Category: Technology
Company: Gartner
Created by: consultant
Number of Blossarys: 2
The component of a computer system that controls the interpretation and execution of instructions. The CPU of a PC consists of a single microprocessor, while the CPU of a more powerful mainframe ...
A “hot lists” that identifies certificates that have been withdrawn, canceled or compromised or that should not be trusted because of other identified reasons. CRLs should be replicated to all ...
Also known as a “certificate authority,” a certification authority (CA) is an internal or third-party entity that creates, signs and revokes digital certificates that bind public keys to user ...
A document defining all the operational practices that will be used to maintain the required level of public-key infrastructure (PKI) security. To prove that issued certificates are valid, an ...
A certification program administered by the International Information Systems Security Certification Consortium (ISC2).
An information technology certification by the Network Professional Association (NPA) requiring two years of experience, two vendor certifications and a passing grade on the core fundamentals exam.
Change management is the automated support for development, rollout and maintenance of system components (i.e., intelligent regeneration, package versioning, state control, library control, ...