GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
09:18 Jan 16, 2009 |
Italian to English translations [PRO] Tech/Engineering - IT (Information Technology) | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: James (Jim) Davis Seychelles Local time: 15:55 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
5 +1 | isolated |
| ||
4 | set apart |
| ||
3 | isolated |
|
isolato (in context) isolated Explanation: isolated from the company intranet by a firewall Reference: http://www.google.com/search?source=ig&hl=en&rlz=&=&q=isolat... |
| ||
Grading comment
| |||
Notes to answerer
| |||
Login to enter a peer comment (or grade) |
isolato (in context) isolated Explanation: ...isolated from the network... |
| ||
Notes to answerer
| |||
Login to enter a peer comment (or grade) |
isolato (in context) set apart Explanation: ----------------------------------- http://www.securityfocus.com/infocus/1667 Also referred to as n-tier design, this design incorporates the three layers of a Web application running on different servers, usually ***set apart by firewalls*** that have specific rules to only let traffic through to the specific port on a specific server at whichever layer that the user is trying to access: ------------------------------------------------------ http://cybertechzone.blogspot.com/2007/10/security-for-unix-... Ideally, network servers should be ***set apart*** from the user segment in a secure DMZ or secure server network. <<<Most firewalls>>> allow this and if it does not, it can easily be accomplished by using routers behind the firewall. ------------------------------------------------------- http://www.infopeople.org/resources/security/network/firewal... Firewall administrators often deliberately move servers that create more risk than others, such as web servers or email servers, onto a third network that is ***set apart*** from the internal network but is still not completely on the outside. In this way, more access can be granted to them while still affording them some protection. This type of firewall network architecture is known as a "multi-homed firewall with a perimeter network." ----------------------------------------------------- https://www.nacs.uci.edu/network/network-glossary.html A portion of a network ***set apart*** from other network sections by a bridge, router or switch. Each network segment supports a single medium access protocol and a pre-determined bandwidth. |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.