Our comprehensive IT and cybersecurity glossary provides clear definitions of technical terms, industry jargon, and security concepts to help businesses understand the complex world of managed IT services, network security, and cybersecurity protection. Use this resource to better understand the technologies and services that protect your business.
A highly secure encryption method used to protect sensitive data
A way for different software programs to communicate with each other
The system that connects IP addresses to physical computer addresses on a network
Microsoft's system for managing users, computers, and permissions in a business network
A sophisticated, long-term cyber attack where hackers secretly remain inside your systems for months or years to steal information
Physically separating a secure computer from the internet for maximum protection
Technology that enables computers to mimic human thinking and learning
A security method using two different keys - one public (shared) and one private (secret)
The way computers confirm you are who you say you are, like when you enter a password
Allowing employees to use their personal phones, tablets, or laptops for work purposes
A secret way into a computer system that avoids the normal security checks, like an unlocked side door on a building
A spare copy of your important files kept safe in case something happens to the originals
How much information can travel through your internet connection at once, like the width of a water pipe
A digital ledger that records transactions across many computers so no single record can be altered retroactively
A collection of infected computers controlled by hackers to perform tasks without their owners knowing
When hackers successfully break into a system and potentially access sensitive information
Repeatedly trying different passwords until finding the correct one, like trying every possible key to unlock a door
A mistake in computer code that causes something to work incorrectly
Plans and systems that keep a business running when something goes wrong
Those puzzles on websites that ask you to identify traffic lights or type distorted text to prove you're not a robot
A network of servers around the world that delivers web content to users based on their geographic location
The U.S. government agency responsible for protecting critical infrastructure from cyber threats
A team of experts who respond to cybersecurity incidents and breaches
Information about current and potential cyber threats that helps organizations make better security decisions
A standardized system for identifying and cataloging known security vulnerabilities in software
Using internet-based services to store and access programs and data instead of your own computer
A backup location with basic infrastructure but no computers, requiring equipment to be brought in during a disaster
Following the rules and requirements that apply to your business, especially regarding data protection
Using stolen usernames and passwords from one website to try to log into other websites
The science of coding and decoding messages to keep them secure from unauthorized access
Protecting computers, networks, and data from harmful attacks, damage, or unauthorized access
Systems that prevent websites from being overwhelmed by massive amounts of fake traffic
When attackers flood a website or service with so much traffic that it crashes or becomes unusable
A system that helps prove emails really came from the sender they claim to be from
A buffer zone between your secure internal network and the unsafe outside world
The phone book of the internet that turns website names into the numeric addresses computers use
Corrupting DNS servers to redirect users to fake websites instead of the real ones they requested
Information stored on your computers, servers, or backup devices that isn't currently being used
When sensitive information gets stolen or exposed to unauthorized people
Scrambling your data so only people with the right key can read it
Information that's actively traveling between devices or across networks
A vast storage system that holds raw data in its original format until needed
Tools that stop sensitive information from leaving your company's network
Analyzing large amounts of information to find useful patterns and connections
Rules determining which country's laws apply to data based on where it's stored
A large storage system specifically designed for analyzing and reporting business data
A digital filing cabinet where information is stored in an organized way
An electronic ID card that proves a website or service is legitimate
The process of investigating digital devices to collect evidence of activities
An electronic fingerprint that confirms who created or sent a document
A plan for getting your IT systems back up and running after a major problem
Advanced security software that monitors and responds to threats on computers and devices
Converting information into a secret code to keep it private
Any device that connects to your network, like computers, phones, or tablets
Legal hacking performed by security experts to find and fix vulnerabilities before criminals can exploit them
A way to take advantage of a security weakness in software
A method for sending files between computers over a network
A security alarm that goes off when there's actually no threat, like a smoke detector triggered by burnt toast
Malicious software that operates entirely in memory without leaving traces on the hard drive
A security barrier between your network and the outside world that blocks unauthorized access
Testing software by feeding it random or unexpected data to find security flaws
European privacy laws that give people control over their personal data and how it's used
A virtual boundary that can trigger actions when devices cross it
U.S. laws that protect patient privacy and secure health information
The secure version of the protocol that loads websites in your browser, indicated by a padlock icon
A tool that automatically switches websites from HTTP to encrypted HTTPS when available
Someone who breaks into computer systems, either maliciously or to find and fix security problems
A trap set up to attract hackers to study their tactics or divert them from real systems
Systems that control which users have access to which resources and what they can do with them
A fundraising method where new cryptocurrency projects sell tokens to early investors
A security system that watches for suspicious activity on your network
A unique address that identifies a device on the internet or a local network
An advanced security system that not only detects network attacks but actively blocks them
A set of security protocols that protect information sent over the internet
The company that provides your internet connection
When someone steals your personal information to pretend to be you
Everyday objects connected to the internet, like smart thermostats or doorbell cameras
Removing limitations put on a device by its manufacturer to gain full access to the system
A secure way for computers to verify each other's identities on untrusted networks
The secret code needed to unscramble encrypted information
Software that secretly records everything you type, including passwords
Security measures designed for systems that manage containerized applications
A network that connects computers in a small area like an office
The delay between when you request something online and when you receive it
How hackers move sideways through a network after breaking in, searching for valuable data
A security measure requiring two or more verification methods to gain access, like a password plus a text message code
A comprehensive guide to how hackers operate and attack systems, based on real incidents
A specialized service provider that focuses on security monitoring and management for your business
Harmful software designed to damage or gain unauthorized access to your system, like viruses or spyware
When an attacker secretly intercepts and potentially changes communications between two people
A company that handles your IT systems for you, monitoring and maintaining them for a monthly fee
A defense strategy that constantly changes your system configuration to confuse attackers
A unique digital item with verified ownership recorded on a blockchain
An advanced firewall that can inspect traffic more deeply and block more sophisticated attacks
A security system that examines all network traffic for signs of attacks
A set of best practices from the U.S. government to help organizations manage cybersecurity risks
A system of connected computers and devices that can share information
Protecting your computer networks from intruders and attacks
Information gathered from public sources like social media and websites for security purposes
IT systems that are physically located in your building rather than in the cloud