SlideShare a Scribd company logo
digital transformation
[digi-tal trans-for-mation] / adjective - noun
Digital transformation describes the implementation and
modification of digital technologies within a business, carried
out to improve that business’ operations and services.
Businesses often opt to rethink their digital strategies in order
to increase client satisfaction - delivering optimised services
and value to clients.
managed services
[man-aged ser-vices] / adjective - noun
Managed services are administered by a trusted Managed
Service Provider (MSP). Businesses opt to partner with an MSP
in order to receive tailored IT solutions; MSPs are responsible
for delivering, installing and maintaining core IT systems and
software. Managed services are favoured for the benefit of
increased scalability, a minimised threat of downtime, and
24/7 access to IT experts.
connectivity
[con-nec-tiv-ity] / noun
Connectivity describes a device's ability to link to and
communicate with other electronic devices, systems, software,
and the internet. As a flexible and digitally connected business
is essential for growth and development, businesses must
enhance their workplace connectivity through the
implementation of digital transformation strategies.
cloud computing
[cloud com-pu-ting] / adjective - noun
Cloud computing is the delivery of IT services via the internet;
these services include servers, storage, databases and other
crucial business components. This method of using a network
of remote servers hosted in the Cloud to store, manage and
process data reduces a business' need for onsite hardware
and physical maintenance.
device deployment
[dev-ice de-ploy-ment] / noun
Device deployment encompasses all the processes involved in
delivering new software or hardware in its intended
environment - including installation, configuration, running
and testing. With the help of services such as Microsoft
Autopilot, device configuration and set-up can be completed
from any location, expediting device deployment for
employees.
the metaverse
[the meta-verse] / noun
At its core, the Metaverse is a virtual reality world that allows
users to interact, game, and experience things as they would
in the real world. Using current Augmented Reality (AR) and
Virtual Reality (VR) tech, users can immerse themselves in this
virtual world and interact with objects and people that are
being projected within the space.
cyber essentials
[cy-ber essen-tials] / noun
The Cyber Essentials Framework is a government backed IT
accreditation administered by IASME. The framework was
created to ensure businesses have the very best cybersecurity
practices in place, so clients can be reassured that their data is
secure and protected. The accreditation provides a powerful
level of security credibility for businesses, encouraging client
growth and improved business reputation.
security posture
[se-curity pos-ture] / adjective - noun
An enterprise’s security posture is determined by the strength
of its networks, information, and systems based on
information security resources (e.g., people, hardware,
software, policies), and the controls and protocols in place for
predicting and preventing cyber-attacks. Maintaining ironclad
cybersecurity practices is essential for businesses to protect
their clients' interests and business reputation.
data
[da-ta] / noun
Data is the information processed or stored by a computer or
device; business data specifically refers to the data and
personal information accessed, processed, collected, stored or
disseminated by an enterprise. Businesses are increasingly
opting to store their data within the Cloud, as this minimises
on-site hardware and provides additional data security.
SaaS
[soft-ware as a ser-vice] / noun - adjective
Software as a Service (SaaS) is a cloud based method of
delivering software. Businesses can opt to access their software
and applications through the internet, removing the need for
the installation, maintenance and use of complex software and
hardware. SaaS applications usually run as a subscription
service via a SaaS provider’s servers; with the provider managing
application access, security, and performance.
VPN
[vir-tu-al pri-vate net-work] / noun
A virtual private network (VPN) extends a private network across
a public network and enables users to send and receive data
across shared networks as if their computing devices were
directly connected to the private network. It works by hiding
your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. A VPN
encrypts your connection and disguises your data traffic online
and protects it from external access.
cybersecurity
[cy-ber-se-cu-ri-ty] / noun
Cybersecurity is the practice of deploying people, policies,
processes and technologies to protect organizations, their
critical systems and sensitive information from digital attacks.
It's core function is to protect various devices, and services from
unauthorised access to the vast amounts of personal
information we store on these devices, and online.
encryption
[en-cryp-tion] / noun
Encryption is a way of scrambling data so that only authorized
parties can understand the information. In technical terms, it is
the process of converting human-readable plaintext to
incomprehensible text, also known as ciphertext.
firewall
[fire-wall] / noun
A firewall is a network security device that monitors incoming
and outgoing network traffic and permits or blocks data packets
based on a set of security rules. Its purpose is to establish a
barrier between your internal network and incoming traffic from
external sources (such as the internet) in order to block
malicious traffic like viruses and hackers.
ransomware
[ran-som-ware] / noun
Ransomware holds victims' devices and data hostage or makes
systems unusable until a ransom is paid. Acting as a block when
deployed, this will prohibit your access to your device until you
pay the ‘ransom’ fee to its creator, often being very expensive
and difficult to remove
pentest
[pen-test] / noun
Pentest, short for penetration testing, means testing a network,
computer or system for weaknesses. Also known as ethical
hacking, it involves attempting to hack in to check for vulnerable
spots that real attackers could exploit. Results of the
penetration tests are then compiled into a report detailing the
specific vulnerabilities that were exploited, sensitive data that
was accessed and the amount of time the pen tester was able to
remain in the system undetected.
[pat-ching] / noun
Patching is the process of creating and implementing a
temporary policy that is used to mitigate exploitation risks
associated with the discovery of new security vulnerabilities. It
eliminates the potential threat of application or system security
loopholes being identified and exploited by hackers.
patching
[phish-ing] / noun
Phishing attacks are performed at scale and involve fraudulent
emails being sent to unsuspecting users. Phishing attacks often
appear to come from trusted sources (banks, brands, or even
colleagues etc.) but link to malicious sites or files that aim to
either download malware or steal sensitive information. These
attacks rely on creating urgency - requiring users to act to avoid
negative consequences (such as fraudulent activity or
undeliverable post for example). This social attack aims to
manipulate vulnerable users - be it those who are timepoor,
unaware or unsuspecting and uses these instances to obtain
sensitive information that can either be sold or used as part of
further cyber-attacks.
phishing
[spear phish-ing] / noun
Spear phishing is a cyber attack method where hackers set up a
targeted email scam, directly addressed to the victim. The
hacker attempts to convince the victim that they are familiar
with the sender. The sole purpose of spear phishing is to obtain
unauthorised access to sensitive data.
spear phishing
[whal-ing] / noun
Whaling is a form of spear phishing that specifically target high-
level executives. Similar to spear-phishing, the hacker attempts
to convince the victim that they are familiar with the sender.
Whaling takes more time and investment in researching and
crafting these highly targeted messages or emails. Whaling
usually targets those with direct access to financial or payroll
information.
whaling
[multi-ple fact-or auth-enti-cation] / noun
MFA stands for multiple factor authentication is a security
measure that requires two or more forms of verification to
access an account. It works using a username and password in
combination with other pieces of evidence. These pieces of
evidence could include a four-to-six-digit, one-time code sent to
email or to the users’ mobile phone, a PIN/passcode or a secret
question.
MFA
[an-ti-vi-rus] / noun
This is software that is used for scanning and removing viruses
from a computer. It can be scanned automatically and manually.
The automatic scan may check files that have been downloaded
and files created by software installers. It can also scan the hard
drive regularly. The manual scan allows the user to scan
individual files or the whole system whenever they believe it to
be necessary.
antivirus
[al-go-rithm] / noun
An algorithm is a set of instructions designed to preform a
specific task. Search engines use algorithms use proprietary
algorithms to display the most relevant results. In computer
programming, algorithms are created as functions.
algorithm
[a-zure] / noun
Azure is a cloud-computing platform built and operated by
Microsoft. It allows companies to run applications and host
content in the cloud. While Microsoft designed Azure to support
enterprise computing requirements the service is also available
to small businesses.
azure
[brow-ser fin-ger-print-ing] / noun
Browser fingerprinting is a method that websites use to identify
or partially identify individuals’ users or devices, even when
cookies are turned off. A browser fingerprint includes the
browser type and version, as well as your operating system,
active plugins, time zone, language and screen resolution etc.
browser fingerprinting
[e-ther-net] / noun
Ethernet is the standard way to connect computers on a
network over a wired connection. It provides a simple interface
and for connecting multiple devices, such computers, routers,
and switches. With a single router and a few Ethernet cables,
you can create a LAN, which allows all connected devices to
communicate with each other.
ethernet
[threat act-or] / noun
Any person or organisation that intentionally causes harm in the
digital sphere. They exploit weaknesses in computer, networks
and systems to carry out attacks on individuals or organisations.
threat actor
[ar-ti-fi-cial in-tel-li-gence] / noun
Often referred to as AI, it is the ability of a computer to act like a
human being, mimicking the problem making and decision-
making capabilities of the human mind.
artificial intelligence
[de-bug] / noun
Programs sometimes have small errors, called "bugs," in them.
These bugs can be minor, such as not recognizing user input, or
more serious, such as a memory leak that crashes the program.
Before releasing their software to the public, programmers
"debug" their programs, eliminating as many errors as possible.
This debugging process often takes a long time, as fixing some
errors may introduce others.
debug
[de-cryp-tion] / noun
Decryption is the process of converting encrypted data into
recognizable information. It is the opposite of encryption, which
takes readable data and makes it unrecognizable. Files and data
transfers may be encrypted to prevent unauthorized access. If
someone tries to view an encrypted document, it will appear as
a random series of characters. If someone tries to "snoop" on an
encrypted network connection, the data will not make any
sense.
decryption
[en-cod-ing] / noun
Encoding is the process of converting data from one form to
another. While "encoding" can be used as a verb, it is often used
as a noun, and refers to a specific type of encoded data. There
are several types of encoding, including image encoding, audio
and video encoding, and character encoding.
encoding
[dig-i-tal foot-print] / noun
A digital footprint is a trail of data you create while using the
Internet. It includes the websites you visit, emails you send, and
information you submit to online services.
digital footprint
[spoof-ing] / noun
In the IT world, spoofing refers tricking or deceiving computer
systems or other computer users. This is typically done by
hiding one's identity or faking the identity of another user on
the Internet.
spoofing
[in-ter-net pro-to-col add-ress] / noun
An IP address, or simply an "IP," is a unique address that
identifies a device on the Internet or a local network. It allows a
system to be recognized by other systems connected via the
Internet protocol.
IP address
[ad-vers-a-ry-in-the-mid-dle] / noun
Adversary-in-the-middle is a phishing technique which the
attacker can steal and intercept the victim’s password, hijack
login sessions and ignore the authentication process as AiTM is
not related to a vulnerability in the MFA.
AiTM
[ad-vers-a-ry-in-the-mid-dle] / noun
Adversary-in-the-middle is a phishing technique which the
attacker can steal and intercept the victim’s password, hijack
login sessions and ignore the authentication process as AiTM is
not related to a vulnerability in the MFA.
AiTM

More Related Content

Similar to IT Vocabulary

PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
MinnySkyy
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Case study
Case studyCase study
A017130104
A017130104A017130104
A017130104
IOSR Journals
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
Charles McNeil
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
RRamyaDevi
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
jeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
todd521
 

Similar to IT Vocabulary (20)

PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Case study
Case studyCase study
Case study
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
information security technology
information security technologyinformation security technology
information security technology
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 

Recently uploaded

Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
BrainSell Technologies
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
DianaGray10
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
DianaGray10
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
Zilliz
 
Tailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer InsightsTailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer Insights
SynapseIndia
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
Arpan Buwa
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
shanihomely
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
Google Developer Group - Harare
 

Recently uploaded (20)

Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
 
Tailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer InsightsTailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer Insights
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
 

IT Vocabulary

  • 1. digital transformation [digi-tal trans-for-mation] / adjective - noun Digital transformation describes the implementation and modification of digital technologies within a business, carried out to improve that business’ operations and services. Businesses often opt to rethink their digital strategies in order to increase client satisfaction - delivering optimised services and value to clients.
  • 2. managed services [man-aged ser-vices] / adjective - noun Managed services are administered by a trusted Managed Service Provider (MSP). Businesses opt to partner with an MSP in order to receive tailored IT solutions; MSPs are responsible for delivering, installing and maintaining core IT systems and software. Managed services are favoured for the benefit of increased scalability, a minimised threat of downtime, and 24/7 access to IT experts.
  • 3. connectivity [con-nec-tiv-ity] / noun Connectivity describes a device's ability to link to and communicate with other electronic devices, systems, software, and the internet. As a flexible and digitally connected business is essential for growth and development, businesses must enhance their workplace connectivity through the implementation of digital transformation strategies.
  • 4. cloud computing [cloud com-pu-ting] / adjective - noun Cloud computing is the delivery of IT services via the internet; these services include servers, storage, databases and other crucial business components. This method of using a network of remote servers hosted in the Cloud to store, manage and process data reduces a business' need for onsite hardware and physical maintenance.
  • 5. device deployment [dev-ice de-ploy-ment] / noun Device deployment encompasses all the processes involved in delivering new software or hardware in its intended environment - including installation, configuration, running and testing. With the help of services such as Microsoft Autopilot, device configuration and set-up can be completed from any location, expediting device deployment for employees.
  • 6. the metaverse [the meta-verse] / noun At its core, the Metaverse is a virtual reality world that allows users to interact, game, and experience things as they would in the real world. Using current Augmented Reality (AR) and Virtual Reality (VR) tech, users can immerse themselves in this virtual world and interact with objects and people that are being projected within the space.
  • 7. cyber essentials [cy-ber essen-tials] / noun The Cyber Essentials Framework is a government backed IT accreditation administered by IASME. The framework was created to ensure businesses have the very best cybersecurity practices in place, so clients can be reassured that their data is secure and protected. The accreditation provides a powerful level of security credibility for businesses, encouraging client growth and improved business reputation.
  • 8. security posture [se-curity pos-ture] / adjective - noun An enterprise’s security posture is determined by the strength of its networks, information, and systems based on information security resources (e.g., people, hardware, software, policies), and the controls and protocols in place for predicting and preventing cyber-attacks. Maintaining ironclad cybersecurity practices is essential for businesses to protect their clients' interests and business reputation.
  • 9. data [da-ta] / noun Data is the information processed or stored by a computer or device; business data specifically refers to the data and personal information accessed, processed, collected, stored or disseminated by an enterprise. Businesses are increasingly opting to store their data within the Cloud, as this minimises on-site hardware and provides additional data security.
  • 10. SaaS [soft-ware as a ser-vice] / noun - adjective Software as a Service (SaaS) is a cloud based method of delivering software. Businesses can opt to access their software and applications through the internet, removing the need for the installation, maintenance and use of complex software and hardware. SaaS applications usually run as a subscription service via a SaaS provider’s servers; with the provider managing application access, security, and performance.
  • 11. VPN [vir-tu-al pri-vate net-work] / noun A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared networks as if their computing devices were directly connected to the private network. It works by hiding your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. A VPN encrypts your connection and disguises your data traffic online and protects it from external access.
  • 12. cybersecurity [cy-ber-se-cu-ri-ty] / noun Cybersecurity is the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks. It's core function is to protect various devices, and services from unauthorised access to the vast amounts of personal information we store on these devices, and online.
  • 13. encryption [en-cryp-tion] / noun Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
  • 14. firewall [fire-wall] / noun A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers.
  • 15. ransomware [ran-som-ware] / noun Ransomware holds victims' devices and data hostage or makes systems unusable until a ransom is paid. Acting as a block when deployed, this will prohibit your access to your device until you pay the ‘ransom’ fee to its creator, often being very expensive and difficult to remove
  • 16. pentest [pen-test] / noun Pentest, short for penetration testing, means testing a network, computer or system for weaknesses. Also known as ethical hacking, it involves attempting to hack in to check for vulnerable spots that real attackers could exploit. Results of the penetration tests are then compiled into a report detailing the specific vulnerabilities that were exploited, sensitive data that was accessed and the amount of time the pen tester was able to remain in the system undetected.
  • 17. [pat-ching] / noun Patching is the process of creating and implementing a temporary policy that is used to mitigate exploitation risks associated with the discovery of new security vulnerabilities. It eliminates the potential threat of application or system security loopholes being identified and exploited by hackers. patching
  • 18. [phish-ing] / noun Phishing attacks are performed at scale and involve fraudulent emails being sent to unsuspecting users. Phishing attacks often appear to come from trusted sources (banks, brands, or even colleagues etc.) but link to malicious sites or files that aim to either download malware or steal sensitive information. These attacks rely on creating urgency - requiring users to act to avoid negative consequences (such as fraudulent activity or undeliverable post for example). This social attack aims to manipulate vulnerable users - be it those who are timepoor, unaware or unsuspecting and uses these instances to obtain sensitive information that can either be sold or used as part of further cyber-attacks. phishing
  • 19. [spear phish-ing] / noun Spear phishing is a cyber attack method where hackers set up a targeted email scam, directly addressed to the victim. The hacker attempts to convince the victim that they are familiar with the sender. The sole purpose of spear phishing is to obtain unauthorised access to sensitive data. spear phishing
  • 20. [whal-ing] / noun Whaling is a form of spear phishing that specifically target high- level executives. Similar to spear-phishing, the hacker attempts to convince the victim that they are familiar with the sender. Whaling takes more time and investment in researching and crafting these highly targeted messages or emails. Whaling usually targets those with direct access to financial or payroll information. whaling
  • 21. [multi-ple fact-or auth-enti-cation] / noun MFA stands for multiple factor authentication is a security measure that requires two or more forms of verification to access an account. It works using a username and password in combination with other pieces of evidence. These pieces of evidence could include a four-to-six-digit, one-time code sent to email or to the users’ mobile phone, a PIN/passcode or a secret question. MFA
  • 22. [an-ti-vi-rus] / noun This is software that is used for scanning and removing viruses from a computer. It can be scanned automatically and manually. The automatic scan may check files that have been downloaded and files created by software installers. It can also scan the hard drive regularly. The manual scan allows the user to scan individual files or the whole system whenever they believe it to be necessary. antivirus
  • 23. [al-go-rithm] / noun An algorithm is a set of instructions designed to preform a specific task. Search engines use algorithms use proprietary algorithms to display the most relevant results. In computer programming, algorithms are created as functions. algorithm
  • 24. [a-zure] / noun Azure is a cloud-computing platform built and operated by Microsoft. It allows companies to run applications and host content in the cloud. While Microsoft designed Azure to support enterprise computing requirements the service is also available to small businesses. azure
  • 25. [brow-ser fin-ger-print-ing] / noun Browser fingerprinting is a method that websites use to identify or partially identify individuals’ users or devices, even when cookies are turned off. A browser fingerprint includes the browser type and version, as well as your operating system, active plugins, time zone, language and screen resolution etc. browser fingerprinting
  • 26. [e-ther-net] / noun Ethernet is the standard way to connect computers on a network over a wired connection. It provides a simple interface and for connecting multiple devices, such computers, routers, and switches. With a single router and a few Ethernet cables, you can create a LAN, which allows all connected devices to communicate with each other. ethernet
  • 27. [threat act-or] / noun Any person or organisation that intentionally causes harm in the digital sphere. They exploit weaknesses in computer, networks and systems to carry out attacks on individuals or organisations. threat actor
  • 28. [ar-ti-fi-cial in-tel-li-gence] / noun Often referred to as AI, it is the ability of a computer to act like a human being, mimicking the problem making and decision- making capabilities of the human mind. artificial intelligence
  • 29. [de-bug] / noun Programs sometimes have small errors, called "bugs," in them. These bugs can be minor, such as not recognizing user input, or more serious, such as a memory leak that crashes the program. Before releasing their software to the public, programmers "debug" their programs, eliminating as many errors as possible. This debugging process often takes a long time, as fixing some errors may introduce others. debug
  • 30. [de-cryp-tion] / noun Decryption is the process of converting encrypted data into recognizable information. It is the opposite of encryption, which takes readable data and makes it unrecognizable. Files and data transfers may be encrypted to prevent unauthorized access. If someone tries to view an encrypted document, it will appear as a random series of characters. If someone tries to "snoop" on an encrypted network connection, the data will not make any sense. decryption
  • 31. [en-cod-ing] / noun Encoding is the process of converting data from one form to another. While "encoding" can be used as a verb, it is often used as a noun, and refers to a specific type of encoded data. There are several types of encoding, including image encoding, audio and video encoding, and character encoding. encoding
  • 32. [dig-i-tal foot-print] / noun A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. digital footprint
  • 33. [spoof-ing] / noun In the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet. spoofing
  • 34. [in-ter-net pro-to-col add-ress] / noun An IP address, or simply an "IP," is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. IP address
  • 35. [ad-vers-a-ry-in-the-mid-dle] / noun Adversary-in-the-middle is a phishing technique which the attacker can steal and intercept the victim’s password, hijack login sessions and ignore the authentication process as AiTM is not related to a vulnerability in the MFA. AiTM
  • 36. [ad-vers-a-ry-in-the-mid-dle] / noun Adversary-in-the-middle is a phishing technique which the attacker can steal and intercept the victim’s password, hijack login sessions and ignore the authentication process as AiTM is not related to a vulnerability in the MFA. AiTM