Master IT Terminology with Our Comprehensive Glossary
Adware: Software that automatically displays or downloads advertising material.
Antivirus Software: A program designed to detect and remove malware.
BCDR (Business Continuity and Disaster Recovery): Planning and processes that help ensure operations can continue during and after a disaster.
Botnet: A network of private computers infected with malicious software and controlled as a group.
Brute Force Attack: A trial-and-error method used to obtain information such as a user password.
Cloud Computing: The delivery of computing services over the internet.
Cyber Espionage: The act or practice of obtaining secrets without the permission of the holder of the information.
Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks.
Data Breach: An incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Data Encryption Standard (DES): A once widely used method of data encryption.
DDoS (Distributed Denial of Service): An attack that attempts to disrupt the normal traffic of a targeted server, service, or network.
Digital Certificate: A digital form of identification.
EDR (Endpoint Detection and Response): A cybersecurity solution that monitors end-user devices to detect and respond to cyber threats.
Encryption: The process of converting information or data into a code to prevent unauthorized access.
Endpoint Security: The practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices.
Firewall: A network security system that monitors and controls incoming and outgoing network traffic.
Hacker: A person who uses computers to gain unauthorized access to data.
IaaS (Infrastructure as a Service): A form of cloud computing that provides virtualized computing resources over the internet.
Intrusion Detection System (IDS): A device or software application that monitors a network for malicious activity.
IoT (Internet of Things): The interconnection via the internet of computing devices embedded in everyday objects.
IP Address: A unique string of numbers separated by periods that identifies each computer using the internet protocol to communicate over a network.
ISP (Internet Service Provider): A company that provides individuals and organizations access to the internet.
Keylogger: A type of surveillance technology used to record keystrokes.
LAN (Local Area Network): A network that connects computers within a limited area such as a residence, school, or office building.
Malware: Software designed to disrupt, damage, or gain unauthorized access to a computer system.
MDR (Managed Detection and Response): A service that provides organizations with threat hunting, monitoring, and response solutions.
Network Security: The practice of preventing and protecting against unauthorized intrusion into corporate networks.
PaaS (Platform as a Service): A cloud computing model that provides customers a platform to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
Patch: A piece of software designed to update a computer program or its supporting data.
Penetration Testing: A test method for evaluating the security of a computer system or network by simulating an attack.
Phishing: A method of trying to gather personal information using deceptive e-mails and websites.
Privileged Access Management (PAM): A solution that helps organizations restrict privileged access within an existing Active Directory environment to prevent data breaches and comply with regulations.
Ransomware: Malware that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Rootkit: A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
SaaS (Software as a Service): A software distribution model in which a third-party provider hosts applications and makes them available to customers over the internet.
Secure Shell (SSH): A cryptographic network protocol for operating network services securely over an unsecured network.
Security Operations Center (SOC): A centralized unit that deals with security issues on an organizational and technical level. A SOC is responsible for monitoring, analyzing, and protecting an organization from cyber threats.
SIEM (Security Information and Event Management): A set of tools and services offering a holistic view of an organization’s information security.
Social Engineering: The use of deception to manipulate individuals into divulging confidential or personal information.
Spyware: Software that enables a user to obtain covert information about another’s computer activities.
SSL (Secure Sockets Layer): A standard security technology for establishing an encrypted link between a server and a client.
SSL Inspection: The process of intercepting and reviewing encrypted traffic for security purposes.
SSID (Service Set Identifier): The name assigned to a Wi-Fi network to identify it.
Threat Intelligence: Information used to understand the threats that have, will, or are currently targeting the organization.
Trojan Horse: A type of malware that is often disguised as legitimate software.
Two-Factor Authentication: A security process in which the user provides two different authentication factors to verify themselves.
Unified Threat Management (UTM): A single security solution, and the services it offers, which provides multiple security functions at a single point on the network.
VLAN (Virtual Local Area Network): A group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.
VPN (Virtual Private Network): A service that allows you to connect to the internet securely by routing your connection through a server.
Vulnerability: A weakness which can be exploited by a threat actor.
WAN (Wide Area Network): A telecommunications network that extends over a large geographic area for the primary purpose of computer networking.
Whitelisting: A security process that allows only specified software to run on a system.
Worm: A standalone malware computer program that replicates itself to spread to other computers.
XDR (Extended Detection and Response): A security solution that provides comprehensive threat detection and response across multiple security layers.
Zero-Day Attack: A cyber attack that occurs on the same day a weakness is discovered in software.