Glossary

A glossary is a list of terms, abbreviations, or expressions in a particular field of knowledge with their respective definitions.

Account Takeover

Gaining unauthorized access to users accounts.

Best Effort

Reasonable effort to satisfy a request but without guaranteeing success.

Color Wheel

A circular diagram used to show the relationships between colors.

Out of the box

Native or built-in feature or functionality of a product, included by default and that works immediately after first setup.

Principle of Least Privilege

Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.

Real Time

Reported at the same time something takes place.

Real-Time Computing

Used to describe a computer system that guarantee to process events and perform tasks within a specific time constraints.

Recovery Point Objective

Targeted duration of time between the event of failure and the point where operations resume.

Recovery Time Objective

Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.

SSL-Bridging

The load balancer decrypts the incoming encrypted traffic (same as in SSL-Termination) and re-encrypts it when sending to the back-end server.

SSL-Passthrough

The load balancer passes the encrypted traffic to the backend servers without decrypting it.

Because the load balancer only sees encrypted traffic, it is not possible to perform layer 7 (OSI model) actions.

SSL-Termination

The load balancer decrypts the incoming encrypted traffic and sends it to the backend server unencrypted.