Your IT Glossary
A
1. Access Control – Security technique regulating user access to systems and data.
2. Active Directory (AD) – Microsoft’s directory service for managing users and devices.
3. Agile Development – A flexible software development methodology using iterative cycles.
4. Antivirus Software – A program designed to detect and remove malicious software.
5. Application Programming Interface (API) – A set of rules that allow different software programs to communicate.
6. Artificial Intelligence (AI) – Simulation of human intelligence in machines for automation and problem-solving.
7. Asset Management – Tracking and managing IT hardware and software resources.
8. Automated Testing – The process of using software tools to test applications automatically.
B
9. Backup & Recovery – Strategies to restore lost or corrupted data.
10. Bandwidth – The amount of data transmitted over a network in a given time.
11. Big Data – Large and complex data sets requiring specialized analysis tools.
12. Blockchain – A decentralized, secure technology for recording transactions.
13. Botnet – A network of compromised computers used for cyberattacks.
14. Business Continuity Plan (BCP) – A strategy to maintain operations during disruptions.
15. Business Intelligence (BI) – Technologies used for analyzing business data.
C
16. Cloud Computing – The delivery of computing services over the internet.
17. Cybersecurity – The practice of protecting systems, networks, and data from cyber threats.
18. Cache Memory – A small, high-speed storage layer for frequently used data.
19. Compliance – Adherence to regulations like GDPR, HIPAA, or SOC 2.
20. Content Delivery Network (CDN) – A network of servers that deliver web content faster.
21. Cryptography – The practice of encrypting digital communications for security.
22. Customer Relationship Management (CRM) – A system for managing interactions with clients.
23. Cyber Threat Intelligence (CTI) – Information collected to understand and prevent cyber threats.
D
24. Data Center – A facility that houses IT infrastructure and servers.
25. Data Encryption – The process of converting data into secure, unreadable code.
26. Data Loss Prevention (DLP) – Security strategies to prevent data breaches.
27. DevOps – A methodology integrating software development and IT operations.
28. Disaster Recovery (DR) – A strategy to restore IT functions after a disruption.
29. Domain Name System (DNS) – Converts website names into IP addresses.
30. Distributed Denial-of-Service (DDoS) Attack – A cyberattack that overwhelms a network with traffic.
E
31. Edge Computing – Processing data closer to the source to reduce latency.
32. Encryption – The process of securing data by converting it into code.
33. Endpoint Security – Protection for devices like laptops, mobile phones, and desktops.
34. Enterprise Resource Planning (ERP) – Integrated business management software.
35. Ethical Hacking – Authorized testing of IT security systems to find vulnerabilities.
36. Event-Driven Architecture – A software design pattern that responds to system events.
F
37. Firewall – A security system that monitors and controls network traffic.
38. Firmware – Software programmed into hardware devices for functionality.
39. Fraud Detection – Identifying and mitigating financial or security fraud.
40. Functional Testing – A type of software testing focused on application functions.
G
41. General Data Protection Regulation (GDPR) – European privacy regulation for data security.
42. Gateway – A networking device that connects different systems and protocols.
43. Graph Database – A database optimized for storing and querying relationships.
H
44. Hardware Procurement – The process of acquiring IT equipment for business use.
45. Helpdesk Support – IT support services for resolving technical issues.
46. Hybrid Cloud – A mix of on-premises, private, and public cloud environments.
47. Hyperautomation – The use of AI and robotic process automation to streamline tasks.
I
48. Identity & Access Management (IAM) – Security framework for user authentication.
49. Incident Response – A structured approach for handling security breaches.
50. Infrastructure as a Service (IaaS) – Cloud-based infrastructure services.
51. Internet of Things (IoT) – The interconnection of smart devices via the internet.
J
52. JavaScript (JS) – A programming language commonly used for web development.
53. JSON (JavaScript Object Notation) – A lightweight format for data exchange.
K
54. Kerberos – A network authentication protocol for secure logins.
55. Knowledge Management System (KMS) – A system for organizing and retrieving knowledge
L
56. Load Balancer – Distributes network traffic to prevent overload.
57. Low-Code Development – Software development using minimal manual coding.
M
58. Machine Learning (ML) – AI systems that improve performance based on data analysis.
59. Malware – Malicious software that disrupts or damages IT systems.
60. Managed IT Services – Outsourced IT management for businesses.
61. Microservices Architecture – A method of designing software as a collection of small, independent services.
62. Multi-Factor Authentication (MFA) – A security process requiring multiple verification steps.
N
63. Network Security – Measures to protect IT infrastructure from cyber threats.
64. Next-Generation Firewall (NGFW) – Advanced firewall technology with deep packet inspection.
65. Network Segmentation – Dividing a network into smaller, isolated segments to enhance security.
66. Network Virtualization – Creating virtual versions of physical network resources.
O
67. On-Premises IT – Infrastructure physically located within a company’s facility.
68. Open Source Software – Software with publicly available and modifiable source code.
69. Operational Technology (OT) – Hardware and software that detect or cause changes through direct monitoring.
70. Orchestration – Automating the coordination of complex IT processes.
P
71. Patch Management – The process of updating and securing software.
72. Penetration Testing – Simulated cyberattacks to identify security vulnerabilities.
73. Phishing Attack – A scam designed to steal sensitive information.
74. Platform as a Service (PaaS) – Cloud-based application development platforms.
75. Public Cloud – Cloud services provided over the internet.
Q
76. Quantum Computing – Advanced computing using quantum mechanics principles.
77. Quality Assurance (QA) – The process of ensuring software meets required standards before deployment.
R
78. Risk Management – Identifying and mitigating IT security risks.
79. Remote Desktop Protocol (RDP) – A protocol for accessing computers remotely.
80. Role-Based Access Control (RBAC) – Assigning system access based on job roles.
S
81. SaaS (Software as a Service) – Cloud-based software delivery model.
82. Scalability – The ability of IT systems to handle increased workload.
83. Security Information and Event Management (SIEM) – A system for real-time security monitoring.
84. Serverless Computing – A cloud execution model where the cloud provider dynamically manages resources.
85. Shadow IT – Unauthorized IT systems and applications used within an organization.
86. Single Sign-On (SSO) – A system allowing users to log in with one credential.
87. Smart Contracts – Blockchain-based contracts that execute automatically.
T
88. Threat Intelligence – Insights into cyber threats to improve security defenses.
89. Tokenization – Replacing sensitive data with unique identification symbols to protect it.
90. Two-Factor Authentication (2FA) – A second layer of security for login processes.
U
91. Unified Communications (UC) – Integrated communication tools for businesses.
92. User Experience (UX) – The overall experience users have while interacting with a system.
V
93. Virtual Private Network (VPN) – A secure network connection over the internet.
94. Virtualization – The creation of virtual instances of computing resources.
W
95. Web Application Firewall (WAF) – A firewall that protects web applications.
96. Wireless Network Security – Measures used to protect wireless networks from unauthorized access.
X
97. XaaS (Everything as a Service) – A term referring to the broad category of cloud-based services.
Y
98. Yottabyte – A unit of data storage equal to one septillion bytes.
Z
99. Zero-Day Exploit – A security flaw targeted before a patch is available.
100. Zero Trust Security – A security model requiring continuous verification.