Skip to main content
IT GLOSSARY

Master IT Terminology with Our Comprehensive Glossary

 

Adware: Software that automatically displays or downloads advertising material.

Antivirus Software: A program designed to detect and remove malware.

BCDR (Business Continuity and Disaster Recovery): Planning and processes that help ensure operations can continue during and after a disaster.

Botnet: A network of private computers infected with malicious software and controlled as a group.

Brute Force Attack: A trial-and-error method used to obtain information such as a user password.

Cloud Computing: The delivery of computing services over the internet.

Cyber Espionage: The act or practice of obtaining secrets without the permission of the holder of the information.

Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks.

Data Breach: An incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.

Data Encryption Standard (DES): A once widely used method of data encryption.

DDoS (Distributed Denial of Service): An attack that attempts to disrupt the normal traffic of a targeted server, service, or network.

Digital Certificate: A digital form of identification.

EDR (Endpoint Detection and Response): A cybersecurity solution that monitors end-user devices to detect and respond to cyber threats.

Encryption: The process of converting information or data into a code to prevent unauthorized access.

Endpoint Security: The practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices.

Firewall: A network security system that monitors and controls incoming and outgoing network traffic.

Hacker: A person who uses computers to gain unauthorized access to data.

IaaS (Infrastructure as a Service): A form of cloud computing that provides virtualized computing resources over the internet.

Intrusion Detection System (IDS): A device or software application that monitors a network for malicious activity.

IoT (Internet of Things): The interconnection via the internet of computing devices embedded in everyday objects.

IP Address: A unique string of numbers separated by periods that identifies each computer using the internet protocol to communicate over a network.

ISP (Internet Service Provider): A company that provides individuals and organizations access to the internet.

Keylogger: A type of surveillance technology used to record keystrokes.

LAN (Local Area Network): A network that connects computers within a limited area such as a residence, school, or office building.

Malware: Software designed to disrupt, damage, or gain unauthorized access to a computer system.

MDR (Managed Detection and Response): A service that provides organizations with threat hunting, monitoring, and response solutions.

Network Security: The practice of preventing and protecting against unauthorized intrusion into corporate networks.

PaaS (Platform as a Service): A cloud computing model that provides customers a platform to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.

Patch: A piece of software designed to update a computer program or its supporting data.

Penetration Testing: A test method for evaluating the security of a computer system or network by simulating an attack.

Phishing: A method of trying to gather personal information using deceptive e-mails and websites.

Privileged Access Management (PAM): A solution that helps organizations restrict privileged access within an existing Active Directory environment to prevent data breaches and comply with regulations.

Ransomware: Malware that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

Rootkit: A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

SaaS (Software as a Service): A software distribution model in which a third-party provider hosts applications and makes them available to customers over the internet.

Secure Shell (SSH): A cryptographic network protocol for operating network services securely over an unsecured network.

Security Operations Center (SOC): A centralized unit that deals with security issues on an organizational and technical level. A SOC is responsible for monitoring, analyzing, and protecting an organization from cyber threats.

SIEM (Security Information and Event Management): A set of tools and services offering a holistic view of an organization’s information security.

Social Engineering: The use of deception to manipulate individuals into divulging confidential or personal information.

Spyware: Software that enables a user to obtain covert information about another’s computer activities.

SSL (Secure Sockets Layer): A standard security technology for establishing an encrypted link between a server and a client.

SSL Inspection: The process of intercepting and reviewing encrypted traffic for security purposes.

SSID (Service Set Identifier): The name assigned to a Wi-Fi network to identify it.

Threat Intelligence: Information used to understand the threats that have, will, or are currently targeting the organization.

Trojan Horse: A type of malware that is often disguised as legitimate software.

Two-Factor Authentication: A security process in which the user provides two different authentication factors to verify themselves.

Unified Threat Management (UTM): A single security solution, and the services it offers, which provides multiple security functions at a single point on the network.

VLAN (Virtual Local Area Network): A group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.

VPN (Virtual Private Network): A service that allows you to connect to the internet securely by routing your connection through a server.

Vulnerability: A weakness which can be exploited by a threat actor.

WAN (Wide Area Network): A telecommunications network that extends over a large geographic area for the primary purpose of computer networking.

Whitelisting: A security process that allows only specified software to run on a system.

Worm: A standalone malware computer program that replicates itself to spread to other computers.

XDR (Extended Detection and Response): A security solution that provides comprehensive threat detection and response across multiple security layers.

Zero-Day Attack: A cyber attack that occurs on the same day a weakness is discovered in software.