Publicité

IT Vocabulary

23 Mar 2023
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
IT Vocabulary
Publicité
IT Vocabulary
IT Vocabulary
Prochain SlideShare
Network srcurityNetwork srcurity
Chargement dans ... 3
1 sur 36
Publicité

Contenu connexe

Publicité

IT Vocabulary

  1. digital transformation [digi-tal trans-for-mation] / adjective - noun Digital transformation describes the implementation and modification of digital technologies within a business, carried out to improve that business’ operations and services. Businesses often opt to rethink their digital strategies in order to increase client satisfaction - delivering optimised services and value to clients.
  2. managed services [man-aged ser-vices] / adjective - noun Managed services are administered by a trusted Managed Service Provider (MSP). Businesses opt to partner with an MSP in order to receive tailored IT solutions; MSPs are responsible for delivering, installing and maintaining core IT systems and software. Managed services are favoured for the benefit of increased scalability, a minimised threat of downtime, and 24/7 access to IT experts.
  3. connectivity [con-nec-tiv-ity] / noun Connectivity describes a device's ability to link to and communicate with other electronic devices, systems, software, and the internet. As a flexible and digitally connected business is essential for growth and development, businesses must enhance their workplace connectivity through the implementation of digital transformation strategies.
  4. cloud computing [cloud com-pu-ting] / adjective - noun Cloud computing is the delivery of IT services via the internet; these services include servers, storage, databases and other crucial business components. This method of using a network of remote servers hosted in the Cloud to store, manage and process data reduces a business' need for onsite hardware and physical maintenance.
  5. device deployment [dev-ice de-ploy-ment] / noun Device deployment encompasses all the processes involved in delivering new software or hardware in its intended environment - including installation, configuration, running and testing. With the help of services such as Microsoft Autopilot, device configuration and set-up can be completed from any location, expediting device deployment for employees.
  6. the metaverse [the meta-verse] / noun At its core, the Metaverse is a virtual reality world that allows users to interact, game, and experience things as they would in the real world. Using current Augmented Reality (AR) and Virtual Reality (VR) tech, users can immerse themselves in this virtual world and interact with objects and people that are being projected within the space.
  7. cyber essentials [cy-ber essen-tials] / noun The Cyber Essentials Framework is a government backed IT accreditation administered by IASME. The framework was created to ensure businesses have the very best cybersecurity practices in place, so clients can be reassured that their data is secure and protected. The accreditation provides a powerful level of security credibility for businesses, encouraging client growth and improved business reputation.
  8. security posture [se-curity pos-ture] / adjective - noun An enterprise’s security posture is determined by the strength of its networks, information, and systems based on information security resources (e.g., people, hardware, software, policies), and the controls and protocols in place for predicting and preventing cyber-attacks. Maintaining ironclad cybersecurity practices is essential for businesses to protect their clients' interests and business reputation.
  9. data [da-ta] / noun Data is the information processed or stored by a computer or device; business data specifically refers to the data and personal information accessed, processed, collected, stored or disseminated by an enterprise. Businesses are increasingly opting to store their data within the Cloud, as this minimises on-site hardware and provides additional data security.
  10. SaaS [soft-ware as a ser-vice] / noun - adjective Software as a Service (SaaS) is a cloud based method of delivering software. Businesses can opt to access their software and applications through the internet, removing the need for the installation, maintenance and use of complex software and hardware. SaaS applications usually run as a subscription service via a SaaS provider’s servers; with the provider managing application access, security, and performance.
  11. VPN [vir-tu-al pri-vate net-work] / noun A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared networks as if their computing devices were directly connected to the private network. It works by hiding your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. A VPN encrypts your connection and disguises your data traffic online and protects it from external access.
  12. cybersecurity [cy-ber-se-cu-ri-ty] / noun Cybersecurity is the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks. It's core function is to protect various devices, and services from unauthorised access to the vast amounts of personal information we store on these devices, and online.
  13. encryption [en-cryp-tion] / noun Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
  14. firewall [fire-wall] / noun A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers.
  15. ransomware [ran-som-ware] / noun Ransomware holds victims' devices and data hostage or makes systems unusable until a ransom is paid. Acting as a block when deployed, this will prohibit your access to your device until you pay the ‘ransom’ fee to its creator, often being very expensive and difficult to remove
  16. pentest [pen-test] / noun Pentest, short for penetration testing, means testing a network, computer or system for weaknesses. Also known as ethical hacking, it involves attempting to hack in to check for vulnerable spots that real attackers could exploit. Results of the penetration tests are then compiled into a report detailing the specific vulnerabilities that were exploited, sensitive data that was accessed and the amount of time the pen tester was able to remain in the system undetected.
  17. [pat-ching] / noun Patching is the process of creating and implementing a temporary policy that is used to mitigate exploitation risks associated with the discovery of new security vulnerabilities. It eliminates the potential threat of application or system security loopholes being identified and exploited by hackers. patching
  18. [phish-ing] / noun Phishing attacks are performed at scale and involve fraudulent emails being sent to unsuspecting users. Phishing attacks often appear to come from trusted sources (banks, brands, or even colleagues etc.) but link to malicious sites or files that aim to either download malware or steal sensitive information. These attacks rely on creating urgency - requiring users to act to avoid negative consequences (such as fraudulent activity or undeliverable post for example). This social attack aims to manipulate vulnerable users - be it those who are timepoor, unaware or unsuspecting and uses these instances to obtain sensitive information that can either be sold or used as part of further cyber-attacks. phishing
  19. [spear phish-ing] / noun Spear phishing is a cyber attack method where hackers set up a targeted email scam, directly addressed to the victim. The hacker attempts to convince the victim that they are familiar with the sender. The sole purpose of spear phishing is to obtain unauthorised access to sensitive data. spear phishing
  20. [whal-ing] / noun Whaling is a form of spear phishing that specifically target high- level executives. Similar to spear-phishing, the hacker attempts to convince the victim that they are familiar with the sender. Whaling takes more time and investment in researching and crafting these highly targeted messages or emails. Whaling usually targets those with direct access to financial or payroll information. whaling
  21. [multi-ple fact-or auth-enti-cation] / noun MFA stands for multiple factor authentication is a security measure that requires two or more forms of verification to access an account. It works using a username and password in combination with other pieces of evidence. These pieces of evidence could include a four-to-six-digit, one-time code sent to email or to the users’ mobile phone, a PIN/passcode or a secret question. MFA
  22. [an-ti-vi-rus] / noun This is software that is used for scanning and removing viruses from a computer. It can be scanned automatically and manually. The automatic scan may check files that have been downloaded and files created by software installers. It can also scan the hard drive regularly. The manual scan allows the user to scan individual files or the whole system whenever they believe it to be necessary. antivirus
  23. [al-go-rithm] / noun An algorithm is a set of instructions designed to preform a specific task. Search engines use algorithms use proprietary algorithms to display the most relevant results. In computer programming, algorithms are created as functions. algorithm
  24. [a-zure] / noun Azure is a cloud-computing platform built and operated by Microsoft. It allows companies to run applications and host content in the cloud. While Microsoft designed Azure to support enterprise computing requirements the service is also available to small businesses. azure
  25. [brow-ser fin-ger-print-ing] / noun Browser fingerprinting is a method that websites use to identify or partially identify individuals’ users or devices, even when cookies are turned off. A browser fingerprint includes the browser type and version, as well as your operating system, active plugins, time zone, language and screen resolution etc. browser fingerprinting
  26. [e-ther-net] / noun Ethernet is the standard way to connect computers on a network over a wired connection. It provides a simple interface and for connecting multiple devices, such computers, routers, and switches. With a single router and a few Ethernet cables, you can create a LAN, which allows all connected devices to communicate with each other. ethernet
  27. [threat act-or] / noun Any person or organisation that intentionally causes harm in the digital sphere. They exploit weaknesses in computer, networks and systems to carry out attacks on individuals or organisations. threat actor
  28. [ar-ti-fi-cial in-tel-li-gence] / noun Often referred to as AI, it is the ability of a computer to act like a human being, mimicking the problem making and decision- making capabilities of the human mind. artificial intelligence
  29. [de-bug] / noun Programs sometimes have small errors, called "bugs," in them. These bugs can be minor, such as not recognizing user input, or more serious, such as a memory leak that crashes the program. Before releasing their software to the public, programmers "debug" their programs, eliminating as many errors as possible. This debugging process often takes a long time, as fixing some errors may introduce others. debug
  30. [de-cryp-tion] / noun Decryption is the process of converting encrypted data into recognizable information. It is the opposite of encryption, which takes readable data and makes it unrecognizable. Files and data transfers may be encrypted to prevent unauthorized access. If someone tries to view an encrypted document, it will appear as a random series of characters. If someone tries to "snoop" on an encrypted network connection, the data will not make any sense. decryption
  31. [en-cod-ing] / noun Encoding is the process of converting data from one form to another. While "encoding" can be used as a verb, it is often used as a noun, and refers to a specific type of encoded data. There are several types of encoding, including image encoding, audio and video encoding, and character encoding. encoding
  32. [dig-i-tal foot-print] / noun A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. digital footprint
  33. [spoof-ing] / noun In the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet. spoofing
  34. [in-ter-net pro-to-col add-ress] / noun An IP address, or simply an "IP," is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. IP address
  35. [ad-vers-a-ry-in-the-mid-dle] / noun Adversary-in-the-middle is a phishing technique which the attacker can steal and intercept the victim’s password, hijack login sessions and ignore the authentication process as AiTM is not related to a vulnerability in the MFA. AiTM
  36. [ad-vers-a-ry-in-the-mid-dle] / noun Adversary-in-the-middle is a phishing technique which the attacker can steal and intercept the victim’s password, hijack login sessions and ignore the authentication process as AiTM is not related to a vulnerability in the MFA. AiTM
Publicité