Page Replacement
/ˈpeɪdʒ rɪˈpleɪsmənt/
noun — "choosing which memory page to evict."
Page Replacement is the mechanism used by an operating system to decide which memory page should be removed from physical memory when space is needed to load a new page. It is a core component of virtual memory systems, enabling programs to operate as if they have access to more memory than is physically available by transparently moving data between fast main memory and slower secondary storage.
Least Recently Used
/ˌɛl ɑː ˈjuː/
noun — "evict the item not used for the longest time."
LRU, short for Least Recently Used, is a cache replacement and resource management policy that discards the item whose last access occurred farthest in the past when space is needed. It is based on the assumption that data accessed recently is more likely to be accessed again soon, while data not accessed for a long time is less likely to be reused. This principle aligns closely with temporal locality, a common property of real-world workloads.
Role-Based Access Control
/roʊl beɪst ˈæk.sɛs kənˌtroʊl/
noun — "permissions assigned by roles."
Role-Based Access Control, abbreviated RBAC, is an access control methodology where permissions to perform operations on resources are assigned to roles rather than individual users. Users are then assigned to these roles, inheriting the associated permissions. This model simplifies administration, improves security, and scales efficiently in environments with many users and resources.
Access Control
/ˈæk.sɛs kənˌtroʊl/
noun — "governing who can use resources."
Access Control is a system or methodology used to regulate which users, processes, or devices can interact with resources within computing environments, networks, or information systems. It ensures that only authorized entities are allowed to read, write, execute, or manage specific resources, thereby protecting data integrity, confidentiality, and availability.
RSoP
/ˌɑːr-ɛs-oʊ-ˈpiː/
n. “The snapshot of what policies are actually applied.”
RSoP, short for Resultant Set of Policy, is a Microsoft Windows feature used to determine the effective policies applied to a user or computer in an Active Directory environment. It aggregates all GPOs affecting a target object, considering inheritance, filtering, and security settings, to provide a clear picture of the resulting configuration.
Key characteristics of RSoP include:
GPMC
/ˌdʒiː-piː-ɛm-ˈsiː/
n. “The console for managing all your Group Policies.”
GPMC, short for Group Policy Management Console, is a Microsoft Windows administrative tool that provides a single interface for managing Group Policy Objects (GPOs) across an Active Directory environment. It streamlines the creation, editing, deployment, and troubleshooting of policies that control user and computer settings in a networked domain.
Key features of GPMC include:
GPO
/ˌdʒiː-piː-ˈoʊ/
n. “The rulebook for computers in a Windows network.”
GPO, short for Group Policy Object, is a feature of Active Directory in Microsoft Windows environments that allows administrators to centrally manage and configure operating system settings, application behaviors, and user permissions across multiple computers and users in a domain.
Key aspects of GPO include:
Group-Policy
/ɡruːp ˈpɒl-ɪ-si/
n. “Control the chaos, centrally.”
Group Policy is a Microsoft Windows feature that allows administrators to centrally manage and configure operating systems, applications, and user settings across multiple computers in an Active Directory environment. Think of it as a command center for IT: rather than touching each workstation individually, you set rules once, and they propagate automatically.
CORS
/kɔːrz/
n. “You may speak… but only from where I recognize you.”
CORS, short for Cross-Origin Resource Sharing, is a browser-enforced security model that controls how web pages are allowed to request resources from origins other than their own. It exists because the web learned, the hard way, that letting any site freely read responses from any other site was a catastrophically bad idea.
CSP
/ˌsiː-ɛs-ˈpiː/
n. “Trust nothing by default. Especially the browser.”
CSP, short for Content Security Policy, is a defensive security mechanism built into modern browsers to reduce the damage caused by malicious or unintended content execution. It does not fix broken code. It does not sanitize input. What it does instead is draw very explicit boundaries around what a web page is allowed to load, execute, embed, or communicate with — and then enforces those boundaries with extreme prejudice.