It Terminology
It Terminology
Agile
Algorithm
intelligence.
Assembly Language
Augmented Reality (AR) uses a device placed between the person and their
Automation
workers from routine tasks but still requires oversight to ensure proper operation.
Autonomous Vehicle
Autonomous vehicles can operate and sense their surroundings without human
involvement.
Big Data
Big data is a label that typically applies to extremely large and/or unstructured data
sets or data sets. Many organizations have little differentiation between their
Biometric Authentication
Blockchain
Blocklisting
Bluetooth
Bluetooth is a technology that allows devices to connect with each other over short
Botnet
A botnet is a system of devices that are infected with malware and is controlled by
stores, processes and executes instructions. Think of the CPU as the brains of the
computer.
Cache
Caches are digital storage used to store temporary files that devices can use for
Cloud Computing
network connections in a way that allows more self-service and dynamic allocation.
This can be done by working with a public cloud provider or building a private cloud
implementation.
Computer Networking
Computer networking is the process of linking computers together to send and
Containerization
Everything that the application needs to run is placed inside that container. It can
Cyberattack
personal devices.
Cybersecurity
education.
Cybersecurity Analyst
Cybersecurity Specialist/Engineer
cyberattacks. They focus on fixing and protecting these systems and staying up to
DDoS Attack
Dark Web
The dark web is a part of the internet that isn’t accessible to the general public. It
can only be accessed by using special software so that users can remain
anonymous.
Data Analyst
A data analyst is someone who works with an organization’s data to assist in
making better business decisions and provide insights that support decision-making
efforts.
Database Administrator
database environment.
Data Center
A data center is a physical server facility that securely houses critical applications,
Data Mining
Data mining is the process of examining and manipulating data sets to find patterns
Data Visualization
Data visualization is the representation of data through visual elements like charts,
DevOps Engineer
DevOps engineers is someone who combines software development and IT
Drone
Also known as unmanned aerial vehicles (UAV), drones are flying machines that are
Edge Computing
creation.
Embedded Development
Encryption
information into something that can only be read with a key related to the type of
conversion.
Front End Developer
graphics on a device.
Short for high-definition multimedia interface, HDMI digitally transmits video and
is documented, tested and trained toward in the event of a security breach. The
purpose of the incident response plan is to prevent data and monetary loss and to
computing capability. These devices are different from traditional computers and
IP Address
network.
IT Project Manager
An IT project manager is someone who sets timelines for technical projects and
IT Support Specialist
IT support specialists (or help desk technicians) are the individuals responsible for
Linux
Machine Learning
Malware
information or systems.
and experience to implement and manage technology solutions that help their
Network Administrator
Network Segmentation
complete application control and visibility and are more sophisticated than
traditional firewalls.
Open-source Software
Open-source software has code that can be modified and seen by anyone. What
Operating System
memory and processes. Some examples include Linux, Apple macOS and Microsoft
Windows.
to allow a single fiber from a service provider the ability to maintain an efficient
Penetration Testing
Phishing
Phishing attacks use email, phone or text to get someone to provide sensitive
development services. PaaS solutions can be used to develop software for internal
Programming Language
software applications.
QA Analyst
A QA analyst is someone who uses quality assurance techniques to detect errors in
multiple times.
Ransomware
Ransomware is a type of malware that encrypts your data so that attackers can
Raspberry Pi
A Raspberry Pi is a credit card sized computer that brings programming capabilities
Security Architect
A security operations center (SOC) can refer to the team of experts that monitor an
organization’s ability to operate securely. It can also refer to the location of the
Social engineering is the method of gaining the trust of a user so that the attacker
the internet so that it can be easily accessed by anyone that is connected to the
internet.
Spoofing
source of information.
Steganography
Systems Administrator
Threat hunting is the process of mitigating cyber threats before they attack an
organization.
Threat Detection
Troubleshooting
rigorous and repeatable process and then solving those problems using testable
methods.
UI/UX Designer
UI/UX designers are individuals who research the behavior and preferences of
consumers in order to develop and test design models that make products easier for
people to use.
Virtualization
Virtualization is the process of creating copies of computing resources such as
using dedicated hardware or software to create the extension and securely transmit
data.
Vulnerability Assessment
Web Developer/Designer
Web developers are individuals responsible for both the design and look of a
website as well as the site’s technical aspects such as performance and capacity,
A wide area network (WAN) is a large network of information and data that is not
Zero Trust
and data at every level rather than assuming that the source of the information can
be trusted.