IT & Cybersecurity Glossary

Search and explore common IT and cybersecurity terms

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

cybersecurity

Antivirus Software

Programs designed to detect, prevent, and remove malicious software (malware) from computers and networks.

cybersecurity

Phishing

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

cybersecurity

Ransomware

A type of malicious software that encrypts files and demands payment for decryption keys.

cybersecurity

Two-Factor Authentication (2FA)

An extra layer of security requiring two different forms of verification before granting access.

cybersecurity

Zero-Day Vulnerability

A software security flaw unknown to the vendor that can be exploited before a patch is available.

cybersecurity

Advanced Threat Protection (ATP)

A category of security solutions that defend against sophisticated malware and cyber attacks.

cybersecurity

Client-side Encryption (CSE)

Data encryption that occurs on the user's device before transmission to servers.

cybersecurity

Context-Aware Access

Security framework that adapts access controls based on the context of access requests.

cybersecurity

Zero Trust Security Model

Security concept requiring strict identity verification for every person and device attempting to access resources.

cybersecurity

DDoS Mitigation Services

Services designed to detect and filter out DDoS attack traffic while allowing legitimate traffic through.

cybersecurity

Unified Threat Management (UTM)

An integrated security solution combining multiple security features like firewall, antivirus, and intrusion detection.

cybersecurity

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.

cybersecurity

Penetration Testing

Authorized simulated cyberattack to evaluate the security of a computer system.

cybersecurity

Endpoint Detection and Response (EDR)

Security solution monitoring end-user devices to detect and respond to cyber threats.

cybersecurity

Security Orchestration and Response (SOAR)

Solutions that combine security orchestration, automation and incident response functionality.

cybersecurity

Network Access Control (NAC)

Security solution enforcing policy on devices before they're granted network access.

cybersecurity

Security Token

Physical device used to prove identity electronically, often as part of two-factor authentication.

cybersecurity

Vulnerability Scanner

Tool that assesses computers, networks or applications for known vulnerabilities.

cybersecurity

Security Operations Center (SOC)

Facility housing security analysts who monitor, analyze, and respond to cybersecurity incidents.

cybersecurity

Virtual Private Network (VPN)

A secure, encrypted connection over a less secure network, typically the internet.

networking

Bandwidth

The maximum rate of data transfer across a network path.

networking

Cloud Computing

The delivery of computing services over the internet, including servers, storage, databases, and software.

networking

Internet of Things (IoT)

Network of physical objects embedded with sensors, software, and connectivity to exchange data.

networking

Wi-Fi 6

The latest generation of Wi-Fi technology (802.11ax) offering improved speed and efficiency.

networking

Wi-Fi 7

Next-generation Wi-Fi standard (802.11be) promising significantly higher speeds and lower latency.

networking

Mesh Networking

A network topology where devices connect directly and cooperate to route data efficiently.

networking

Software-Defined Networking (SDN)

An approach to networking that uses software-based controllers to direct traffic.

networking

Edge Computing

Processing data near the edge of the network where it's generated instead of in a centralized location.

networking

5G Integration

The incorporation of fifth-generation cellular network technology into existing network infrastructure.

networking

Network Latency

The time delay between the sending and receiving of data packets across a network.

networking

Quality of Service (QoS)

The ability to prioritize different types of network traffic to ensure performance for critical applications.

networking

Network Redundancy

The process of providing alternative paths for network traffic in case of component failure.

networking

Load Balancing

Distribution of network traffic across multiple servers to optimize resource utilization.

networking

VLAN (Virtual Local Area Network)

A logical grouping of network devices that allows them to communicate as if they were on the same physical network.

networking

SD-WAN

Software-defined networking technology applied to WAN connections for improved performance and management.

networking

Network Monitoring

The continuous observation and analysis of network performance and security.

networking

Network Segmentation

Division of a network into smaller, isolated segments for improved security and performance.

networking

Power over Ethernet (PoE)

Technology enabling network cables to carry electrical power to network devices.

networking

Layer 3 Switching

Network switching that operates at the network layer, combining routing and switching functions.

networking

Backup

The process of creating copies of data to protect against loss.

Data Management

Disaster Recovery Plan

A documented process to recover and protect business IT infrastructure in case of a disaster.

Data Management

Big Data

Extremely large data sets that can be analyzed to reveal patterns and trends.

Data Management

Data Warehouse

A large storage system optimized for analysis and reporting of business data.

Data Management

SQL (Structured Query Language)

Standard language for managing and manipulating relational databases.

Data Management

Data Mining

Process of discovering patterns and relationships in large data sets.

Data Management

Cloud Storage

Online storage service that allows data to be stored and accessed over the internet.

Data Management

Data Governance

Framework for managing the availability, usability, integrity, and security of data.

Data Management

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.

Data Management

Power BI

Microsoft's business analytics service for interactive visualizations and business intelligence.

Data Management

Data Lake

Storage repository that holds a vast amount of raw data in its native format.

Data Management

ETL (Extract, Transform, Load)

Process of combining data from multiple sources into a large, centralized data store.

Data Management

Data Replication

Process of storing data in multiple locations to improve availability and accessibility.

Data Management

Data Archiving

Moving data that is no longer actively used to a separate storage device for long-term retention.

Data Management

Master Data Management

Method of enabling an organization to link all critical data to a common point of reference.

Data Management

Data Lifecycle Management

Policy-based approach to managing the flow of data throughout its lifecycle.

Data Management

Database Sharding

Method of splitting and storing a single logical dataset in multiple databases.

Data Management

Data Visualization

Graphical representation of information and data using visual elements.

Data Management

Data Quality Management

Practice of maintaining high-quality information that is reliable, accurate, and accessible.

Data Management

Data Integration

Process of combining data from different sources into a unified view.

Data Management

SaaS (Software as a Service)

Software delivery model where applications are hosted and licensed on a subscription basis.

Software

CRM Software

Customer Relationship Management software for managing customer interactions and data.

Software

ERP (Enterprise Resource Planning)

Software that manages day-to-day business activities like accounting and project management.

Software

Patch Management

Process of distributing and applying updates to software applications.

Software

API (Application Programming Interface)

Set of protocols and tools for building software applications and enabling their interaction.

Software

Version Control

System for tracking and managing changes to software code.

Software

Agile Methodology

Iterative approach to software development emphasizing flexibility and customer satisfaction.

Software

DevOps

Set of practices combining software development and IT operations.

Software

Containerization

OS-level virtualization method for deploying and running distributed applications.

Software

Microsoft Teams

Collaboration platform combining chat, video meetings, file storage, and application integration.

Software

Microsoft Teams Premium

Enhanced version of Teams with advanced meeting features and security options.

Software

Microsoft Viva

Employee experience platform integrating communications, knowledge, learning, and insights.

Software

Power Automate

Cloud-based service for creating automated workflows between applications and services.

Software

Microsoft Loop

Collaborative application helping teams think, plan, and create together.

Software

Microservices Architecture

Software development approach structuring applications as collections of loosely coupled services.

Software

CI/CD Pipeline

Combined practices of continuous integration and continuous delivery in software development.

Software

Test Automation

Use of software to execute tests and compare actual outcomes with predicted outcomes.

Software

Code Repository

Storage location for managing source code and version history.

Software

Software License Management

Process of controlling and documenting software licensing in an organization.

Software

Application Monitoring

Tools and practices for tracking application performance and user experience.

Software

Managed IT Services

Outsourced IT services where a provider manages and assumes responsibility for providing IT functions.

it-services

Service Level Agreement (SLA)

Contract between service providers and clients defining expected service levels and performance metrics.

it-services

Help Desk Support

Technical support service providing assistance to users experiencing computer or IT-related problems.

it-services

ITIL (Information Technology Infrastructure Library)

Framework of best practices for delivering IT services and aligning them with business needs.

it-services

BYOD (Bring Your Own Device)

Policy allowing employees to use personal devices for work purposes.

it-services

Incident Management

Process of responding to and resolving IT service disruptions to restore normal operations.

it-services

Change Management

Structured approach to transitioning individuals, teams, and organizations to a desired future state.

it-services

Project Management

Planning, organizing, and managing resources to achieve specific IT project goals.

it-services

Vendor Management

Process of managing third-party service providers and suppliers.

it-services

Asset Management

Systematic approach to governing and maintaining IT assets throughout their lifecycle.

it-services

Capacity Planning

Process of determining IT resources needed to meet future demands.

it-services

Service Catalog

Organized list of all IT services available to customers or employees.

it-services

Problem Management

Process of identifying and managing the causes of incidents in IT services.

it-services

Knowledge Management

Process of creating, sharing, using, and managing IT knowledge and information.

it-services

Configuration Management

Process of maintaining IT systems, products, and assets in a desired state.

it-services

Release Management

Process of managing, planning, and controlling software builds through different stages.

it-services

Service Desk

Single point of contact between service providers and users for IT-related issues.

it-services

IT Governance

Framework ensuring IT investments support business objectives.

it-services

Business Continuity Planning

Creating systems of prevention and recovery from potential IT threats.

it-services

Service Portfolio Management

Method for managing all IT services throughout their lifecycle.

it-services

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence.

emerging-tech

Machine Learning

AI subset enabling systems to learn and improve from experience without explicit programming.

emerging-tech

Blockchain

Distributed ledger technology providing secure, decentralized record-keeping of transactions.

emerging-tech

Augmented Reality (AR)

Technology overlaying digital information onto the real world environment.

emerging-tech

Virtual Reality (VR)

Computer-generated simulation of a three-dimensional environment for interactive user experience.

emerging-tech

5G Technology

Fifth generation of cellular network technology offering higher speeds and lower latency.

emerging-tech

Quantum Computing

Computing using quantum-mechanical phenomena for processing power beyond classical computers.

emerging-tech

Robotic Process Automation (RPA)

Technology automating repetitive tasks through software robots or artificial intelligence workers.

emerging-tech

Edge Computing

Computing infrastructure enabling data processing closer to the source of data generation.

emerging-tech

Internet of Things (IoT)

Network of physical objects embedded with sensors and connectivity for data exchange.

emerging-tech

Digital Twin

Virtual representation of physical objects or processes for simulation and analysis.

emerging-tech

Natural Language Processing (NLP)

AI technology enabling computers to understand and process human language.

emerging-tech

Computer Vision

AI field enabling computers to understand and process visual information from images or videos.

emerging-tech

Extended Reality (XR)

Umbrella term for AR, VR, and mixed reality technologies.

emerging-tech

Neural Networks

Computing systems inspired by biological neural networks for machine learning.

emerging-tech

Autonomous Systems

Self-governing systems capable of operating without human intervention.

emerging-tech

Biometrics

Technology measuring and analyzing human physical and behavioral characteristics.

emerging-tech

Smart Contracts

Self-executing contracts with terms directly written into code.

emerging-tech

Predictive Analytics

Technology using data, statistical algorithms, and machine learning to identify future outcomes.

emerging-tech

Zero Trust Architecture

Security concept requiring verification from everyone trying to access network resources.

emerging-tech

GDPR (General Data Protection Regulation)

EU regulation on data protection and privacy for all individuals within the EU and EEA.

compliance

HIPAA

US legislation providing data privacy and security provisions for safeguarding medical information.

compliance

PCI DSS

Payment Card Industry Data Security Standard for organizations handling credit card information.

compliance

ISO 27001

International standard for information security management systems.

compliance

SOC 2

Auditing procedure ensuring service providers securely manage customer data.

compliance

CCPA (California Consumer Privacy Act)

Law enhancing privacy rights and consumer protection for California residents.

compliance

NIST Framework

Guidelines for managing and reducing cybersecurity risk.

compliance

Data Protection Impact Assessment

Process to identify and minimize data protection risks in projects.

compliance

eDiscovery

Electronic discovery process of identifying and collecting electronic information for legal proceedings.

compliance

Records Retention

Policy defining how long organizations must keep records and documents.

compliance

Privacy Impact Assessment

Analysis of how personally identifiable information is collected and protected.

compliance

Data Processing Agreement

Contract regulating the processing of personal data between parties.

compliance

Regulatory Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to business processes.

compliance

Audit Trail

Chronological record providing documentary evidence of system activities.

compliance

Information Security Policy

Document defining rules and procedures for maintaining information security.

compliance

Data Classification

Process of organizing data by sensitivity level and business impact.

compliance

Access Control Policy

Rules and procedures governing access to information systems.

compliance

Incident Response Plan

Documented approach to addressing and managing security incidents.

compliance

Risk Assessment

Process of identifying and evaluating potential risks to information systems.

compliance

Compliance Training

Educational programs ensuring staff understand compliance requirements and procedures.

compliance

VoIP (Voice over Internet Protocol)

Technology enabling voice calls using Internet Protocol networks.

communication

Unified Communications

Integration of enterprise communication services like instant messaging, voice, video, and presence information.

communication

Web Conferencing

Online service for hosting virtual meetings, presentations, and collaborations in real-time.

communication

Google Meet Companion Mode

Feature allowing users to join meetings using multiple devices for enhanced participation.

communication

Google Chat Spaces

Collaborative workspace for team messaging, file sharing, and project coordination.

communication

Microsoft Teams Premium

Enhanced Teams platform offering advanced meeting features, security, and personalization options.

communication

Together Mode in Teams

AI-powered feature placing meeting participants in shared virtual spaces.

communication

Unified Communications as a Service (UCaaS)

Cloud-delivered unified communications model that supports six main functions: enterprise telephony, meetings, unified messaging, instant messaging, mobility, and communications-enabled business processes.

communication

Enterprise Trunking Solutions

Services connecting enterprise phone systems to the public telephone network via IP-based connections.

communication

Bookings with Me

Personal scheduling service allowing others to book time with you based on your availability.

communication

Video Conferencing

Real-time video communication between two or more participants.

communication

Instant Messaging (IM)

Real-time text transmission over the Internet for immediate communication.

communication

Screen Sharing

Feature allowing users to broadcast their screen content to other meeting participants.

communication

Presence Information

Real-time indication of a user's availability status in communication systems.

communication

Virtual Breakout Rooms

Feature allowing meeting hosts to split participants into smaller groups for focused discussions.

communication

Live Transcription

Real-time conversion of spoken words into written text during meetings.

communication

Meeting Recording

Capability to capture and store audio, video, and shared content from virtual meetings.

communication

File Sharing

Ability to share documents and files with other users through communication platforms.

communication

Chat History

Searchable archive of past instant messages and conversations.

communication

Meeting Analytics

Tools providing insights into meeting participation, engagement, and effectiveness.

communication

SSD (Solid State Drive)

Storage device using integrated circuit assemblies to store data persistently.

Hardware

Network Interface Card (NIC)

Hardware component enabling computer connection to a network.

Hardware

RAID Array

Data storage virtualization technology combining multiple disk drives.

Hardware

Server Rack

Framework for mounting multiple hardware devices in an organized manner.

Hardware

Firewall Appliance

Dedicated hardware device providing network security protection.

Hardware

Load Balancer

Hardware device distributing network traffic across multiple servers.

Hardware

Network Switch

Hardware connecting devices in a computer network.

Hardware

Router

Networking device forwarding data packets between computer networks.

Hardware

Wireless Access Point

Networking hardware device enabling Wi-Fi connection to a wired network.

Hardware

Network Gateway

Hardware device serving as entrance to another network.

Hardware

Server

Computer hardware designed to process requests and deliver data to other computers.

Hardware

Storage Area Network (SAN)

Dedicated high-speed network providing block-level network access to storage.

Hardware

Tape Drive

Data storage device reading and writing data on magnetic tape.

Hardware

Network Attached Storage (NAS)

Storage device connected to a network providing file-level data access.

Hardware

Power Distribution Unit (PDU)

Device fitting multiple power outlets providing power to electronic equipment.

Hardware

KVM Switch

Hardware allowing control of multiple computers from single keyboard, video, and mouse.

Hardware

Network Cable Tester

Device verifying proper installation and functionality of network cables.

Hardware

Patch Panel

Hardware assembly mounting connecting hardware for network cables.

Hardware

Hardware Firewall

Physical device providing network security by filtering traffic.

Hardware

Network Bridge

Hardware connecting multiple network segments at data link layer.

Hardware

Hard Disk Drive (HDD)

Data storage device using magnetic storage to store and retrieve digital data.

Hardware

Graphics Processing Unit (GPU)

Specialized processor designed to accelerate graphics rendering.

Hardware

Central Processing Unit (CPU)

Primary processor executing instructions of a computer program.

Hardware

Random Access Memory (RAM)

High-speed volatile memory providing quick data access for active programs.

Hardware

Motherboard

Main circuit board connecting and enabling communication between crucial components.

Hardware

Power Supply Unit (PSU)

Hardware component converting power for computer system components.

Hardware

Network Card

Hardware component enabling network connectivity in computers.

Hardware

RAID Controller

Hardware managing multiple disk drives for redundancy or performance.

Hardware

Uninterruptible Power Supply (UPS)

Battery backup providing temporary power during outages.

Hardware

Fiber Optic Transceiver

Hardware converting optical signals to electrical signals and vice versa.

Hardware

UniFi Cloud Gateways

All-in-one solutions combining advanced routing, security features, and the capability to manage UniFi applications, ideal for large-scale deployments.

unifi-solutions

UniFi Network

A networking solution integrating internet gateways with scalable Wi-Fi and switching capabilities, providing real-time traffic dashboards and optimization tips.

unifi-solutions

UniFi Protect

An AI-driven camera platform for local video storage, featuring smart detection, customizable recording schedules, and flexible notification settings.

unifi-solutions

UniFi Access

A secure access control system with touch-screen readers, integrated video for entry/exit events, multi-tenant intercom systems, and flexible mobile credentials.

unifi-solutions

UniFi Talk

A plug-and-play VoIP system for small and medium businesses, including advanced call routing and administrative features with touchscreen phones.

unifi-solutions

UniFi Connect

An enterprise platform for managing digital signage, EV charging stations, building-wide lighting, and display content with centralized control.

unifi-solutions

UniFi Design Center

A visualization and planning tool that allows users to simulate a complete UniFi system for network optimization.

unifi-solutions

UniFi Dream Router (UDR)

All-in-one networking device combining a router, switch, access point, and network controller.

unifi-solutions

UniFi Dream Machine Pro (UDM Pro)

Enterprise-grade network appliance with integrated security gateway, network controller, and NVR capabilities.

unifi-solutions

UniFi Dream Wall

Wall-mounted network appliance combining security gateway, PoE switch, and network controller functionality.

unifi-solutions

UniFi Enterprise XG Gateway

High-performance security gateway supporting 10G WAN connectivity and advanced routing features.

unifi-solutions

UniFi Building-to-Building Bridge

Point-to-point wireless bridge solution for connecting separate network locations.

unifi-solutions

UniFi SmartPower PDU

Intelligent power distribution unit with remote monitoring and control capabilities.

unifi-solutions

UniFi Door Access Hub

Central controller for UniFi Access door control system managing multiple access points.

unifi-solutions

UniFi Network Controller

Software interface for managing and monitoring UniFi network devices and configurations.

unifi-solutions

Bandwidth

The maximum rate of data transfer across a network connection.

misc

Cache

Temporary storage area that provides fast access to frequently used data.

misc

DNS (Domain Name System)

System that translates domain names into IP addresses.

misc

HTTP (Hypertext Transfer Protocol)

Protocol for transmitting data over the World Wide Web.

misc

IP Address

Unique numerical identifier assigned to each device on a network.

misc

ISP (Internet Service Provider)

Company that provides Internet access to subscribers.

misc

LAN (Local Area Network)

Network connecting computers within a limited area.

misc

Latency

Time delay between the initiation and execution of a process.

misc

Load Balancing

Distribution of workloads across multiple computing resources.

misc

Protocol

Set of rules governing data communication between devices.

misc

Proxy Server

Server acting as an intermediary for requests between clients and other servers.

misc

QoS (Quality of Service)

Control mechanism for ensuring performance levels for critical applications.

misc

RAID (Redundant Array of Independent Disks)

Data storage technology combining multiple disk drives.

misc

Scalability

Ability of a system to handle growing amounts of work.

misc

SSL/TLS

Protocols providing secure communication over a computer network.

misc

TCP/IP

Core protocols of the Internet Protocol suite.

misc

Throughput

Actual amount of data successfully transferred through a network.

misc

URL (Uniform Resource Locator)

Reference to a web resource specifying its location on a network.

misc

WAN (Wide Area Network)

Network extending over a large geographical area.

misc

Workstation

Computer designed for technical or scientific applications.

misc

Google Workspace

Cloud-based productivity and collaboration suite including Gmail, Docs, Drive, Meet, and more.

google-workspace

Gmail for Business

Professional email service with custom domain support, enhanced security, and business features.

google-workspace

Google Drive Enterprise

Cloud storage and file sharing platform with advanced security and administration features.

google-workspace

Google Meet

Video conferencing solution supporting secure, high-quality virtual meetings and webinars.

google-workspace

Google Calendar

Scheduling and time-management application with resource booking and team calendar features.

google-workspace

Google Docs

Cloud-based document creation and editing tool with real-time collaboration capabilities.

google-workspace

Google Sheets

Online spreadsheet application with advanced data analysis and collaboration features.

google-workspace

Google Slides

Presentation software enabling collaborative creation and sharing of professional presentations.

google-workspace

Google Forms

Survey and data collection tool with automatic response gathering and analysis.

google-workspace

Google Sites

Website creation tool for building internal and external websites without coding.

google-workspace

Google Chat

Team messaging platform with direct messages, group conversations, and bot integrations.

google-workspace

Google Vault

Information governance and eDiscovery tool for managing, retaining, and searching data.

google-workspace

Google Cloud Search

Enterprise search tool providing unified search across Google Workspace and third-party services.

google-workspace

Google Admin Console

Central management interface for Google Workspace settings, users, and security policies.

google-workspace

Google Workspace Migrate

Tool for migrating content from legacy systems to Google Workspace applications.

google-workspace

Google Keep

Note-taking service integrated with Google Workspace for capturing and sharing ideas.

google-workspace

Google Groups for Business

Collaborative inbox and discussion forum tool for team communication and project management.

google-workspace

Google Workspace Marketplace

Directory of third-party applications and integrations for Google Workspace.

google-workspace

Google Workspace Essentials

Entry-level plan focusing on collaboration tools without email services.

google-workspace

Google Workspace Enterprise Plus

Premium plan offering advanced security, management, and compliance features.

google-workspace

Microsoft 365

Cloud-based subscription service combining Office applications, cloud storage, and enterprise-grade security.

microsoft-365

Microsoft Teams

Collaboration platform integrating chat, video meetings, file storage, and application integration.

microsoft-365

SharePoint Online

Cloud-based platform for creating websites, storing documents, and sharing information securely.

microsoft-365

Exchange Online

Cloud-hosted enterprise email, calendar, and contact management service.

microsoft-365

OneDrive for Business

Cloud storage service providing secure file sharing and synchronization capabilities.

microsoft-365

Microsoft Planner

Task management tool for organizing teamwork and tracking project progress.

microsoft-365

Microsoft Forms

Survey and quiz creation tool for gathering feedback and data collection.

microsoft-365

Power Automate

Workflow automation service for creating automated processes between applications.

microsoft-365

Microsoft Lists

Information tracking application for organizing work and managing data.

microsoft-365

Microsoft Stream

Enterprise video service for uploading, sharing, and managing video content.

microsoft-365

Microsoft Bookings

Scheduling and appointment management tool for service-based businesses.

microsoft-365

Microsoft To Do

Task management application for personal and professional task organization.

microsoft-365

Microsoft Whiteboard

Digital canvas for collaborative brainstorming and visual content creation.

microsoft-365

Microsoft Sway

Digital storytelling application for creating and sharing interactive reports and presentations.

microsoft-365

Microsoft Power Apps

Low-code development platform for building custom business applications.

microsoft-365

Microsoft Defender for Office 365

Advanced threat protection service safeguarding against sophisticated attacks.

microsoft-365

Microsoft Information Protection

Suite of tools for discovering, classifying, and protecting sensitive information.

microsoft-365

Microsoft Compliance Manager

Tool for managing and tracking compliance requirements and controls.

microsoft-365

Microsoft Teams Rooms

Meeting room solution integrating hardware and software for hybrid meetings.

microsoft-365

Microsoft Viva

Employee experience platform combining communications, knowledge, learning, and insights.

microsoft-365

Authentication

The process of verifying the identity of a user, device, or system, typically through passwords, biometrics, or security tokens.

authentication

Authorization

Determining the access rights or privileges of a user or system, specifying what resources they can access and what actions they can perform.

authentication

Multi-Factor Authentication (MFA)

A security system that requires multiple forms of verification before granting access, such as a password combined with a fingerprint scan or a one-time code.

authentication

Zero Trust Architecture

A security model that operates on the principle of 'never trust, always verify,' requiring strict identity verification for every person and device attempting to access resources, regardless of their location within or outside the network.

authentication

Infrastructure as a Service (IaaS)

Cloud-based services that provide virtualized computing resources over the internet.

Cloud Computing

Platform as a Service (PaaS)

Cloud services offering hardware and software tools over the internet, typically for application development.

Cloud Computing

Software as a Service (SaaS)

Software distribution model where applications are hosted by a service provider and made available to customers over the internet.

Cloud Computing

Hybrid Cloud

A computing environment combining on-premises infrastructure with public cloud services, allowing data and applications to be shared between them.

Cloud Computing

Cloud Migration

The process of moving data, applications, or other business elements to a cloud computing environment.

Cloud Computing

Cloud Security

Policies, technologies, and controls deployed to protect data, applications, and infrastructure in cloud computing environments.

Cloud Computing

Multi-Cloud Strategy

Using multiple cloud computing services from different providers to optimize resources and reduce dependency on a single vendor.

Cloud Computing

Cloud Backup

Service that makes copies of data and stores them on remote servers for disaster recovery purposes.

Cloud Computing

Cloud Storage

Online storage service allowing data to be stored, accessed, and managed in the cloud.

Cloud Computing

Cloud Orchestration

Automated arrangement, coordination, and management of complex cloud systems and services.

Cloud Computing

Twisted Pair Cable

Cabling where pairs of wires are twisted together to reduce electromagnetic interference, commonly used in Ethernet networks.

network-cabling

Cat5e

Enhanced Category 5 cabling supporting data rates up to 1 Gbps over 100 meters, commonly used in Ethernet networks.

network-cabling

Cat6

Category 6 cabling supporting up to 10 Gbps over short distances (up to 55m) and 1 Gbps over 100m, with improved specifications over Cat5e.

network-cabling

Cat6a

Augmented Category 6 cabling supporting 10 Gbps speeds over the full 100m distance, with improved alien crosstalk specifications.

network-cabling

Cat7

Category 7 cabling supporting up to 40 Gbps over 50m and 100 Gbps over 15m, featuring fully shielded cable design.

network-cabling

Cat8

Category 8 cabling supporting up to 40 Gbps over 30m, designed for high-speed data center applications.

network-cabling

Single-mode Fiber

Fiber optic cable using a single light path, ideal for long-distance transmission up to 100km.

network-cabling

Multi-mode Fiber

Fiber optic cable using multiple light paths, suitable for shorter distances up to 400m, commonly used in data centers.

network-cabling

OM4 Fiber

Laser-optimized multi-mode fiber supporting 100 Gbps over 150m, ideal for high-speed data center applications.

network-cabling

Plenum-Rated Cable

Cable designed for use in plenum spaces, featuring fire-resistant properties and low smoke emission.

network-cabling

Shielded Cable (STP)

Twisted pair cable with additional metallic shielding to protect against electromagnetic interference.

network-cabling

Unshielded Cable (UTP)

Twisted pair cable without additional shielding, commonly used in office environments.

network-cabling

Direct Burial Cable

Cable specifically designed to be installed underground without additional conduit protection.

network-cabling

Patch Panel

Hardware unit that organizes and manages network cable connections, typically mounted in a rack.

network-cabling

Cable Management

System for organizing and protecting network cables to maintain proper airflow and accessibility.

network-cabling

RJ45 Connector

Standard connector for twisted pair Ethernet cables, featuring eight pins for data transmission.

network-cabling

LC Connector

Small form-factor fiber optic connector commonly used in high-density applications.

network-cabling

MPO/MTP Connector

High-density fiber optic connector supporting multiple fiber strands, used in data center applications.

network-cabling

Cable Certification

Process of testing and verifying that installed cabling meets industry standards and specifications.

network-cabling

Structured Cabling

Standardized approach to building network infrastructure using organized cabling and associated hardware.

network-cabling

Bandwidth

The maximum rate at which data can be transferred over an internet connection, typically measured in Mbps or Gbps.

isp

Latency

The time it takes for data to travel from the source to the destination, measured in milliseconds (ms). Lower latency is essential for real-time applications.

isp

Service Level Agreement (SLA)

A contract defining the expected level of service, including uptime guarantees, response times, and performance metrics.

isp

Fiber Optic Internet

A high-speed internet connection using fiber-optic cables to transmit data as light signals, offering higher bandwidth and lower latency.

isp

Dedicated Internet Access (DIA)

A dedicated line for internet access ensuring consistent bandwidth and performance.

isp

Business Internet Plans

Specialized internet service packages designed for commercial use with enhanced reliability and support.

isp

Symmetric Internet

Internet connection providing equal upload and download speeds, ideal for business applications.

isp

Internet Redundancy

Multiple internet connections from different providers to ensure continuous service if one connection fails.

isp

Static IP Address

A fixed IP address that doesn't change, essential for hosting servers or remote access solutions.

isp

Quality of Service (QoS)

Network settings that prioritize critical business applications and traffic over less important data.

isp