Leaders in Data security, IT services and Enterprise software development.

Glossary of IT Terms

Some common IT terms include:
  • Data Protection
    Preventing important information from being corrupted, compromised, or lost.
  • Disaster Recovery
    The process, policies, and procedures for recovering important files after a natural or manmade disaster.
  • Network Security
    Using both software and physical preventative measures to protect a network from threats, such as unauthorized access, modification, malfunction, or destruction.
  • Data and Privacy Compliance
    Adhering to established guidelines, specifications, and legislation for protecting personal information.
  • Security Audits
    Reviewing and evaluating a company’s network security in order to determine and fix any problem areas.
  • IT Company
    A business that provides services for the operation of computer systems.
  • IT Service Management
    All of the activities used to design, plan, deliver, operate, and control any IT services offered to customers.
  • Managed IT Services
    Outsourced services that can help improve information-technology operations and cutdown on expenses.
  • Cloud Computing
    Software and services that run on the Internet rather than a computer.
  • IT Consulting
    Advising a business on how to best use IT to reach their business objectives.
  • Data Centre
    A facility where computer systems and associated components (backup power supplies, data communication connections, environmental controls, and security devices) are stored.
  • Microsoft Windows
    A group of operating systems for PC or compatible computers.
  • Managed Service Provider
    A company that provides a range of information-technology (IT) services.
  • Spam
    Junk email that is unsolicited and sent in bulk to numerous email addresses.
  • Virus
    A mischievous or destructive program that works to alter a computer’s data.
  • The Cloud
    A common shorthand for cloud computing services.
  • Local Area Network (LAN)
    A small local network of computers that share resources, such as programs, documents, or printers.
  • Firewall
    A piece of software or hardware used to block certain types of traffic.
  • Network
    A group of computers connected on a LAN or over the Internet that are capable of exchanging information.
  • Authentication
    The process of confirming the claimed identity of the user.
  • Two-Factor Authentication
    Granting permission for a user to access or change certain files or areas of network.
  • Backup
    Creating copies of files and applications to prevent losing data as a result of a system failure or natural disaster.
  • Data Loss Prevention
    Stopping data with protected information from being exposed or lost.
  • Disaster Recovery Plan
    A written document outlining the process of restoring operations, applications, or a computer facility after a major hardware or software failure.
  • Local Storage
    An information storage system that is physically located at a workstation or server.
  • Malicious Code
    Hostile, intrusive, or annoying software designed to infiltrate or damage a computer system without the owner’s knowledge.
  • Offsite Storage
    An information storage system that is located in a different area that does not share the same disaster threat event as the business’ building.
  • Spyware
    Software installed on a computer to intercept or partially take over a computer without the owner’s consent.
  • Trojan
    A destructive program (virus or worm) that is hidden in an innocent-looking piece of software, such as a game.
  • Vulnerability
    A part of a system or process that can be exploited.
  • Worm
    A program that makes copies of itself in a computing system to be sent over networks to other computers.
  • Cybersecurity
    Measures taken to protect a computer, device, or network from a cybercrime.
  • Cybercrime
    An illegal activity, such as identity theft or spreading computer viruses, that is undertaken or relies heavily on a computer.
  • Phishing
    A type of email scam designed to trick recipients into revealing confidential information.
  • Computer Hardware
    Physical equipment used for inputting, processing, and outputting information on a system.
  • Computer Software
    Detailed instructions that have been preprogrammed onto an information system in order to control and coordinate computer hardware components.
  • Information-Technology (IT) Infrastructure
    Computer hardware, software, data, storage technology, and networks that make up the shared IT resources for a business.
  • Server
    A computer that has been specifically optimized to provide resources, such as software, to other computers on the same network.