Definitions
Our IT & Cyber Security Definitions
Why We Created This Resource
As technology and cyber threats continue to evolve, many businesses struggle to keep up with the terminology across the IT and cyber security landscape. For this reason, as a small and dedicated IT managed service provider, we built this page to offer clear and practical IT and cyber security definitions.
How These Definitions Help Your Business
These explanations help your team make informed decisions, strengthen security awareness, and understand the tools that protect your business. In addition, this glossary guides you through essential terms so you can navigate modern IT challenges with greater confidence and clarity.
IT & Cyber Security Definitions
Cyber Security – The practice of protecting critical systems and sensitive information from digital attacks.
Network Security – The policies, processes and practices adopted to prevent, detect and monitor unauthorized access or changes.
Ransomware – A type of malicious software designed to block access to a computer system until a sum of money is paid.
Malware – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Anti-virus – A Software designed to detect and destroy computer viruses.
Cloud Services – A service made available to users on demand via the Internet.
Patch Management – Acquiring, testing and installing security patches.
Phishing – The fraudulent practice of sending emails purporting to be from reputable individuals or companies in order to induce individuals to reveal personal information.
Multi-factor authentication – Authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.
Hardware – The physical elements that make up a computer or electronic system and everything else involved that is physically tangible.
Software – The programs and other operating information used by a computer.
Back-up – An extra copy of data from a computer stored at an alternate location, so it can be recovered in case of accidental deletion or corruption.
Data Recovery – The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
Disaster Recovery – An organization’s ability to respond to and recover from an event that negatively affects business operations.
Network Integrations – Combining different hardware and software components into an integrated network system.
Cyber Resilience – The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises.
Threat management – A process used to prevent, identify and respond to cyber attacks with speed and accuracy.
Security management – The identification of an organization’s assets, followed by the development, documentation, and implementation of policies and procedures for protecting assets.
Download – copying data from one computer system to another, typically over the internet.
Upload – Transferring data from one computer system to another.
Wireless – Using radio, microwaves, etc. as opposed to wires or cables to transmit signals.
Proactive Monitoring – The process of continuously searching for indicators that would alert to a potential problem.
Technical Support – A service which offers help and advice to technology users.
Server – A device which manages access to a centralized resource in a network.
Switch – A high-speed device that receives and forwards data to its respective destination on a local area network.
Router – a device that connects a local network to the internet, and manages the movement of data.
Local Area Network – a computer network that links devices within a building or group of adjacent buildings.
Access point – A networking device that allows other wireless devices to connect to a wired network.
Wi-Fi – The wireless technology used to connect computers, tablets, smartphones and other devices to the internet by radio waves.
Bandwidth – The maximum amount of data transmitted over an internet connection in a given amount of time.
Operating System – software that supports a computer’s basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Computer Peripherals – A device connected to a computer to provide communication and additional functionality. Ex. Mouse, Keyboard, Monitor etc.
Microsoft Windows – An operating system developed by Microsoft.
Email – Messages distributed by electronic means from one computer user to one or more recipients via a network.
Laptops – Portable computers that you can take with you and use in different environment.
Computers – A programable, electronic device for storing and processing data.
NIC (Network Interface Controller) – a hardware component that connects a computer to a network.
RAM (Random Access Memory / Computer Memory) – a device’s short-term memory – a computer will temporarily store data for ongoing operations while the computer is turned on and running.
Hard Drive – A computer’s long-term memory. The location of where the Operating System, all installed applications and data reside.
Phone Systems – A communication system that transmits sound between distant points.
VOIP / IP Telephony (Voice over Internet Protocol) – technologies for the delivery of voice communications over the Internet.
Monitor / Displays – Device that displays information in pictorial or text form.
Network – Two or more devices sharing resources.
VPN (Virtual private network) – Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Encryption – The process of concealing information, to prevent unauthorized access.
Remote Desktop – A software or operating system feature that allows a personal computer to access a desktop environment remotely.
MSP (Managed Service provider) – A third-party company that remotely manages a customer’s technological infrastructure and end-user systems.
UPS (Uninterruptible power supply) – Electrical device that will self-activate in the event of a power disruption and function as the primary power source.
Authentication – The process of verifying one’s identity.
Login – Entering a combination of username and password to gain access to a system or device.
Credentials – Refer to pieces of identification. In computing, this generally equates to a username and password combination.
Endpoint – Any device which is part of a computer network.
SOC (Security Operations Centre) – A group or unit of individuals who deal with security on an organizational and technical level.
NOC (Network Operations Centre) – A group or unit of individuals who monitor, maintain and manage a Network or group of networks.
EDR (Endpoint Detection and Response) – A type of technology that continually monitors the device for cyber threats.
MDR (Managed Detection and Response) – A service that monitors and provides intrusion detection of malware or unauthorized activity on your network and assists in rapid response to eliminate those threats.
XDR – A combination of both EDR and MDR technology and service.