13.07.2015 Views

Solution Architecture Report - IRDA

Solution Architecture Report - IRDA

Solution Architecture Report - IRDA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Solution</strong> <strong>Architecture</strong> Document - <strong>IRDA</strong> Business Analytics ProjectList of Abbreviations Used with Their DefinitionAbbreviationsACLADSANSIAPIATIB2BBCPCBACCDC/DCCOMDDDMZDNSDRCDRMDTLSDescriptionAn access control list (ACL) is a list of permissions attached to an object. An ACLspecifies which users--or system processes--are granted access to objects, as well aswhat operations are allowed to be performed on given objects.Active Directory Server (ADS) is a technology created by Microsoft that provides avariety of network servicesThe American National Standards Institute (ANSI) is a private non-profit organizationthat oversees the development of voluntary consensus standards for products,services, processes, systems, and personnel in the United StatesAn application programming interface (API) is an interface implemented by a softwareprogram to enable interaction with other softwareAgent Training InstitutesBusiness - to - BusinessBusiness continuity planning (BCP) is the creation and validation of a practicedlogistical plan for how an organization will recover and restore partially or completelyinterrupted critical (urgent) functions within a predetermined time after a disaster orextended disruption. The logistical plan is called a business continuity plan.Context-based access control (CBAC) intelligently filters TCP and UDP packets based onapplication layer protocol session information and can be used for intranets, extranetsand internets.Centralized Data Center or Data Center is a facility used to house computer systemsand associated components, such as telecommunications and storage systems.COM (hardware interface) (COM) is a serial port interface on IBM PC-compatiblecomputers running Microsoft Windows or MS-DOSDeputy DirectorThe Demilitarized Zone (DMZ) is a critical part of a firewall: it is a network that isneither part of the un trusted network, nor part of the trusted networkThe Domain Name System (DNS) is a hierarchical naming system for computers,services, or any resource connected to the Internet or a private networkA Disaster Recovery Center (DRC) is a backup site is a location where an organizationcan easily relocate following a disaster, such as fire, flood, terrorist threat or otherdisruptive event.Disaster Recovery Management (DRM) is the process, policies and procedures relatedto preparing for recovery or continuation of technology infrastructure critical to anorganization after a natural or human-induced disaster.The Datagram Transport Layer Security (DTLS) protocol provides communicationsprivacy for datagram protocols.Business Analytics Project Page 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!