The IT industry is chock full of its own lingo. Below are definitions for some of the most common words and terms in today's technology vocabulary.

 

A

Access point: A device that allows wireless-equipped computers and other devices to communicate with a wired network.

Alias: A short, easy to remember name created for use in place of a longer, more complicated name; commonly used in e-mail applications. Also referred to as a “nickname”.

Authentication: The process of identifying yourself and the verification that you’re who you say you are. Computers where restricted information is stored may require you to enter your username and password to gain access.

Antivirus – Software to detect and remediate malware introduced by web browsing, email malicious applications.

 

B

Bandwidth: A measurement of the amount of data that can be transmitted over a network at any given time. The higher the network’s bandwidth, the greater the volume of data that can be transmitted. Network bandwidth is usually expressed in bits per second (bps); modern networks typically have speeds measured in the millions of bits per second (megabits per second, or Mbps) or billions of bits per second (gigabits per second, or Gbps).

Business Continuity: Activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. These activities include many daily chores such as project management, system backups, change control, and help desk. Business Continuity is not something implemented at the time of a disaster; Business Continuity refers to those activities performed daily to maintain service, consistency, and recoverability.

BYOD: Bring Your Own Device or “BYOD” is a business and technology policy that allows employees to bring in personal mobile devices and use these devices to access company data, email, etc.

 

C

Cache: A set of files saved on your hard disk that help your browser display pages you have already visited more quickly. It displays the files from your hard disk instead of the web.

Cloud: A common shorthand for a provided cloud computing services (or even an aggregation of all existing cloud services) is “The Cloud”. The cloud, simply, refers to software and services that run on the Internet instead of your computer. Apple iCloud, Dropbox, Netflix, Amazon Cloud Drive, Flickr, Google Drive, Microsoft Office 365, Yahoo Mail — those are all cloud services.

Content Management: Content management is a collection of tools, software and processes that allow you to collect, manage and publish information on any medium. Content management also ensures that whatever content you have is indexable or searchable, making it easy for users to find that information.  It also encompasses deletion of content.

Cookie: A small piece of information you may be asked to accept when connecting to certain servers via a web browser. It is used throughout your session as a means of identifying you. A cookie is specific to, and sent only to the server that generated it.

CPU: Central processing unit; the part of a computer that oversees all operations and calculations.

Cross-Platform: Cross-platform (a.k.a. agnostic, agnostic application and agnostic platform) refers to something that is interoperable among different operating systems, systems and platforms. Cross-platform, however, is more focused on software that can run on any operating system and on any processor architecture.

Crowdsourcing: Crowdsourcing means the outsourcing of your tasks to, well, a crowd of people. That is, you will have a loosely defined group, which will do the work for you.  Crowdsourcing takes away the task that you have to do in-house or by using an employee and letting a bigger group of people do it.  In IT, crowdsourcing usually involves the general public.

CSP: Cloud Service Provider; a business model for providing cloud services.

CSS: Cascading Style Sheet; A set of rules that define how web pages are displayed using CSS, designers can create rules that define how page.

Customer Relationship Management: Customer relationship management refers to a set of processes, tools, technologies and software that help businesses manage their relationships with their customers. For instance, a customer relationship management software would be able to give businesses enough details about their customers from the level of communication that has been done by each customer and when.  This allows businesses to personalize and customize their contacts with the customer to gain more sales.

Cyber-attack - Any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a computing resource.

Cybersecurity - The protection of computer systems and networks from theft, damage or misuse.

 

D

Database: A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system. Traditional databases are organized by fields, records (a complete set of fields), and files (a collection of records). Alternatively, in a Hypertext database, any object (e.g., text, a picture, or a film) can be linked to any other object.

Data center: Facility used to house computer systems and associated components, such as telecommunications and storage systems. Generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices.

Desktop: On computers like IBM PC or compatibles and Macintoshes, the backdrop where windows and icons for disks and applications reside.

Devices: Input devices include things like microphones, keyboards, mouse, touchpads, wheels, joysticks, etc. Output devices include printers, monitors, projectors and speakers.

DHCP: Dynamic Host Configuration Protocol; a protocol that lets a server on a local network assign temporary IP addresses to a computer or other network devices.

Dialog box: Sometimes referred to as a window; on a graphical user interface system, an enclosed area displayed by a program or process to prompt a user for entry of information in one or more boxes (fields).

Disaster recovery: Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Disruptive Technology: New technology that surprisingly displaces an already established one.

DNS: The domain name system is how computers convert human-readable domain names and hostnames to numerical IP addresses. When you type howtogeek.com into your web browser’s address bar, your computer contacts its DNS server and the DNS server replies with the numerical IP address of How-To Geek’s server, which is what your computer connects to.

DHCP: The dynamic host configuration protocol allows computers to automatically request and be assigned IP addresses and other network settings. For example, when you connect your laptop or smartphone to your Wi-Fi network, your device asks the router for an IP address using DHCP and the router assigns an IP address. This simplifies things — you don’t have to set up static IP addresses manually.

Domain Name: Domain names are the base part of website names like howtogeek.com or google.com. Note that domain names are just another type of hostname.

Domain: Part of an Internet address. The network hierarchy consists of domains and subdomains. At the top are a number of major categories (e.g., com, edu, gov); next are domains within these categories (e.g., ohio-state); and then there are subdomains. The computer name is at the lowest level of the hierarchy.

Download: The process of transferring one or more files from a remote computer to your local computer. The opposite action is upload.

 

E

EHR/EMR/PHR (Electronic Health Record/Electronic Health Record/Personal Health Record) these three are together because people often use them interchangeably. EMR stands for Electronic Medical Record, EHR stands for Electronic Health Record and PHR stands for Personal Health Record.

Encryption: The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.

Ethernet: Ethernet is the standard wired network technology in use almost everywhere today. If your computer is connected to a network via a cable, it’s likely using an Ethernet cable. That cable plugs into an Ethernet port on your computer.

Ethernet card: An adapter card that fits into a computer and connects to Ethernet cabling; different types of adaptor cards fit specific computers.

 

F

Female connector: A cable connector that has holes and plugs into a port or interface to connect one device to another.

Filter: Refers to: 1) a program that has the function of translating data into a different format (e.g., a program used to import or export data or a particular file); 2) a pattern that prevents non-matching data from passing through (e.g., email filters); and 3) in paint programs and image editors, a special effect that can be applied to a bit map.

Firewall: A firewall is a piece of software or hardware that blocks certain types of traffic. For example, a firewall could block incoming traffic on a certain port or block all incoming traffic except traffic coming from a specific IP address.

Flash drive: A small device that plugs into computer’s USB port and functions as a portable hard drive.

FTP: File Transfer Protocol; a method of exchanging files between computers via the Internet. A program like WS FTP for IBM PC or compatibles or Fetch for Macintosh is required. Files can contain documents or programs and can be ASCII text or binary data.

 

G

Gateway: A gateway is a device that routes traffic between networks. For example, at home, your router is your gateway. It provides a “gateway” between your LAN and WAN.

Gigabyte (Gig or GB): 1024 x 1024 x 1024 (2 to the 30th power) bytes; it’s usually sufficient to think of a gigabyte as approximately one billion bytes or 1000 megabytes.

 

H

Help desk: A help desk is an information and assistance resource that troubleshoots problems with computers or similar products.

Hostnames: A hostname is a human-readable label that points to a device connected to a network. For example, on your home network, your Windows computer’s hostname may be WINDOWSPC. Your other devices can connect to WINDOWSPC and will be pointed at that computer’s local IP address.

HTML: HyperText Markup Language; a language used for creating web pages. Various instructions and sets of tags are used to define how the document will look.

HTTP: The hypertext transfer protocol is the standard protocol modern web browsers and the web itself uses. FTP and BitTorrent are examples of alternative protocols.

 

I

IaaS: Infrastructure as a Service; In the most basic cloud-service model, providers of IaaS offer computers – physical or (more often) virtual machines – and other resources.

IP Address: An Internet Protocol address, or IP address, is a numerical address that corresponds to your computer on a network. When a computer wants to connect to another computer, it connects to that computer’s IP address.

IPsec – Internet Protocol Security. is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an IP network.

ISP: Your Internet service provider is the company that provides you with your Internet connection. For example, your ISP may be Comcast, Time Warner, or whatever other company you’re paying each month.

ITIL®The Information Technology Infrastructure Library (ITIL®) sets forth the best practices and standards for providing IT services.

 

L

LAN: local area network is a small network that’s confined to a local area. For example, your home network or an office network is a LAN. Connects a group of computers for the purpose of sharing resources such as programs, documents, or printers. Shared files often are stored on a central file server.

Localhost: The hostname “localhost” always corresponds to the device you’re using. This uses the loopback network interface — a network interface implemented in software — to connect directly to your own PC.

 

M

MAC: Media Access Control; The hardware address of a device connected to a shared network.

MAC Address: Each network interface has a media access control address, or MAC address — also known as a physical address. This is a unique identifier designed to identify different computers on a network. MAC addresses are usually assigned when a manufacturer creates a network device.

Mail server: A networked computer dedicated to supporting electronic mail. You use a client program like Microsoft Outlook for retrieving new mail from the server and for composing and sending messages.

Male connector: A cable connector that has pins and plugs into a port or interface to connect one device to another.

Malware - Any software intentionally designed to cause damage to a computer, server, client, or computer network.

MDM: Mobile Device Management; Any routine or tool intended to distribute applications, data, and configuration settings to mobile communications devices. The intent of MDM is to optimize the functionality and security of a mobile communications network. MDM must be part of a coherent BYOD strategy.

MDR: Managed detection and response (MDR) is an outsourced service that provides organizations with threat hunting services and responds to threats once they are discovered. It also involves a human element: Security providers provide their MDR customers access to their pool of security researchers and engineers, who are responsible for monitoring networks, analyzing incidents, and responding to security cases.

Megabyte (Meg or MB): 1,024 x 1,024 (2 to the 20th power) bytes; it’s usually sufficient to think of a megabytes as one million bytes.

Microsoft Exchange: Microsoft Exchange Server is the server side of a client–server, collaborative application product developed by Microsoft. It is part of the Microsoft Servers line of server products and is used by enterprises using Microsoft infrastructure products. Exchange’s major features consist of electronic mail, calendaring, contacts and tasks; support for mobile and web-based access to information; and support for data storage

Microsoft Windows: A group of operating systems for PC or compatible computers; Windows provides a graphical user interface so you can point and click to indicate what you want to do.

MIME: Multipurpose Internet Mail Extensions; a protocol that enables you to include various types of files (text, audio, video, images, etc.) as an attachment to an e-mail message.

Monitor: The part of a computer that contains the screen where messages to and from the central processing unit (CPU) are displayed. Monitors come in a variety of sizes and resolutions. The higher the number of pixels a screen can display, the better the resolution.

MSP: Managed Service Provider; A business model for providing information-technology services.

MFA or Multi-Factor Authentication: An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. Two-factor authentication is a type, or subset, of multi-factor authentication.

 

N

Nameserver: A computer that runs a program for converting Internet domain names into the corresponding IP addresses and vice versa.

NAT: Network Address Translation; a standard that enables a LAN to use a set of IP addresses for internal traffic and a single IP address for communications with the Internet.

Network: A group of interconnected computers capable of exchanging information. A network can be as few as several personal computers on a LAN or as large as the Internet, a worldwide network of computers.

Network adapter: A device that connects your computer to a network; also called an adapter card or network interface card.

Network hub: A common connection point for devices on a network.

Network Interface / Network Adapter: Your computer’s wired Ethernet connection and Wi-Fi connection are basically both network interfaces. If your laptop was connected to both a wired connection and a Wi-Fi network, each network interface would have its own IP address. Each is a different connection.

NNTP: Network News Transport Protocol; the protocol used for posting, distributing, and retrieving network news messages.

 

O

On-site: At-place-of-work-or-business support, typically provided by a technically qualified individual.

 

P

Patch: Piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance.

PC: Usually refers to an IBM PC or compatible, or when used generically, to a “personal computer”. In a different context, PC also is an abbreviation for “politically correct.”

Port: When an application wants to send or receive traffic, it has to use a numbered port between 1 to 65535. This is how you can have multiple applications on a computer using the network and each application knows which traffic is for it.

Protocol – TCP, UDP, ICMP, etc.: Protocols are different ways of communicating over the Internet. TCP and UDP are the most common protocols. The ICMP protocol is also used, but primarily so network devices can check each other’s status. Different protocols are ideal for different types of communication.

 

R

RAM: Random Access Memory provides space for your computer to read and write data so that the CPU can find it quickly and easily. When people refer to memory upgrades they are usually talking about RAM.

Ransomware – A form of malware that either threatens to publish a victim’s data or block access until a ransom is paid.

Remote desktop: A Windows feature that allows you to have access to a Windows session from another computer in a different location

Remote login: An interactive connection from your desktop computer over a network or telephone lines to a computer in another location (remote site).

Router: A device used for connecting two Local Area Networks (LANs); a device that passes traffic back and forth. You likely have a home router. It’s that router’s job to pass outgoing traffic from your local devices to the Internet, and to pass incoming traffic from the Internet to your devices.

 

S

A domain name, server name or hostname.

An organization needs to install the SSL Certificate onto its web server to initiate secure sessions with browsers. Depending on the type of SSL Certificate applied for, the organization will need to go through differing levels of vetting. Once installed, it is possible to connect to the website over https://www.domain.com, as this tells the server to establish a secure connection with the browser. Once a secure connection is established, all web traffic between the web server and the web browser will be secure. To view the details of an SSL Certificate, go to a secure site, click on the padlock and select “View Certificate”. All browsers are slightly different, but the Certificate always contains the same information.

An organizational identity (i.e. company name) and location.

SAN: A storage area network (SAN) is a dedicated storage network that provides access to consolidated, block level storage. SANs primarily are used to make storage devices (such as disk arrays, tape libraries, and optical jukeboxes) accessible to servers so that the devices appear as locally attached to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the regular network by regular devices.

SD-WAN: SD-WAN is an acronym for software-defined networking in a wide area network. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism.

Security Appliance - Active devices block unwanted data traffic coming into a network. Examples of such devices are firewalls, anti-virus scanning devices, and content filtering devices or passive devices that detect and report unwanted traffic.

Security Operations Center (SOC): A centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology. Typically, a SOC is equipped for access monitoring, and controlling of lighting, alarms, and vehicle barriers.

Serial port: An interface on a computer that supports transmission of a single bit at a time; can be used for connecting almost any type of external device including a mouse, a modem, or a printer.

Server: A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer. Also referred to as a “file server”.

Shoulder-surfing - a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.

SID: Service Set Identifier; a name that identifies a wireless network.

SIEM: Security information and event management (SIEM), software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.

SMB: The Server Message Block Protocol (SMB protocol) provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network.

SMPT: Simple Mail Transfer Protocol is an Internet standard for e-mail transmission.

SMTP: Simple Mail Transfer Protocol; a method of handling outgoing electronic mail.

SOC-as-a-service: A subscription- or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams. The service provides companies with the knowledge and skills necessary to combat cyber-security threats.

Social Engineering - The psychological manipulation of people into performing actions or divulging confidential information.

Software: Any program that performs a specific function. Examples: word processing, spreadsheet calculations, or electronic mail.

Spam: Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users’ address books, and are sold to other spammers.

SSL: Small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browser. Typically, SSL is used to secure credit card transactions, data transfer and logins, and more recently is becoming the norm when securing browsing of social media sites. SSL Certificates bind together:

Switch: A switch serves as a controller, enabling networked devices to talk to each other efficiently. Through information sharing and resource allocation, switches save businesses money and increase employee productivity.

What is a Network Switch: Managed Switches: A managed network switch is configurable, offering greater flexibility and capacity than an unmanaged switch. You can monitor and adjust a managed switch locally or remotely, to give you greater network control.

What is a Network Switch: Unmanaged Switches: An unmanaged switch works right out of the box. It’s not designed to be configured, so you don’t have to worry about installing or setting it up correctly. Unmanaged switches have less network capacity than managed switches. You’ll usually find unmanaged switches in home networking equipment.

 

T

TCP/IP: Transmission Control Protocol/Internet Protocol; an agreed upon set of rules that tells computers how to exchange information over the Internet. Other Internet protocols like FTP, Gopher, and HTTP sit on top of TCP/IP.

Two-factor authentication: An extra level of security achieved using a security token device; users have a personal identification number (PIN) that identifies them as the owner of a particular token. The token displays a number which is entered following the PIN number to uniquely identify the owner to a particular network service. The identification number for each user is changed frequently, usually every few minutes.

 

U

USB: Universal Serial Bus; a connector on the back of almost any new computer that allows you to quickly and easily attach external devices such as mice, joysticks or flight yokes, printers, scanners, modems, speakers, digital cameras or webcams, or external storage devices.

Username: A name used in conjunction with a password to gain access to a computer system or a network service.

URL: A uniform resource locator, or URL, is also known as a web address. The current URL is displayed in your web browser’s address bar.

USB port: An interface used for connecting a Universal Serial Bus (USB) device to computer; these ports support plug and play.

 

V

Virtualization: Virtualization is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources. In hardware virtualization, the term host machine refers to the actual machine on which the virtualization takes place; the term guest machine, however, refers to the virtual machine.

Virus: A program intended to alter data on a computer in an invisible fashion, usually for mischievous or destructive purposes. Viruses are often transferred across the Internet as well as by infected diskettes and can affect almost every type of computer. Special antivirus programs are used to detect and eliminate them.

VoIP: Voice over Internet Protocol; a means of using the Internet as the transmission medium for phone calls. An advantage is you do not incur any additional surcharges beyond the cost of your Internet access.

VPN: Virtual Private Networking; a means of securely accessing resources on a network by connecting to a remote access server through the Internet or other network.

 

W

WAN: wide area network is a larger network that covers a wider area. Your ISP provides you with a connection to their own WAN, which connects to the Internet.

WAP: Wireless Application Protocol; a set of communication protocols for enabling wireless access to the Internet.

WEP: Wired Equivalent Privacy; a security protocol for wireless local area networks defined in the 802.11b standard. WEP provides the same level of security as that of a wired LAN.

Wi-Fi: Wireless Fidelity; A generic term from the Wi-Fi Alliance that refers to of any type of 802.11 network (e.g., 802.11b, 802.11a, dual-band, etc.). Products approved as “Wi-Fi Certified” (a registered trademark) are certified as inter-operable with each other for wireless communications.

Window: On a graphical user interface system, a rectangular area on a display screen. Windows are particularly useful on multitasking systems which allow you to perform a number of different tasks simultaneously. Each task has its own window which you can click on to make it the current process. Contrast to a “dialog box” which is used to respond to prompts for input from an application.

Windows: A casual way of referring to the Microsoft Windows operating systems.

Wireless (networking): The ability to access the Internet without a physical network connection. Devices such as cell phones and PDAs that allow you to send and receive email use a wireless Internet connection based on a protocol called WAP (Wireless Application Protocol). At this point, web sites that contain wireless Internet content are limited, but will multiply as the use of devices relying on WAP increases.

WLAN: Wireless Local Area Network; the computers and devices that make up a wireless network.

WPA: Wi-Fi Protected Access; a standard designed to improve on the security features of WEP.

 

Z

Zero-day exploit – A computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability.