testing rather than manual checks (as in continuous delivery) is automatically deployed, giving customers instant access to new features. See also continuous delivery and continuous integration (CI). continuous integration (CI): An automated software development pipeline which requires developers to integrate code into a repository frequently (for example, several times per day) for automated testing. Each check-in is verified by an automated build, allowing teams to detect problems early. Control Panel File (CPL): The filename extension for Control Panel items in Microsoft Windows. cryptocurrency: A form of digital currency, such as Bitcoin, that uses encryption to control the creation of currency and verify the transfer of funds independent of a central bank or authority. DevOps: The culture and practice of improved collaboration between software developers and IT operations. distributed denial-of-service (DDoS): An attack in which the attacker initiates simultaneous denial-of-service attacks from many systems (potentially tens of thousands), typically bots in a botnet, with the intention of making the system or network unavailable for use. See also botnet. DNS hijacking: An attack technique which incorrectly resolves DNS queries to redirect victims to malicious sites. Also known as DNS redirection. See also Domain Name System (DNS). DNS tunneling: An attack technique that exploits the DNS protocol to tunnel malware and other data through a network. See also Domain Name System (DNS). domain generation algorithm (DGA): A program developed by attackers that generates semi-random domain names so that malware can quickly generate a list of domains that it can use for C2 communica- tions. See also command-and-control (C2).

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies