Glossary

We in ICT are aware that we often use terms that may not always be easily understood by non-ICT people. Often, there are no alternative words we can use, but we can provide an explanation.

What is...?

An administrator is a system manager with full access rights.

Artificial Intelligence refers to computer systems performing tasks that normally require human intelligence, including learning, reasoning, problem-solving, and understanding language.

A security vulnerability is a flaw in software that allows unauthorized access to systems.

A botnet is a "Robot" "Network". Computers hacked by cybercriminals (hackers) are used for attacks such as DDoS. Usually, the owners of these computers do not even know their machines are part of a botnet.

Cloud backup means making a copy of important company data and storing it safely in the cloud, helping companies protect and restore information.

Cloud computing is a technology that allows access to servers, networks, applications, and files via the internet instead of storing and processing them locally.

Digital currency often used as an alternative to traditional money. The world’s most famous cryptocurrency is Bitcoin.

Cybersecurity focuses on protecting systems, networks, programs, and data from digital attacks, damage, or unauthorized access. It involves firewalls, antivirus, and encryption.

Data minimization is the principle of collecting, storing, and processing only the minimal amount of personal data necessary, protecting privacy and reducing risk of breaches.

A DDoS attack = Distributed Denial-of-Service attack. Hackers attempt to overload a website or network with traffic from multiple sources, causing temporary unavailability.

AI-generated manipulated images, videos, or audio.

DNS stands for Domain Name System; it translates domain names into numbers (IP addresses), managing internet traffic.

A dynamic webpage is generated only when a visitor requests it.

End-to-end encryption ensures that data sent between parties, such as messages or files, can only be read by the intended recipient.

Endpoint security protects devices like laptops, smartphones, and tablets against viruses and other threats.

ERP (Enterprise Resource Planning) is software that helps businesses manage all key operations such as inventory, orders, and finances, improving efficiency and workflow.

An ethical hacker uses hacking techniques to find vulnerabilities in ICT systems. They publish the vulnerabilities to inform organizations so they can be fixed, preventing criminal hackers from exploiting them.

An exploit is software that takes advantage of a vulnerability to gain control over a system.

A firewall is an invisible wall, a system that sits between a computer/network and the internet, blocking dangerous traffic from outside. A "wall" that protects computers from misuse.

A green cloud uses environmentally friendly technologies in cloud computing, such as energy-efficient data centers and renewable energy sources, reducing ecological impact.

A hacker is a cybercriminal who illegally bypasses computer and network security to gain advantage. They may take over computers, destroy or steal data, or prevent others from using systems.

A Juniper network is a data center network consisting of various hardware (switches, routers) that work together to provide connectivity and security.

MaaS stands for Monitoring as a Service. MSPs monitor IT systems of a company and ensure issues are resolved quickly.

Malware is malicious software that can harm your computer or network. These programs are created to collect sensitive information from your computer or provide others access to it.

An MSP is an external company providing IT services such as network management, backup, security, and technical support. MSPs take over IT maintenance, allowing businesses to focus on core activities.

This method requires multiple steps to access your account. The first step is entering your username and password. The second step is a second key, such as a code from a phone app or SMS. Only using both allows login.

Network monitoring means continuously observing an IT network to ensure it functions properly. Infracom does this to quickly detect and resolve issues.

Connecting a UTP/PATCH cable via a switch/hub to a router. Often used in large networks.

A patch panel is a collection point where all equipment and cabling in a building come together, then connected to a patch panel.

A phishing email is an email used by cybercriminals to deceive you in order to obtain your login credentials. A bank never asks for these details via email!

A private cloud is a cloud environment (databases, software, servers, networks) used exclusively by one organization. It offers the benefits of public cloud but with additional control and security.

RaaS stands for Ransomware as a Service. Cybercriminals offer ransomware tools as a service to others, allowing them to launch attacks.

Ransomware is a type of malware that locks a computer or encrypts files. Only paying ransom would restore access. Also called cryptoware or locker software.

A Responsible Disclosure report can be submitted to an organization when a visitor, user, researcher, or ethical hacker discovers a weakness in ICT security. This helps prevent abuse and improves ICT system security. Also known as a Coordinated Vulnerability Disclosure (CVD) report.

A router is a device that connects multiple networks, allowing data to be sent from one network to another.

Secure remote access allows employees to safely connect to company networks and resources from remote locations, often using VPNs and two-factor authentication.

A cybercriminal obtains your phone data through the provider and takes over your phone number. Since logging in often requires an extra security step (e.g., an SMS code), the criminal can impersonate you.

A cybercriminal impersonates someone else. This is used to steal data (Phishing).

SSL VPN (Secure Socket Layer Virtual Private Network) provides a secure and encrypted connection to a private network over the internet, allowing safe remote access.

A supply chain attack occurs when a company is affected by an attack through a supplier. Systems are infected via existing software.

A switch connects multiple computers and devices within a network. It directs data directly from one port to another.

Two-factor authentication (2FA) is a method requiring two steps to gain access. The first step is usually entering a username and password, the second can be an SMS code.

URL stands for Uniform Resource Locator and is a name that refers to a piece of data.

The unique address of a webpage, email, or any file. A URL indicates which resource to request and which method to use.

Viral refers to content, often a video, spreading very quickly across the internet because everyone shares it.

Virtual Local Area Network (VLAN). Allows creation of separate LANs within a network or connecting multiple networks into one.

Virtual Private Network – An employee connects from home to an encrypted company network.

Quishing is a phishing variant where a QR code, rather than a clickable link, is used to redirect victims to a fake website or payment page to steal personal data.

Full
support

Need help? Find your answer in our online helpdesk.
Support