expand for answer

Backbone network

A network that interconnects various computer networks and mainframe computers in an enterprise. The backbone provides the structure through which computers communicate.

Similar items:
The term “computer forensics” was coined in 1991 in the first training session held by the International Association of Computer Specialists (IACIS) in Portland, Oregon. Since then, computer forensics has become a popular topic in computer security circles and in the legal community. Like any other forensic science, computer forensics deals with the application of law to a science. In this case, the science involved is computer science and some refer to it as Forensic Computer Science. Computer forensics has also been described as the autopsy of a computer hard disk drive because specialized software tools and techniques are required to analyze the various levels at which computer data is stored after the fact. Computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector, but it has been the mainstay of technologyrelated investigations and intelligence gathering in law enforcement and military agencies since the mid1980s. Like any other forensic science, computer forensics involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Typically, computer forensic tools exist in the form of computer software.
A high-speed token-passing technology that employs two rings with traffic flowing in opposite directions. FDDI offers transmission rates of 100 Mbps and is often used as a backbone to large enterprise networks. LAN standard, defined by ANSI X3T9. 5, specifying a 100Mbps tokenpassing network using fiberoptic cable, with transmission distances of up to two kilometers. FDDI uses a dualring architecture to provide redundancy.
<p>A unique approach to network operation, design, and management. The concept is based on the theory that the complexities of a traditional network with on-device configuration (i. e. , routers and switches) often force an organization to stick with a single device vendor, such as Cisco, and limit the flexibility of the network to changing physical and business conditions. SDN aims at separating the infrastructure layer (i. e. , hardware and hardware-based settings) from the control layer (i. e. , network services of data transmission management).</p><p>SDN is a broad and developing concept addressing the management of the various network components with the objective of providing a control plane to manage traffic on a more abstract level through direct management of network components.<br></p>
A point of connection into a network. In multipoint networks, is a unit that is polled. In LANs, it is a device on the ring. In packetswitched networks, it is one of the many packet switches that form the network’s backbone.
Extent to which protective measures, techniques, and procedures must be applied to information systems and networks based on risk, threat, vulnerability, system interconnectivity considerations, and information assurance needs. Levels of protection are: 1. Basic: information system and networks requiring implementation of standard minimum security countermeasures. 2. Medium: information system and networks requiring layering of additional safeguards above the standard minimum security countermeasures. 3. High: information system and networks requiring the most stringent protection and rigorous security countermeasures.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in