IT Terminology Glossary
A Glossary of Common IT Terms and IT Definitions.
The information technology world has it’s own language. We’ve provided a glossary of some of the more commonly used terms, acronyms, and phrases used in Information Technology below.
A
Access Point
In networking, an access point (AP) is a device that allows wireless devices to connect to a wired network. It acts as a bridge between wireless devices and the wired infrastructure, enabling communication and internet access for devices like laptops, smartphones, and tablets. Essentially, an access point provides a wireless “portal” to a wired network.
Address
In computer networking, an address identifies the location of an Internet resource. These can be email addresses, web addresses or numeric internet addresses.
Alias
A short, easy to remember name created for use in place of a longer, more complicated name; commonly used in e-mail applications. In networking, an alias is a secondary or alternate name assigned to a network resource, like an IP address or a group of addresses, making it easier to manage and refer to that resource. Think of it as a nickname for an IP address or a group of them.
Amazon Web Services (AWS)
Amazon Web Services is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis.
Anti-spam
Anti-spam refers to technologies and techniques used to identify and block unwanted or unsolicited email (spam) from reaching users’ inboxes. It’s a crucial part of email security, helping to protect users from phishing attacks, malware, and other harmful content often found in spam emails.
Application
A computer application, also known as software or an app, is a type of computer program designed to perform specific tasks for users. It’s essentially a set of instructions that tell the computer what to do, enabling users to interact with digital systems and accomplish various tasks.
Application Programming Interface (API)
A computing interface that defines interactions between multiple software intermediaries. It defines the kinds of calls or requests that can be made, how to make them, the data formats that should be used, the conventions to follow.
APT
An Advanced Persistent Threat (APT) is a stealthy computer network threat actor, typically a nation-state or state-sponsored group, that gains unauthorized access to a computer network and remains undetected for an extended period.
Attachment
In the context of computers, an attachment refers to a file that is sent along with an email, message, or other communication. It’s a separate file linked to the main message, enabling users to share documents, images, videos, and other files.
Artificial Intelligence (AI)
Artificial Intelligence (AI) is the emulation of human intelligence by machines, enabling them to perform tasks such as learning, reasoning, problem-solving, and understanding natural language.
Authentication
Authentication is the process of verifying a user’s identity before granting access to a system, network, or resource. It’s essentially the digital equivalent of showing your ID to prove who you are. This verification process ensures that only authorized individuals or entities can access sensitive information and systems.
B
Backbone
In networking, a backbone (also known as a core network) is the central, high-capacity network that connects different networks or subnetworks, enabling them to communicate with each other. Think of it as the “highway” of a network, handling the bulk of data traffic between various parts.
Bandwidth
Bandwidth is a measurement of the amount of data that can be transmitted over a network at any given time. The higher the network’s bandwidth, the greater the volume of data that can be transmitted. Network bandwidth is usually expressed in bits per second (bps); modern networks typically have speeds measured in the millions of bits per second (megabits per second, or Mbps) or billions of bits per second (gigabits per second, or Gbps). This is sometimes referred to as Internet speed.
Bit
A binary digit (either 0 or 1); it is the most basic unit of data that can be recognized and processed by a computer.
Blockchain
A growing list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block’s timestamp and transaction data. By design, a blockchain is resistant to modification of the data.
Blog
A Blog is shorthand for a “web log”, a web page that contains journal-like entries that are updated daily for public viewing. Blogs are typically displayed in chronological order, with the most recent posts appearing first. They often features informal, conversational writing and can be used for personal reflections, sharing expertise, or as a marketing tool.
Bluetooth
Bluetooth is a wireless technology that enables short-range communication between devices. It allows devices like smartphones, computers, headphones, and other peripherals to exchange data without needing cables or wires.
BMP
A BMP file, also known as a bitmap file, is a graphics image file format primarily used for storing digital images. It’s known for its ability to display images accurately regardless of the display device.
Bookmark
In the context of computers, a bookmark is a feature in web browsers that allows users to save the address (URL) of a website or webpage for easy access later.
Bounce
A bounce often refers to a failed email delivery, where a message is returned to the sender because it couldn’t be delivered, often due to an incorrect address.
Break/Fix
The term break/fix refers to the fee-for-service method of providing information technology services to businesses. Using this method, an IT solution provider performs services as needed and bills the customer only for the work done.
Bridge
A bridge is a device used for connecting two Local Area Networks (LANs) or two segments of the same LAN. Bridges forward packets without analyzing or re-routing them.
Browser
A web browser is a software application that allows you to access and view websites on the internet. It acts as a portal, enabling you to navigate the World Wide Web, view content like text, images, and videos, and interact with websites. Examples: Google Chrome, Apple Safari, Microsoft Edge
Buffering
Buffering refers to the process of temporarily storing data in a reserved memory area (a buffer) to handle discrepancies in data flow rates or to improve performance during data processing or transmission. This is commonly used in streaming video and audio, where the buffer ensures smooth playback by preloading content before it’s needed. A spinning wheel on your TV or computer screen usually indicates that the system is buffering – attempting to download more data to resume smooth playback. Constant buffering can be an indication of network or connectivity issues.
Business Continuity
Activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. These activities include many daily chores such as project management, system backups, change control, and help desk. Business Continuity is not something implemented at the time of a disaster; Business Continuity refers to those activities performed daily to maintain service, consistency, and recoverability.
Business Continuity Plan (BCP)
A Business Continuity Plan (BCP) is a comprehensive document outlining how an organization will maintain or quickly resume critical business functions during and after a disruptive event. It details procedures and instructions to minimize downtime and ensure business viability, covering everything from potential risks like natural disasters and cyberattacks to human error.
Business Intelligence (BI)
Business Intelligence (BI) refers to technologies, applications, and practices used to collect, analyze, and present business information to support decision-making. BI helps organizations understand their data to identify trends, solve problems, and improve performance.
BSOD
The “Blue Screen of Death” (BSOD) is a common term for a stop error in Microsoft Windows. It indicates a critical system error where the operating system can no longer operate safely and requires a restart. It’s also known as a stop error, bugcheck, or fatal error.
BYOD
Bring Your Own Device or “BYOD” is a business and technology policy that allows employees to bring in personal mobile devices and use these devices to access company data, email, etc.
Byte
A group of binary digits that a computer processes as a unit to form a character such as a letter. A byte consists of eight bits.
C
Cache
A set of files saved on your hard disk that help your web browser display pages you have already visited more quickly. It displays the files from your hard disk instead of downloading from the web again.
Captcha
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a security measure used to distinguish humans from automated bots. It presents a challenge that is typically easy for humans to solve but difficult for computers, helping to prevent spam, fake account creation, and other malicious activities. For example, these are the little tests where you are asked to pick out all of the pictures of dogs.
Case-Sensitive
Generally applies to a data input field; a case-sensitive restriction means lower-case letters are not equivalent to the same letters in upper-case. Example: “data” is not recognized as being the same word as “Data” or “DATA”.
Chat
Chat refers to a real-time, text-based communication between two or more users over a network. It allows for the instant exchange of messages.
ChatGPT
ChatGPT is a conversational AI developed by OpenAI. It’s based on the GPT (Generative Pre-trained Transformer) architecture and is designed to engage in natural language conversations with users. ChatGPT is trained on a diverse range of internet text and is capable of understanding and generating human-like responses across various topics. It can provide information, answer questions, offer suggestions, and engage in dialogue on a wide range of subjects.
Client
A client is a computer or software application that requests and receives services or information from another computer, often referred to as a server. It’s the user-facing part of the client-server model, where the client initiates communication and the server provides the requested resources or performs the requested tasks.
Client-Server Technology
Client-server technology describes a distributed application structure where one program (the client) requests resources or services from another program (the server). The client and server communicate over a network, like the internet, with the client initiating the interaction and the server fulfilling the request.
Cloud
A common shorthand for a provided cloud computing services (or even an aggregation of all existing cloud services) is “The Cloud”. The cloud, simply, refers to software and services that run on the Internet instead of your computer. Apple iCloud, Dropbox, Netflix, Amazon Cloud Drive, Flickr, Google Drive, Microsoft Office 365, Yahoo Mail — these are all cloud services.
Cloud Computing
Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”). Instead of managing your own physical hardware and software, you access these resources on demand from a cloud provider, paying only for what you use.
CMS
CMS stands for Content Management System. It’s software that allows users to create, manage, and publish digital content, such as website text, images, and other media, without needing extensive technical or coding knowledge.
CMMC
Cybersecurity Maturity Model Certification, is a Department of Defense (DoD) program designed to protect sensitive unclassified information shared with contractors and subcontractors. It establishes a tiered framework of cybersecurity requirements that contractors must meet to be eligible for DoD contracts.
Compliance Management
Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.
Compress
Compression refers to the process of reducing the size of a file or a set of data. This is achieved by finding and eliminating redundant information, thereby making the data more compact. Compressed files take up less storage space and can be transmitted more quickly.
Connect
To “connect” generally means to establish a link between two or more devices, enabling them to communicate and share resources. This connection can be achieved through physical cables, wireless technologies, or over a network like the internet.
Content Management
Content management refers to the processes and technologies used to collect, manage, and distribute information in various formats, including digital and physical. It encompasses the entire content lifecycle, from creation to storage or deletion, and aims to ensure information is organized, accessible, and relevant for users.
Cookie
A small piece of data that websites may store on your computer to remember information about you. They are used to enhance the user experience by personalizing content, remembering login details, and saving shopping cart items. Cookies can also be used for tracking user activity across websites, primarily for advertising purposes.
Copilot (Microsoft)
Microsoft Copilot is an AI companion designed to assist with various tasks, ranging from creative writing to data analysis and even image generation. It leverages large language models and integrates with Microsoft 365 apps to provide real-time, context-aware help within the user’s workflow. Essentially, it acts as a digital assistant that can understand and respond to user requests, offering information, generating content, and streamlining productivity.
CPU
Central Processing Unit; the part of a computer that oversees all operations and calculations.
Cross-Platform
Cross-platform (a.k.a. agnostic, agnostic application and agnostic platform) refers to something that is interoperable among different operating systems, systems and platforms. Cross-platform, however, is more focused on software that can run on any operating system and on any processor architecture.
Crowdsourcing
Crowdsourcing means the outsourcing of your tasks to, well, a crowd of people. That is, you will have a loosely defined group, which will do the work for you. Crowdsourcing takes away the task that you have to do in-house or by using an employee and letting a bigger group of people do it. In IT, crowdsourcing usually involves the general public.
CSP
Cloud Service Provider; a business that provides cloud computing and storage services.
CSS
Cascading Style Sheets, is a programming language used for describing the presentation of a document written in HTML. It is a cornerstone technology of the World Wide Web, working alongside HTML (which provides structure and content) and JavaScript (which adds interactivity). CSS is used to control the visual styling and layout of web pages.
CRM
Customer Relationship Management, is a system that helps businesses manage interactions with current and potential customers. It involves using software and strategies to organize, automate, and synchronize sales, marketing, customer service, and technical support. Ultimately, CRM aims to improve customer relationships, drive sales growth, and enhance business efficiency.
Cursor
A cursor is a graphical element on the screen that indicates the current position where user input, like typing or clicking, will be processed. It essentially acts as a visual marker, showing the user where the computer is ready to receive input or perform an action.
Cyber-Insurance
Cyber insurance, also known as cyber liability insurance or cyber risk insurance, is a specialty insurance designed to protect businesses from the financial consequences of cyberattacks and data breaches on information technology infrastructure, information privacy, information governance liability, and related activities.
Cyber Physical Attacks
A cyber-physical attack is a malicious act where attackers exploit vulnerabilities in both digital and physical systems to cause physical damage or disruption. These attacks often combine cyber tactics with physical actions to achieve their goals, targeting critical infrastructure like power grids, water treatment plants, and industrial control systems.
Cyberspace
Cyberspace refers to a virtual environment created by interconnected computer networks and systems. It’s a digital realm where individuals and organizations interact, share information, conduct business, and engage in various activities regardless of their physical location.
D
Database
A database is a structured collection of data, stored and accessed electronically; much like an electronic filing system. It’s used to organize and manage information, allowing for efficient storage, retrieval, and manipulation of data.
Data Center
A data center is a facility that houses computer systems and associated components, such as telecommunications and storage systems, used for storing, processing, and disseminating data and applications.
Data Loss Prevention (DLP)
Data Loss Prevention (DLP) refers to security tools and processes that prevent sensitive data from being lost, stolen, or accessed by unauthorized individuals. DLP solutions monitor and protect data across different states – in use, in motion, and at rest. It’s a crucial strategy for organizations to safeguard confidential information like trade secrets, customer data, and intellectual property.
DDoS Attack
A DDoS (Distributed Denial of Service) attack is a malicious cyberattack where multiple compromised computer systems are used to flood a targeted server or network with traffic, making it unavailable to legitimate users.
Decompress
In computing, decompress means to restore a file or data that has been compressed (made smaller) back to its original size and format. It’s the opposite of compression.
Desktop
On computer monitors, the desktop is the backdrop where windows and icons for applications reside. A computer desktop is analogous to a physical desktop.
Devices
In the IT realm, devices include anything that is plugged into or otherwise connected to a computer to facilitate input or output. Input devices include things like microphones, keyboards, mouse, touchpads, wheels, joysticks, etc. Output devices include printers, monitors, projectors, and speakers.
DevOps
DevOps is a software development methodology that combines development (Dev) and operations (Ops) practices to automate and integrate the processes between software development and IT teams. It emphasizes collaboration, communication, and automation to accelerate the delivery of high-quality software and services.
DevSecOps
DevSecOps, a combination of Development, Security, and Operations, is a software development methodology that integrates security practices into every stage of the software development lifecycle. Instead of treating security as an afterthought, DevSecOps emphasizes incorporating security measures from the initial planning stages through to deployment and beyond.
DHCP
DHCP, or Dynamic Host Configuration Protocol, is a network protocol that automatically assigns IP addresses and other network configuration parameters to devices on a network. It simplifies network management by dynamically allocating these settings, rather than requiring manual configuration for each device.
Dialog Box
A dialog box or “window”, “message” or “popup” is a graphical user interface element that allows users to interact with the computer in order to provide input, view output and receive messages.
Digital Transformation
Digital transformation is the process of integrating digital technologies to fundamentally change how a business operates, delivers value, and interacts with customers. This transformation can involve modernizing existing systems, creating new business models, and developing new products and services.
Differential Backups
A differential backup copies all data that has changed since the last full backup. This means each differential backup will grow larger as more changes accumulate over time.
Disaster Recovery
Disaster recovery (DR) refers to the processes and strategies an organization employs to restore its IT infrastructure and systems after a disruptive event, such as a natural disaster, cyberattack, or human error. It’s a crucial component of business continuity planning, ensuring that critical business functions can continue or resume operations quickly. Disaster recovery focuses on restoring IT systems and data, while business continuity encompasses a broader scope of organizational operations.
Disaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS) is a cloud-based service model where a third-party provider replicates and hosts an organization’s data and IT infrastructure to enable quick recovery in case of a disaster. DRaaS is outsourcing disaster recovery capabilities to a service provider, allowing businesses to avoid the cost and complexity of maintaining their own secondary data centers.
Disruptive Technology
Disruptive technology is a new technology that significantly alters the way consumers, businesses, or industries operate, often displacing established technologies or creating entirely new markets. It can be a new product, service, or business model that changes the status quo.
DNS
DNS, or Domain Name System, is the internet’s phonebook, translating human-readable domain names (like google.com) into machine-readable IP addresses (like 172.217.160.142). This allows users to access websites and other online resources using easily remembered names instead of complex numerical addresses.
Domain
The main part of an Internet address. Think of the stuff between “www.” and “.com”. In the example “www.google.com”, “google” is the domain.
Domain Name
Consider a domain name as a virtual street address; it enables people to find and visit a website. A domain name consists of two main parts: the actual name and the extension (or, “top level domain”). For example, in “google.com,” “google” is the name, and “.com” is the top level domain.
Download
The process of transferring one or more files from a remote computer or server to your local computer.
E
Edge Computing
Edge computing brings computing resources closer to the data sources, rather than relying solely on centralized data centers. This approach minimizes latency, improves responsiveness, and reduces bandwidth usage for applications that require real-time or near real-time processing. Think of an autonomous vehicle with cameras and sensors. It is much faster to process all of the captured data on the vehicle than to send the data through the internet to central servers to be processed.
EHR/EMR/PHR
EMR stands for Electronic Medical Record, EHR stands for Electronic Health Record and PHR stands for Personal Health Record. These all refer to digital versions of paper charts used by healthcare providers to store and manage patient information.
Emoji
An emoji is a small digital image or icon used to express an idea or emotion. Frequently used in electronic communications to convey a particular meaning, much like tone of voice is used in spoken communications. Examples: 🙂 for a smiley face or 😉 for a wink.
Emulation
Refers to the ability of a program or device to imitate another program or device. For example, software that allows a Mac computer to act like a Windows PC.
Encryption
Encryption is the process of converting information into a coded format that can only be read or processed with a decryption key. It’s a core concept used to protect sensitive data from unauthorized access, ensuring privacy and security for both individuals and organizations.
Endpoint
In computing, an endpoint refers to a physical device that connects to a network, such as a computer, laptop, server, or smartphone.
Endpoint Security
The practice of securing individual devices like laptops, desktops, and mobile phones that connect to a network, preventing unauthorized access and malicious activity.
EPS
EPS stands for Encapsulated PostScript and is a file format traditionally used for professional and high-quality commercial printing and graphics art production.
Ethernet
Ethernet is the standard wired network technology in use almost everywhere today. If your computer is connected to a network via a cable, it’s likely using an Ethernet cable. This physically wired network allows for the transfer of data between devices.
Ethernet Card (Ethernet Adapter)
An adapter that facilitates a physical connection between a computer and a network. Typically, the ethernet card connects to computer and has ports for connecting ethernet cables.
Exploit Kit
A digital toolkit that cybercriminals use to automate the process of finding and exploiting vulnerabilities in computer systems and software. These kits are commonly used for mass malware distribution, making it easier for attackers to infect a large number of victims without needing extensive technical skills.
F
Field
The term “field” can have several meanings depending on context. A field can be a single piece of information within a database (e.g., an entry for name or address). It can also refer to a specific area within a dialog box or a window where information can be entered.
File
A computer file is a container for storing information, similar to a document in the real world. It’s the fundamental unit for organizing data on a computer, holding everything from text and images to videos and software. A file has a name (filename) to differentiate it from other files. Almost all information on a computer is stored in some type of file. Examples: data file (contains data such as a group of records); executable file (contains a program or commands that are executable); text file (contains data that can be read using a standard text editor).
Filter
The term “filter” can have several meanings depending on context. A “data filter” is a program that translates data into a different format. A “pattern filter” prevents non-matching data from passing through (e.g., an email spam filter). An “effects filter” is used in photo programs and image editors to apply a special effect to an image.
Firewall
A firewall is a piece of software or hardware that blocks certain types of traffic on a network. For example, a firewall could block incoming traffic on a certain port or block all incoming traffic except traffic coming from a specific IP address.
Flash Drive
A flash drive, also referred to as a “USB drive” or “memory stick”, is a small, portable device that plugs into the USB port of computer. Flash drives are commonly used for storage, data backup, and transferring files between devices.
Folder
An area on a hard disk that contains a related set of files or alternatively, the icon that represents a directory or subdirectory.
FTP
FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. It’s a way to move files from one computer to another, typically over the internet, and it uses a client-server model.
G
Gateway
A network gateway acts as a bridge between two networks, enabling communication between them, especially when they use different protocols. It essentially serves as the entry and exit point for data flowing in and out of a network. For example, at home, your router is your gateway — it connects your local network to the wider internet.
Generative AI
Generative AI refers to a category of AI models that create new content, such as text, images, music, or code, based on the data they have been trained on. Unlike traditional AI that focuses on analyzing and understanding existing data, generative AI actively produces novel outputs by learning patterns and relationships within the training data.
Gigabyte (Gig or GB)
A unit of data storage capacity that is roughly equivalent to 1 billion bytes, or 1000 megabytes.
GIF
Refers to the GIF image compression standard for reducing the size of image files. The correct pronunciation of Graphic Interchange Format, or .gif is highly debated. Either a hard G or soft G (as in JIF) is acceptable. Though the original developers pronounced it “JIF”.
Grayware
Grayware, also spelled greyware, refers to undesirable or potentially harmful software or files that are not classified as traditional malware (like viruses or Trojans) but can still negatively affect computer performance and security. Essentially, it’s a category of software that falls between legitimate programs and malicious malware.
GUI
A GUI, or Graphical User Interface, is a visual way for users to interact with computers, using elements like icons, buttons, and menus instead of text-based commands. It allows users to easily navigate and operate devices through visual representations and intuitive actions like pointing and clicking.
H
Hardware
In computer networking, hardware refers to the physical components that enable devices to connect and communicate with each other. These components form the infrastructure of a network, facilitating the transmission and processing of data. Hardware is the tangible equipment that makes networking possible.
HDD
A hard disk drive (HDD), “hard disk”, or “hard drive” is an electro-mechanical data storage device that stores and retrieves digital data using rapidly rotating platters coated with magnetic material.
Header
Also referred to as the “email header” is the portion of an e-mail message that precedes the body of the message; it contains information like who the message is from, its subject, and the date. A header also is the portion of a packet that proceeds the actual data and contains additional information the receiver will need.
Help Desk
A help desk is a service that provides support, usually for technical or computer-related issues. It acts as a central point of contact for users to resolve problems, answer questions, and receive assistance with various IT-related or other types of issues. Help desks can be internal, supporting employees within an organization, or external, supporting customers.
Helper Application
A helper application, or helper app, is a software program that enhances the functionality of another application, often by handling specific file types or performing tasks that the main application cannot. It acts as an extension, providing additional capabilities when needed.
Hostname
A hostname is a human-readable label that points to a device connected to a network. For example, on your home network, your Windows computer’s hostname may be “My MacBook Pro”. Your other devices can connect to “my-macbook-pro” and will be pointed at that computer’s local IP address.
HTML
HyperText Markup Language, is the standard language for creating web pages. It provides the structure and content of a website, using a system of tags to define elements like headings, paragraphs, links, and more.
HTTP
Hypertext Transfer Protocol, is a foundational protocol for communication on the World Wide Web. It’s the system that allows web browsers to request and receive information from web servers, enabling the display of web pages and other online content. Essentially, it’s the language used for data transfer on the internet.
Human Firewall
The concept of using employee training and awareness programs to strengthen an organization’s cybersecurity. It’s about recognizing that people are often the first line of defense against cyberattacks, and that empowering them with knowledge and skills can significantly reduce the risk of breaches caused by human error or social engineering tactics.
Hybrid Workforce
A work arrangement where some employees work on-site, some work remotely, and some have a combination of both, offering flexibility in work location. This flexible work environment often necessitates more robust cybersecurity.
Hyperconverged Infrastructure (HCI)
A software-defined IT framework that combines computing, storage, and networking into a single, integrated system. It simplifies IT management, reduces costs, and improves scalability by using virtualization and software-defined technologies. HCI essentially consolidates traditional three-tier architectures (computing, storage, and networking) into a single, unified platform, often referred to as a “datacenter in a box”.
Hyperlink
A hyperlink, or simply a link, is a clickable element in a digital document that connects to another location, either within the same document or to a different document or resource. It’s a fundamental part of how we navigate the internet and other digital environments.
I
IaaS
Infrastructure as a Service (IaaS) is a cloud computing model that provides on-demand access to computing resources like servers, storage, and networking over the internet. Essentially, it allows businesses to rent the infrastructure they need, rather than owning and managing it themselves, offering flexibility and cost-effectiveness.
Icon
On a system like Windows or Mac that uses a graphical user interface (GUI), a small picture or symbol that represents some object or function. Examples: a file folder for a directory; a rectangle with a bent corner for a file; or a miniature logo for a social media application.
IMAP
Internet Message Access Protocol. IMAP is a method of accessing e-mail messages on a server without downloading them to your local hard drive; this is the main difference between IMAP and POP3 which requires messages to be downloaded to a user’s hard drive before the message can be read.
Incremental Backup
A small increment of data backup only copying data that has been modified since the previous backup (full or incremental).
Information Security Policy
The documented rules and guidelines that outline how an organization protects its information assets. They define the standards and procedures for managing, protecting, and distributing information, ensuring confidentiality, integrity, and availability.
Internet of Everything (IoE)
The Internet of Everything (IoE) encompasses the interconnectedness of people, processes, data, and things. It focuses on the value derived from connecting these four pillars and leveraging the resulting data for deeper insights and improved solutions.
Internet of Things (IoT)
A network of physical objects or “things” embedded with sensors, software, and other technologies that enable them to connect and exchange data with other devices and systems over the internet. Essentially, it’s about making everyday objects smart and interconnected, allowing them to collect and share information, automate tasks, and improve efficiency in various aspects of life and work.
IP Address
An Internet Protocol address, or IP address, is a numerical address that corresponds to a computer on a network. When a computer wants to connect to another computer, it connects to that computer’s IP address.
ISP
An Internet Service Provider is the company that provides you with your Internet connection. For example, your ISP may be Verizon, Comcast, or Time Warner.
IT Assessment
An IT Assessment is the practice of gathering information on a business’ internet technology network infrastructure, and then presenting a detailed report. This report typically analyzes the current state or health of technology or services and identifies areas needing improvement or to prepare for a some type of system or application upgrade. An IT Assessment can be performed in-house or outsourced to an IT vendor. Pinnacle Thrive Solutions performs comprehensive assessments including thorough, in-depth reviews all of your critical technology areas, evaluating them against best practices and then providing you with a roadmap to better leverage your IT as a competitive advantage.
ITIL®
Information Technology Infrastructure Library, is a widely adopted framework of best practices for IT service management (ITSM). It provides guidance on how to align IT services with business needs, improve service delivery, manage risks, and optimize costs.
IV&V
Independent Verification and Validation, is a process where an independent entity assesses a product, service, or system to ensure it meets its requirements and functions as intended. It involves both verification (ensuring the product is built right) and validation (ensuring the product is the right one). This process is crucial for safety-critical applications and helps minimize risks and reduce development costs.
J
Java
Java is a programming language commonly used in conjunction with web pages that feature animation. Small Java applications are called Java applets and can be run in a web browser.
JavaScript
JavaScript is a scripting language that shares many of the features of Java; it is used to add dynamic content (various types of interactivity) to web pages.
JPG or JPEG
Refers to the JPEG image compression standard for reducing the size of image files. JPEG and JPG are essentially the same format; the difference is purely in the file extension. JPEG (Joint Photographic Experts Group) was shortened to JPG in the past because some operating systems (like older versions of Windows) only supported three-letter file extensions. Now, both extensions are widely used and interchangeable, meaning there’s no functional difference between a file saved as .jpeg or .jpg
K
Key Logger
A program designed to record which keys are pressed on a computer keyboard used to obtain passwords or encryption keys and thus bypass other security measures.
L
LAN
A local area network is a small network that’s confined to a local area. For example, your home network or an office network is a LAN. Connects a group of computers for the purpose of sharing resources such as programs, documents, or printers.
Link
A hyperlink is a clickable element in a digital document that connects to another location, either within the same document or to a different document or resource. It’s a fundamental part of how we navigate the internet and other digital environments.
LOB Application
A Line-of-Business (LOB) application is a custom software application developed or acquired by an organization to support specific business needs and operations. These apps are typically not available publicly and are tailored to the organization’s unique requirements, often integrating with other internal systems.
Localhost
In computer networking, localhost is a hostname that refers to the current computer used to access network. Typically, this is the computer that you are using.
Log in, Log on
“Log in” refers to the process of providing your credentials (like a username and password) to access a computer system, website, or application. It’s the act of establishing communication and interaction with a system, similar to signing into a physical logbook. The term can also be used as a noun to refer to the credentials themselves or the interface for entering them.
M
MAC Address
A MAC (Media Access Control) Address is a unique hardware identifier assigned to each device connected to a network. It’s a 12-digit hexadecimal number that functions like a device’s “fingerprint” on a network. MAC addresses are used for local network communication, while IP addresses are used for broader network communication, including the internet.
Machine Learning
Machine learning is a field of artificial intelligence that focuses on enabling systems to learn from and make predictions or decisions based on data, without explicit programming. It’s a way for computers to analyze data, identify patterns, and then use those patterns to make predictions or take actions. This learning process often involves algorithms that automatically improve with experience.
Mail Server
A networked computer dedicated to supporting electronic mail. A mail server, also known as an email server, is a computer program that sends, receives, and stores email messages. It acts as a central hub for email communication, facilitating the transfer of messages between email clients (GMail, Outlook) and other mail servers.
Malware
Malware, short for malicious software, is any intrusive software designed to harm or exploit computer systems. It encompasses a wide range of harmful programs, including viruses, worms, Trojans, ransomware, and spyware. Malware can cause damage, steal data, or disrupt normal computer operations.
Man-in-the-Middle Attack
A man-in-the-middle (MITM) attack is a type of cyberattack where a malicious actor intercepts and potentially alters communication between two parties without their knowledge. The attacker secretly relays and possibly alters communications between the two parties, effectively becoming a “middleman”.
Managed Antivirus
Managed antivirus, also known as “centrally managed antivirus”, is a security solution where an IT provider installs, updates, and monitors antivirus software on a business’s devices from a central location. This approach simplifies virus protection and reduces the burden on the in-house IT team by handling tasks like software updates, scanning schedules, and threat monitoring.
Managed Security Service Provider (MSSP)
A Managed Security Service Provider (MSSP) is a company that provides outsourced cybersecurity services to other organizations. These services can include monitoring, managing, and responding to security threats, as well as other related tasks like vulnerability management and incident response. MSSPs help businesses enhance their security posture, often filling gaps in in-house expertise or resources.
Managed Workstations
A managed workstations are computers (or desktops) that are proactively monitored, maintained, and secured by an IT team or service provider. This includes tasks like software updates, security patching, and troubleshooting, often with the goal of maximizing uptime and minimizing security risks for the users.
MDM
Mobile Device Management, is a technology and set of policies used by organizations to manage, monitor, and secure mobile devices like smartphones and tablets, whether company-owned or employee-owned, used for business operations. It enables IT administrators to enforce security policies, configure settings, deploy applications, and track devices from a central platform.
MDR
Managed Detection and Response (MDR) is a cybersecurity service that combines technology and human expertise to provide 24/7 threat monitoring, detection, and response capabilities. It goes beyond basic security tools by offering continuous monitoring of an organization’s IT environment, expert investigation of potential threats, and guided incident response. Essentially, it’s a managed service that helps organizations proactively identify and mitigate cyberattacks.
Megabyte (Meg or MB)
A megabyte (MB) is a unit of digital information storage. It is equivalent to one million bytes. Megabytes are commonly used to measure file sizes and storage capacity on devices like hard drives and memory cards.
Menu
In a graphical user interface, a bar containing a set of titles that appears at the top of a window.
MHz or mHz
Megahertz; a measurement of a microprocessor’s speed; one MHz represents one million cycles per second. The speed determines how many instructions per second a microprocessor can execute. In general, the higher the megahertz, the faster the computer.
Microsoft Azure
Microsoft Azure, or simply “Azure” is a cloud computing platform provided by Microsoft that offers a wide range of services, including computing, analytics, storage, networking, and artificial intelligence. It allows individuals, companies, and governments to build, manage, and deploy applications and services through a global network of data centers.
Microsoft Exchange
Microsoft Exchange is a business-class email, calendaring, and collaboration platform. It is used by organizations to manage email, calendars, contacts, and tasks, and it offers features for enhanced productivity and security. It can be deployed on-premises or as a cloud-based service.
Microsoft Teams
Microsoft Teams, also referred to as “Teams”, is a communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration.
Microsoft Windows
Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft for PC or compatible computers. Windows provides a graphical user interface allowing you to point and click to indicate what you want to do.
MIME
MIME (Multipurpose Internet Mail Extensions) is a standard that extends the original email protocol (SMTP) to support various content types beyond plain text, such as images, audio, video, and application programs. It enables users to send and receive attachments of different formats.
Monitor
The part of a computer that contains the screen where messages and images are displayed. Monitors come in a variety of sizes and resolutions. The higher the number of pixels a screen is capable of displaying, the better the resolution. Sometimes may be referred to as a CRT.
MPEG
Motion Picture Experts Group; a high quality video format commonly used for video files found on the Internet.
MRB
Managed Remote Backup (MRB) is a service where a third-party provider handles the backup and storage of an organization’s data to a remote server or cloud-based system. This comprehensive service includes setup, monitoring, and recovery of data, ensuring its availability, security, and recoverability in case of data loss. It’s a form of cloud computing and a key component of modern data protection strategies.
MSP
A Managed Service Provider (MSP) is a third-party company that provides IT services and support to other businesses on a proactive and ongoing basis. Instead of hiring an in-house IT department, businesses can outsource their IT management to an MSP, which handles tasks like network monitoring, security, data backup, and more.
MSSP
An MSSP, or Managed Security Service Provider, is a company that provides outsourced cybersecurity services, including monitoring, management, and incident response. They offer a range of security solutions, often encompassing security devices, systems, and overall security posture, to help organizations protect their data and systems from cyber threats.
Multi-Factor Authentication (MFA)
Multifactor authentication (MFA), also known as two-factor authentication (2FA) or two-step verification, is a security process that requires users to provide two or more verification methods to access an account or system. This layered approach significantly enhances security by making it much harder for unauthorized users to gain access, even if one authentication factor is compromised.
N
NaaS
NaaS, or Network as a Service, is a cloud-based delivery model where network infrastructure, services, and support are provided to customers on a subscription basis. Essentially, businesses can access and utilize networking resources like bandwidth, switching, and security without needing to own and manage the underlying physical hardware.
Nameserver
A nameserver, also known as a DNS server, translates human-friendly domain names (like “google.com”) into the numerical IP addresses that computers use to locate and connect to websites. It acts as a directory within the Domain Name System (DNS), ensuring that when you type a website address into your browser, your computer can find the correct server to display the site.
NAT
In networking, NAT (Network Address Translation) is a process where a network device, usually a router, modifies network address information to allow multiple devices on a private network to share a single public IP address when communicating with the internet, conserving public IP addresses and enhancing security.
NCE
The New Commerce Experience (NCE) is an updated licensing model launched by Microsoft. MCE facilitates new ways to purchase and manage product licenses.
Network
A group of interconnected computers capable of exchanging information. It can range from a few personal computers on a Local Area Network (LAN) to the vast scale of the Internet, a worldwide computer network.
Network Adapter
A network adapter, also known as a network interface card (NIC), is a hardware component that allows a computer or device to connect to a network, enabling communication and data exchange. It acts as an intermediary, translating data from the computer into a format suitable for transmission over the network and vice versa.
Network Environment
A network environment refers to the specific setup of a computer network, encompassing the physical and logical connections, devices, and protocols that enable communication and resource sharing between multiple computing devices. It essentially describes the infrastructure and rules governing how devices interact within a network.
Network Hub
A common connection point for devices on a network, allowing for data and information to be shared between them.
Network Interface / Network Adapter
Your computer’s wired Ethernet connection and Wi-Fi connection are basically both network interfaces. A “network adapter” is a physical piece of hardware. A “network interface” is a software construct.
Network Monitoring
Network monitoring is the process of observing, analyzing, and managing the performance and health of a computer network. It involves using specialized tools and software to collect, analyze, and interpret data about the network’s operation, traffic, and devices, aiming to ensure the smooth and efficient functioning of the network.
Network Operations Center (NOC)
A Network Operations Center (NOC) is a centralized location where an organization’s IT infrastructure, including networks, systems, and applications, is monitored and managed.
Network Security
Network security refers to the practices, technologies, and policies designed to protect the integrity, confidentiality, and availability of computer networks and data from unauthorized access, misuse, or modification. It involves a combination of hardware, software, and procedures to defend against various threats, such as malware, intrusions, and denial-of-service attacks.
NIST
National Institute of Standards and Technology; an agency of the US Department of Commerce to promote innovation and industrial competitiveness.
NIST Compliance
Refers to adhering to the cybersecurity standards and guidelines established by the National Institute of Standards and Technology (NIST). These standards are primarily aimed at protecting sensitive information and systems, especially within government agencies and their contractors.
NIST Framework
The NIST Framework, specifically the NIST Cybersecurity Framework (CSF), is a set of guidelines and best practices developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. It’s a voluntary framework, meaning organizations can choose to adopt it to improve their cybersecurity posture.
NNTP
Network News Transfer Protocol, is a protocol used for distributing, retrieving, and posting news articles. It enables clients to connect to news servers and access discussions, as well as post new articles.
O
On-Site Support
A professional service provider comes to your business premises and assists with any issues that may arise. The most common types of services include: Technical assistance – helping with software installation, configuration, and troubleshooting.
Off-Site Support
Professional IT support provided in a remote capacity. May involve telephone support and screen sharing.
P
Packet
A packet is a unit of transmission in data communications. The TCP/IP protocol breaks large data files into smaller chunks for sending over a network so that less data will have to be re-transmitted if errors occur.
Password
A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file; often used in conjunction with a username.
Password Manager
A software application or online service that securely stores and manages users’ passwords for various online accounts. It acts as a digital vault, encrypting and safeguarding login credentials, making it easier to manage and access accounts without needing to remember every password individually.
Patch
A set of changes to a computer program or its data, designed to update, fix, or improve it. It’s essentially a “repair job” for software, addressing security vulnerabilities, bugs, and performance issues.
PC
PC stands for Personal Computer. It refers to a computer designed for individual use, typically for tasks like computing, browsing, and data analysis. The term can also distinguish between computers running Windows (often referred to as PCs) and Apple’s Macintosh computers (often referred to as Macs).
PDF
A PDF, or Portable Document Format, is a file format that preserves the formatting of a document, ensuring it looks the same regardless of the device or software used to view it. PDFs are commonly used for sharing documents, forms, and other content where maintaining the original appearance is crucial.
Personally Identifiable Information (PII)
PII is any data that can be used to identify a specific individual. This includes information that can be used to distinguish or trace an individual’s identity, either on its own or when combined with other information. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.
Phishing
Phishing is a type of cyberattack that uses deceptive emails, text messages, or websites to trick individuals into revealing sensitive information or performing actions that compromise their security. Attackers, posing as legitimate organizations, aim to steal personal data like passwords, credit card numbers, or banking information, or to install malware on victims’ devices.
Platform as a Service (PaaS)
Platform as a Service (PaaS) is a cloud computing model that provides developers with a platform to build, deploy, and manage applications without worrying about the underlying infrastructure. It enables developers to focus on coding, while the cloud provider manages the infrastructure, maintenance, and scalability.
Plug and Play
Plug and Play (PnP) is a feature that allows devices and peripherals to be automatically configured and used when connected to a computer or other system, without requiring manual setup or driver installation. It simplifies the process of adding new hardware by allowing the system to automatically detect, identify, and configure the device.
Plug-in
A plugin is a software component that adds specific functionality to an existing software application or web browser, extending its capabilities without modifying the core code. Plugins are designed to be modular and easily added or removed, allowing users to customize and enhance their software experience. They are commonly used in a wide range of applications, including web browsers, content management systems, audio/video editing software, and more.
POP3
POP3, or Post Office Protocol version 3, is a protocol used to retrieve emails from a mail server to a local email client. It essentially downloads emails to your device and can optionally remove them from the server. This allows you to access your emails offline and manage them on your device.
Pop-up Blocker
An application that disables the pop-up, pop-over, or pop-under ad windows that appear when you use a web browser.
Port
A network port is a virtual endpoint for network communications, identified by a number, that enables multiple applications on a device to communicate with the internet or other devices simultaneously. Think of it as a specific “door” or “channel” on your computer that allows different types of network traffic (like web browsing, email, or file transfers) to be directed to the correct application.
Private Cloud
A private cloud is a cloud computing environment dedicated to a single organization. It offers the benefits of cloud computing, like scalability and self-service, but with greater control and security because the resources are not shared with other users. This dedicated infrastructure can be located on-premises within the organization’s own data center or hosted by a third-party provider.
Proactive Monitoring
Proactive monitoring (often referred to as Remote Monitoring and Management or “RMM”) continually monitors the stability and security of your IT system for maximum uptime. It allows for the remote monitoring and maintenance of your connected devices (like, desktops, routers, and mobile devices) and networks from a centralized console.
Professional Services Automation (PSA)
PSA systems help manage projects, resources, time tracking, and finances, improving efficiency and profitability. They offer features like project management, resource allocation, time tracking, and billing, enabling better collaboration, visibility, and decision-making.
Protocol — TCP, UDP, ICMP, etc.
A network protocol is a set of rules that governs how data is transmitted between devices in a network. These rules ensure that devices can communicate with each other, regardless of their specific hardware or software. Essentially, it acts as a common language for devices to exchange information. TCP, or Transmission Control Protocol, is a fundamental protocol within the TCP/IP model used for reliable, ordered, and error-checked delivery of data over networks. It operates on top of IP (Internet Protocol), which handles addressing and routing data packets, and is often considered the core of the internet’s communication system. TCP ensures data is delivered in the correct sequence, without errors or loss.
Q
Quality of Service (QoS)
Quality of Service (QoS) refers to the ability to manage and prioritize network traffic to ensure optimal performance for certain applications or services. It’s a set of techniques used to control bandwidth, minimize latency, and reduce packet loss, ultimately improving the user experience. QoS is particularly important for real-time applications like VoIP, video conferencing, and online gaming, where delays and interruptions can significantly impact functionality.
Quishing
Quishing, short for “QR code phishing,” is a type of cyberattack where malicious actors use QR codes to trick individuals into visiting fake websites or downloading malware, ultimately leading to the theft of sensitive information or device compromise. These attacks exploit the convenience of QR codes, which can be scanned from both physical and digital mediums, to bypass traditional email security filters and social engineering defenses.
R
RAM
Random Access Memory, is a computer’s short-term memory. It temporarily stores data that the CPU needs to access quickly, enabling faster processing and multitasking. RAM is volatile, meaning it loses its data when the computer is powered off. When people refer to memory upgrades they are usually talking about RAM.
Recovery Point Objective (RPO)
Recovery Point Objective (RPO) is a key part of an IT disaster recovery plan. It defines how much data a business can afford to lose in the event of a disruption like a cyberattack, natural disaster, or system failure. Measured in time—such as minutes, hours, or days—RPO helps determine how often data should be backed up. The shorter the RPO, the more frequently backups need to happen to minimize data loss. RPO is often used alongside Recovery Time Objective (RTO), which focuses on how quickly systems must be restored after a disruption.
Recovery Time Objective (RTO)
Recovery Time Objective (RTO) is a key measure in disaster recovery planning that defines how quickly a business must restore an IT system, application, or service after a disruption to avoid serious consequences. It focuses on the maximum amount of downtime that’s acceptable before significant impact occurs. RTO varies depending on how critical a system is—essential systems like financial processing may need to be restored within minutes, while less critical ones, like internal reporting tools, can tolerate longer delays. Ultimately, RTO helps businesses prioritize recovery efforts based on operational importance.
Registry
The Windows Registry is a hierarchical database that serves as a central repository for storing configuration settings and other information for Windows operating systems and applications. It holds crucial data about the system, including hardware and software configurations, user preferences, and system policies.
Remote Backup
Remote backup, also known as cloud backup or online backup, is the process of backing up data to a server or storage device located offsite, typically using the internet. This differs from local backups, which store data on the same physical premises as the original data. Remote backups offer enhanced security and data protection by mitigating risks associated with local hardware failures, natural disasters, and security breaches.
Remote Desktop
Remote desktop is a technology that allows a user to access and control a computer from a different location using a network connection. It enables users to interact with a remote computer as if they were physically sitting in front of it, accessing files, applications, and network resources. This functionality is commonly used for remote work, technical support, and system management.
Remote Login
Remote login, also known as remote access, is the ability to connect to and use a computer or network from a different location than where it’s physically located. This allows users to access files, applications, and resources on a remote system as if they were directly connected to it.
Remote Monitoring and Management (RMM)
Remote Monitoring and Management (RMM) is a technology used by IT professionals to oversee and control computers, servers, networks, and other devices from a remote location. By installing special software (called agents) on these systems, IT teams can monitor performance, fix issues, and even automate routine tasks without needing to be on-site. This proactive approach helps prevent problems, reduces downtime, and keeps everything running smoothly.
Remote Support
Remote support is the process of providing technical assistance to users from a remote location, typically using specialized software to access and control their devices. It allows technicians to troubleshoot issues, install software, and provide guidance without needing to be physically present with the user.
Risk Assessment
Risk assessment is a systematic process for identifying, analyzing, and evaluating potential risks associated with an organization’s information technology infrastructure. This involves determining the likelihood and potential impact of threats to IT assets, ultimately helping organizations prioritize and implement appropriate security measures.
Risk Management
Risk management is the process of identifying, assessing, and mitigating risks associated with an organization’s information technology systems and data. It aims to protect data confidentiality, integrity, and availability, and ensure business continuity. Effective IT risk management is crucial for safeguarding an organization’s operations and reputation against potential disruptions and data breaches.
RJ-45 Connector
An eight-wire connector used for connecting a computer to a local-area network. May also be referred to as an Ethernet connector.
Router
A router is a device that connects different networks and directs data between them, much like an air traffic controller. In homes or offices, it connects your local network to the internet, allowing multiple devices—like phones, computers, and smart TVs—to share one internet connection. It manages where data goes based on IP addresses, ensuring that information gets to the right device. Most people use a router at home without even realizing it—it’s the box that sends your Wi-Fi signal and handles all the internet traffic in and out of your network.
S
SaaS
Software as a Service (SaaS) is a software distribution model where a third-party provider hosts applications and makes them available to customers over the internet. Instead of users installing and managing software on their own devices, they access it via a web browser or mobile app, often through a subscription model.
SAN
A Storage Area Network (SAN) is a dedicated, high-speed network that connects servers to storage devices, such as disk arrays or tape libraries. Unlike a regular network used for emails or internet access, a SAN is built specifically for data storage, allowing servers to access storage as if it were directly attached. This setup improves performance, makes it easier to scale storage as needed, and ensures data is always available when needed. SANs are commonly used in data centers where fast, reliable access to large amounts of storage is essential.
Scroll Bar
In a graphical user interface system, the narrow rectangular bar at the far right of windows or dialog boxes. Clicking on the up or down arrow enables you to move up and down through a document; a movable square indicates your location in the document. Certain applications also feature a scroll bar along the bottom of a window that can be used to move from side-to-side.
SD-WAN
SD-WAN, or Software-Defined Wide Area Network, is a modern networking technology that makes it easier to manage and control a wide area network (WAN) through software rather than hardware alone. It allows businesses to connect users to applications more efficiently and securely by using multiple types of internet connections, like broadband, MPLS, or LTE. By separating the network’s control from the physical equipment, SD-WAN improves performance, reduces costs, and simplifies day-to-day network management.
Search Engine
A search engine is a software system that helps users find information on the internet by searching through a vast database of web pages and other online content. It works by using automated programs (like web crawlers) to index and organize content, allowing users to retrieve relevant results based on their search queries.
Section 508
U.S. law, specifically an amendment to the Rehabilitation Act of 1973, that requires federal agencies to make their electronic and information technology (EIT), also referred to as information and communication technology (ICT), accessible to people with disabilities. This law ensures that individuals with disabilities have comparable access to technology used by those without disabilities within the federal government.
Secure Server
A special type of file server that requires authentication (e.g., entry a valid username and password) before access is granted.
Security Assessment
A cybersecurity risk assessment is a process that helps organizations identify and evaluate potential threats to their digital systems, data, and devices. It looks at what valuable assets—like hardware, software, customer information, or intellectual property—could be targeted in a cyberattack, and assesses how likely those threats are and what impact they could have. This helps businesses understand their weaknesses and make smart decisions to strengthen their overall cybersecurity.
Security Token
A small device used to provide an additional level of authorization to access a particular network service; the token itself may be embedded in some type of object like a key fob or on a smart card. Also referred to as an authentication token.
Security Operations Center (SOC)
A Security Operations Center (SOC) is a centralized team or facility responsible for monitoring and responding to cybersecurity threats within an organization. It acts as the command center for all security-related activities, working to detect, prevent, and respond to potential attacks. A SOC often uses advanced tools and technology to track suspicious activity, manage alerts, and protect digital systems and data. In some cases, it may also handle physical security tasks like monitoring building access, alarms, and surveillance systems.
Serial Port
A serial port in a computer is a hardware interface that transmits data one bit at a time, serially. It’s a way for computers to communicate with external devices like modems, printers, and some specialized equipment. While serial ports were once very common, they are less so now, with USB and other interfaces taking over in many applications.
Server
A server is a computer program or physical machine that provides resources, data, or services to other computers (clients) over a network. Servers act as central hubs, managing resources like files, data, applications, and services, ensuring efficient and secure network operations.
Service Level Agreement (SLA)
A Service Level Agreement (SLA) is a contract between a service provider and a customer that defines the level of service expected. It outlines specific performance metrics, responsibilities, and potential remedies if the agreed-upon service levels are not met. SLAs are crucial for managing expectations, ensuring quality, and establishing clear communication between parties.
SSID
A Service Set Identifier (SSID) is the name of a Wi-Fi network, essentially acting as a label that identifies a specific wireless network. When you search for available Wi-Fi networks on your device, the SSIDs are the names that appear in the list. Each wireless network has a unique SSID to distinguish it from others in range, allowing you to choose the correct network to connect to.
SIEM
Security Information and Event Management, is a cybersecurity solution that provides centralized visibility into an organization’s security posture by aggregating and analyzing security data from various sources. It helps in threat detection, incident response, and compliance management by correlating and analyzing logs and events from different parts of the IT infrastructure.
SMB
The Server Message Block (SMB) protocol is a network communication method that allows computers to share files, printers, and other resources over a network. It lets applications on one device read, write, and manage files on another device, typically a server. SMB follows a client-server model, meaning one computer requests data and the other provides it. This protocol is commonly used in business networks for file sharing and collaboration.
SMTP
SMTP, or Simple Mail Transfer Protocol, is a standard protocol used for sending emails across the internet. It essentially acts like a post office for email, handling the transmission of messages from sender to recipient. While SMTP is primarily for sending emails, other protocols like IMAP and POP3 handle the receiving and management of emails.
Smishing
Smishing is a type of cybercrime where criminals use text messages (SMS) to trick individuals into revealing sensitive information, such as passwords, credit card details, or other personal data. These deceptive messages, often disguised as legitimate communications from banks, service providers, or government agencies, lure victims into clicking malicious links or providing information through fraudulent websites or phone numbers.
SOC-as-a-Service (SOCaaS)
SOC as a Service (SOCaaS) is a subscription-based security service where a third-party provider handles a company’s security operations center (SOC) functions, such as threat monitoring, detection, and response. This approach allows organizations, especially those without the resources for a full in-house SOC, to benefit from professional security expertise and advanced tools on a scalable, cost-effective basis.
Social Engineering
Social engineering in cybersecurity is the act of tricking people into revealing confidential information or taking actions that compromise security. Instead of hacking systems directly, attackers manipulate human behavior—often by creating a sense of urgency, fear, or trust—to bypass technical defenses. These tactics rely on exploiting natural human responses to gain access to sensitive data or systems.
Software
Software refers to the set of instructions, data, or programs that tell a computer how to operate and perform specific tasks. It’s the intangible counterpart to hardware, which encompasses the physical components of a computer system. Software can be broadly categorized into system software, which manages the computer’s internal functions and provides a platform for other software, and application software, which users directly interact with to perform specific tasks.
Software as a Service (SaaS)
Software as a Service (SaaS) is a software distribution model where a third-party provider hosts applications and makes them available to customers over the internet. Instead of users installing and managing software on their own devices, they access it via a web browser or mobile app, often through a subscription model.
Software-Defined Data Center
A Software-Defined Data Center (SDDC) is a modern type of data center where all key components—computing power, storage, and networking—are managed through software instead of physical hardware alone. By virtualizing these resources, SDDCs make it easier to automate, scale, and control IT services, offering greater flexibility and efficiency. This approach helps organizations deliver IT services more quickly and cost-effectively.
Software-Defined Networking
Software-defined networking (SDN) is a modern approach to managing networks that separates the control functions from the hardware, allowing the network to be managed centrally through software. This makes it easier to automate tasks, adjust network settings quickly, and improve performance. Unlike traditional networks that rely heavily on physical devices, SDN provides more flexibility and efficiency—similar to how cloud computing transformed data storage and processing.
Software-Defined Security (SDSec)
Software-defined security (SDSec) is a cybersecurity approach that uses software to manage and automate security functions, such as access control, intrusion detection, and network segmentation. Instead of relying on fixed hardware, SDSec virtualizes these tools, making security more flexible, scalable, and easier to update. This approach is especially useful in cloud-based environments, where traditional hardware-based security can’t keep up with the dynamic nature of virtual systems.
Spam
Email spam, also known as junk mail or unsolicited bulk email (UBE), refers to large volumes of unwanted emails sent to multiple recipients, often for advertising or malicious purposes. These messages are typically not requested by the recipient and are sent in bulk. Spammers gather email addresses from various sources like websites, chatrooms, or infected computers, and often sell them to others. Spam also appears in other forms—such as social media posts, comments, or messages, and SMS texts—usually promoting scams, phishing attempts, or questionable products.
Spam Filtering
Spam filtering is the process of automatically identifying and blocking unwanted or unsolicited emails (spam) from reaching a user’s inbox.
Spear Phishing
Spear phishing is a targeted cyberattack where malicious actors impersonate trusted individuals or organizations to trick specific targets into revealing sensitive information or installing malware. It’s a more personalized and sophisticated form of phishing, focusing on individuals or groups rather than mass distribution.
Spyware
Spyware is a type of malicious software (malware) that secretly gathers information about a user’s computer or device activities without their knowledge or consent. It can collect a wide range of personal data, including browsing history, passwords, and other sensitive information. Spyware can be installed through various means, such as bundled with free software, malicious links, or disguised as legitimate software.
SSD
SSD stands for Solid-State Drive. It’s a type of computer storage device that uses integrated circuit assemblies to store data persistently. It acts like a hard drive, storing data indefinitely, but has no moving parts.
SSL
SSL (Secure Sockets Layer) is a security technology that establishes an encrypted link between a web server and a browser, ensuring that all data passed between them remains private. It’s a standard security protocol used to protect online transactions and data transfer, especially when sensitive information like login credentials, credit card details, or personal data is involved. Websites using SSL or TLS often display a padlock icon in the web browser, indicating that a secure connection is established.
Switch
A network switch, often called an Ethernet switch, is a networking device that connects multiple devices within a local area network (LAN), allowing them to communicate with each other. It intelligently forwards data packets based on the destination MAC address, ensuring efficient and direct communication between devices.
System Hardening
System hardening is the process of securing a computer network by reducing its vulnerability to attacks and unauthorized access. This involves implementing various security measures to protect network components, such as servers, endpoints, and other devices, from potential threats.
T
TCP/IP
Transmission Control Protocol/Internet Protocol, is a suite of communication protocols that govern how devices exchange data over networks like the internet. It’s the foundation of how computers and other devices connect and communicate with each other. Essentially, it’s a set of rules that ensures reliable and efficient data transmission between different networks.
Teams / Microsoft Teams
Microsoft Teams is a communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration.
TIFF
A TIFF file (.tif), which stands for Tagged Image File Format, is a computer file used for storing graphics and image information. It’s a popular choice for high-quality images, especially in professional settings like printing and graphic design. TIFFs are known for their ability to store images with lossless compression, meaning no data is lost when the image is saved.
Trojan Horse
In cybersecurity, a Trojan horse, or Trojan, is a type of malware that is disguised as legitimate software to trick users into installing and running it. Once executed, Trojans can perform malicious actions like stealing data, providing backdoor access, or even installing other malware. Unlike viruses, Trojans do not replicate themselves.
Two-Factor Authentication (2FA)
Two-factor authentication (2FA), also known as two-step verification, adds an extra layer of security to your online accounts. It requires users to provide two different factors of identification to prove their identity when logging in, making it significantly harder for unauthorized individuals to access accounts.
U
Unified Threat Management (UTM)
Unified Threat Management (UTM) is a comprehensive security solution that consolidates multiple security features into a single platform, typically a hardware appliance, to protect networks from various threats. UTM solutions offer a streamlined approach to security management, simplifying deployment, configuration, and maintenance compared to using individual security products.
Upload
The process of transferring one or more files from your local computer to a remote computer. The opposite action is download.
USB
Universal Serial Bus (USB) is an industry standard for digital data transmission and power delivery between many types of electronics.
USB Port
A USB port is a standard connection point, commonly found on computers and other electronic devices, that allows for the connection of various peripherals and devices. It utilizes the Universal Serial Bus (USB) standard for data transfer and sometimes power delivery. USB ports enable communication and data transfer between devices like keyboards, mice, printers, external hard drives, and smartphones.
Username
A username, also known as an account name, login ID, or user ID, is a unique identifier that allows a computer or online service to distinguish between different users. It’s essentially a way for the system to know who is using it. Usernames are often associated with passwords to verify the user’s identity.
URL
A URL, or Uniform Resource Locator, is a unique address that identifies a resource on the internet, like a webpage or file. It’s essentially a web address that tells your browser where to find specific content. For example, https://www.google.com is URL for Google.
V
Virtual Desktop
A virtual desktop or virtual desktop infrastructure (VDI) is a digital representation of a computer desktop that exists on a server or in the cloud, rather than on a physical computer. It allows users to access and interact with a familiar desktop environment from any device with an internet connection. Essentially, it’s like streaming your computer’s desktop to another device.
Virtual Memory
A technique that enables a certain portion of hard disk space to be used as auxiliary memory so that your computer can access larger amounts of data than its main memory can hold at one time.
Virtualization
Virtualization is a technology that allows one physical computer to run multiple virtual systems, each acting like a separate, independent machine. This is made possible by software which manages these virtual environments and distributes hardware resources like memory and processing power. Virtualization can be applied to computers, operating systems, storage devices, and networks, making IT systems more efficient, flexible, and cost-effective. The physical machine is known as the host, while each virtual environment is called a guest.
Virus
A computer virus is a type of malicious software designed to spread by attaching itself to files or programs and replicating when those files are opened or run. Once active, a virus can harm a computer by corrupting data, damaging files, or disrupting normal operations. Viruses commonly spread through email attachments, internet downloads, or infected USB drives. They often work silently in the background, making them hard to detect without antivirus software.
Vishing
Vishing, short for voice phishing, is a type of social engineering attack where scammers use phone calls to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal details. It’s a way for cybercriminals to impersonate trusted entities, like banks or tech support, to gain your trust and steal your information.
VoIP
VoIP, which stands for Voice over Internet Protocol, is a technology that allows you to make phone calls over the internet instead of traditional phone lines. It essentially converts your voice into digital data packets that are then transmitted over the internet, allowing for calls to be made to anyone with a phone number, including landlines and mobile phones.
VPN
A VPN, or Virtual Private Network, creates a secure, encrypted connection over a public network, like the internet, allowing users to access private networks and resources as if they were directly connected. It masks your IP address and encrypts your internet traffic, enhancing privacy and security, especially when using public Wi-Fi.
W
WAN
A wide area network (WAN) is a computer network that covers a broad geographic area, often spanning multiple cities, regions, or even countries. Unlike a local area network (LAN) which connects devices in a limited area like a home or office, a WAN enables communication and resource sharing across larger distances.
WAP
In networking, WAP commonly refers to a Wireless Access Point. It’s a device that allows wireless devices like laptops and smartphones to connect to a wired network, effectively extending the reach of the network using Wi-Fi. Think of it as a bridge between the wired and wireless worlds, enabling seamless connectivity for various devices.
WEP
WEP, or Wired Equivalent Privacy, was one of the first security protocols designed to protect wireless networks. Introduced in 1997 as part of the original Wi-Fi standard, its goal was to offer the same level of privacy as a wired network. However, WEP was found to have major security weaknesses and is now considered outdated and vulnerable. It has since been replaced by more secure protocols like WPA, WPA2, and WPA3.
Wi-Fi
Wi-Fi is a wireless networking technology that uses radio signals to connect devices to the internet without the need for cables. While often thought to mean “wireless fidelity,” Wi-Fi is actually a trademarked term referring to networks based on the IEEE 802.11 standards. Devices labeled “Wi-Fi Certified” have been tested to ensure they can work together reliably, regardless of brand, providing seamless wireless communication and internet access.
Window
In a computer’s graphical user interface (GUI), a window is a designated, usually rectangular, area on the screen that displays the output of and allows input to a program or process. It’s a fundamental component of a GUI, enabling users to interact with multiple applications simultaneously.
Windows
Shorthand for Microsoft Windows, a graphical operating system used to manage a computer’s hardware and software, providing a user interface for interacting with the device. It’s essentially the software that allows you to use your computer.
Wireless Networking
Wireless networking allows devices to connect to a network and the internet without physical cables, using radio waves to transmit data. It encompasses various technologies like Wi-Fi, Bluetooth, and cellular networks, enabling connectivity in homes, offices, and public spaces.
WLAN
A Wireless Local Area Network (WLAN) is a network that allows devices to connect to a network using radio waves, rather than physical cables, within a limited geographic area. It’s essentially a wireless version of a Local Area Network (LAN), offering users the freedom to move around while staying connected.
World Wide Web (WWW)
The World Wide Web, often called the web, is a system of interconnected documents and other resources, like websites and videos, that are accessible through the internet. It’s a way to access and share information online using hyperlinks and web browsers. The web is a specific application that runs on top of the internet, not the internet itself.
Worm
In cyber security, a worm is a type of self-replicating malware that spreads across networks and systems without needing user interaction. Unlike viruses, which require a host program to execute, worms are standalone programs that can propagate independently, often exploiting system vulnerabilities. They can cause significant damage by consuming resources, corrupting data, and even installing other malware.
WPA
WPA, or Wi-Fi Protected Access, is a security protocol designed to protect wireless computer networks. It was developed to replace the older and weaker WEP (Wired Equivalent Privacy) protocol, offering stronger encryption and authentication methods to secure Wi-Fi networks from unauthorized access.
X
XDR
In cybersecurity, XDR (Extended Detection and Response) is a security approach that integrates and automates threat detection and response across multiple security layers, including endpoints, networks, cloud environments, and email. It aims to provide a more comprehensive view of security incidents, enabling faster and more effective threat detection and response compared to traditional security tools.
Y
Z
Zero-Day
In cybersecurity, a zero-day (or zero-hour, or day zero) refers to a vulnerability in software or hardware that is unknown to the vendor or developer, meaning there’s no existing patch or fix available to address it. “Zero-day” signifies that the vendor has had “zero days” to develop a solution. Attackers can exploit these vulnerabilities before a fix is released, making them highly dangerous.
Zero Trust Network Access (ZTNA)
Zero trust in cybersecurity is a security model that operates on the principle of “never trust, always verify.” It assumes that no user, device, or application should be implicitly trusted, regardless of whether they are inside or outside the network perimeter. Instead, every access request is authenticated, authorized, and continuously monitored. This approach contrasts with traditional security models that often grant implicit trust to users and devices within the network.
At Pinnacle Thrive Solutions, we take a comprehensive approach to understanding your organization’s unique needs, aligning our services to your goals for maximum efficiency and success.
Our services include proactive IT monitoring, real-time analytics, and actionable insights to ensure smooth operations and minimize downtime. By leveraging advanced technologies and a team of skilled professionals, we provide tailored solutions that address everything from threat detection to employee security training. With Pinnacle Thrive Solutions, businesses can focus on their core objectives while we handle the complexities of IT management, ensuring reliability, security, and scalability for long-term growth.
big enough to serve you, small enough to know you
While all of the IT, Cybersecurity, and Networking terminology can be confusing, keeping your IT infrastructure in top shape doesn’t need to be. We’re here to help.
- Inspection of Network Architecture
- Evaluation of Networked Devices
- Assessment of Security Measures and Data Backup
- Analysis of Best Practices
Your technology matters.
Our goal is to keep your technology running as fast as you do.