Decoding the Language of IT Made Easy
Welcome to Nortec’s IT Glossary, your personal decoder for the intricate world of IT! This isn’t just a list of terms, it’s a journey crafted to transform IT complexities into clear, comprehensible concepts. Whether you’re an IT veteran looking for a memory jog or new to the tech world, our glossary is designed to ensure you navigate this landscape with ease.
Remember, IT shouldn’t be an uphill battle. That’s why our expert team at Nortec is on standby to assist. We’re here to be your trusted guide in your IT journey, transforming confusion into clarity, one term at a time.
Active Directory (AD)
A Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.Adware
A type of malicious software designed to insert adverts into webpages or even standalone pop-up ads.Anti-virus software
Programs used to detect, fend off and remove malicious software.Authentication
The process of confirming the identity of a person or software program.Backdoor
An unintended software vulnerability that allows unauthorized users to gain access.Backup
Regular creation of copies of data, or the copy of data itself. These are used to restore and recover data.Backup and Disaster Recovery (BDR)
A combined approach to data protection that encompasses both backup and a strategy for recovering this data in the event of a catastrophic event (disaster recovery). This process involves storing data in a separate, secure location. Ideally, this is off-site with cloud-based redundancy, soit can easily be restored if there is a hardware failure, data corruption, cyberattack, or other form of data loss.Black Hat Hacker
A person who uses their skills for illegal or unethical purposes.Bot
A type of software application created by hackers to carry out specific tasks.Botnet
A network of private computers, infected with malicious software and controlled as a group.Breach
An incident where data is unintentionally left unprotected, potentially leading to information being viewed, accessed or stolen by unauthorized individuals.Break/Fix Services
IT services provided on a need-based, reactive basis where an IT company repairs systems as they break.Brute Force Attack
A trial-and-error method used to decode encrypted data, such as passwords or Data Encryption Standard (DES) keys.Bug
A coding error in a computer program leading to unexpected and incorrect or erratic behaviors.Business Continuity Planning (BCP)
The creation and validation of a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.BYOD (Bring Your Own Device)
Policy that allows employees to bring personal devices (laptops, tablets, etc.) to their workplace.Cloud Computing
The delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics and intelligence.Cookies
Files sent by web servers to web browsers, to be stored and sent back upon the server’s request.Cryptography
The method of disguising and revealing (otherwise known as encrypting and decrypting) information using mathematics.Cybersecurity
The protection of computer systems, networks and data from digital attacks.Cybersecurity Consultant
An expert in protecting information systems, assessing risks, and implementing solutions to mitigate potential security threats. They advise organizations on how to protect their digital resources, implement new security technologies, respond to specific security incidents, and improve the organization’s cybersecurity posture. This role may involve designing secure network solutions, developing information security policies and procedures, performing security audits, and providing training.Cybersecurity Training
Teaching staff about the technologies and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. This includes topics like identifying threats, how to recognize potential security incidents, and the steps they can take to keep their systems secure.Data Loss Prevention (DLP)
Strategies for making sure end users do not send sensitive or critical information outside the corporate network.Data Mining
The practice of examining large databases to generate new information.Data Recovery
The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.DDoS Attack (Distributed Denial of Service)
An attempt to disrupt the normal functioning of a network, service or website by overwhelming it with a flood of internet traffic.Disaster Recovery:
Disaster recovery is a set of policies, tools and procedures to recover or continue vital technology infrastructure and systems following a natural or human-induced disaster.DNS Filtering
Using the Domain Name System to block malicious websites or filter out harmful or inappropriate content.Domain Name System (DNS)
The system by which Internet domain names and addresses are tracked and regulated.Encryption
The process of converting plaintext data into unreadable ciphertext to prevent unauthorized access.End User
The person who uses or is intended to use a product.Endpoint
Any device that is physically an endpoint on a network. Laptops, desktops, mobile phones, tablets, servers, and virtual environments can all be considered endpoints.Endpoint Detection and Response(EDR):
Security tools that continuously monitor endpoint and network events for analysis, detection, investigation, reporting, and alerting. EDR provides real-time threat pattern analysis and can offer automated responses to detected threats.Firewall
A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.Firmware
Permanent software programmed into a read-only memory.Hacker
A skilled computer expert that uses their technical knowledge to overcome a problem or barrier.Hardening
The process of securing a system by reducing its surface of vulnerability.Hardware as a Service (HaaS)
A hardware procurement model similar to leasing or licensing, where hardware that belongs to a managed service provider (MSP) is installed at a customer’s site and the customer uses the hardware for a specific period of time. The hardware remains the property of the MSP, and the customer pays a monthly fee for using it. The HaaS model can include installation, maintenance, and upgrades, providing the customer with an up-to-date and suitable IT hardware environment.Hashing
The process of converting one value into another. In cryptography, it is a method to ensure the integrity of data.HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP, it is used for secure communication over a computer network.Hybrid Cloud Computing:
a computing environment that combines an organization’s private cloud services and public cloud services, allowing data and applications to be shared between them.Hybrid IT
An approach to enterprise computing in which an organization provides and manages some information technology (IT) resources in-house but uses cloud-based services for others.Hypervisor
Software that creates and runs virtual machines.Identity Management (IdM)
Also known as identity and access management (IAM), a framework for business processes that facilitates the management of electronic identities. It involves the control of who is authenticated (signed in) and authorized (has permissions) to access resources within an organization’s systems.Incident Management
An organizational process for dealing with incidents.Incident Response
A strategic approach to addressing and managing the aftermath of a security breach or cyberattack in a computer system. It encompasses a set of preplanned and reactive activities, aimed at minimizing damage and ensuring that the incident is handled in a way that limits damage and reduces recovery time and costs.Infrastructure as a Service (IaaS)
A form of cloud computing that provides virtualized computing resources over the internet.Intrusion Detection System (IDS)
A device or software application that monitors a network for malicious activity or policy violations.Intrusion Prevention System (IPS)
Network security appliances that monitor network and/or system activities for malicious activity.IP Address (Internet Protocol Address)
A numerical label assigned to each device participating in a computer network.ISP (Internet Service Provider)
A company that provides internet access to both personal and business customers.IT Consulting
Advising and supporting organizations in managing, optimizing, and leveraging their use of technology to achieve their business objectives. These services help clients assess various technology strategies and solutions that align with their business processes or goals.IT Support
A range of services providing assistance with technology products.Keylogger
A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.Load Balancing
The distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.MAC Address (Media Access Control)
A unique identifier assigned to network interfaces for communications on the physical network segment.Managed Backup
A service provided by managed IT service providers where they handle the data backup procedures and policies on behalf of the client.Managed Cloud Portal:
Nortec’s first-level cloud management service around the entire M365 Office Suite of applications plus Teams. The service includes consultation on licensing requirements, user management, data synchronization support and the configuration of the standard security capabilities of M365, namely multifactor authentication and ATP (advanced threat protection).Managed Cybersecurity Services
Comprehensive suites of cybersecurity services that are outsourced to a service provider. These services are intended to improve an organization’s security posture while relieving the burden of security management for the organization.Managed Data Center:
A data center service offered by Nortec that assists clients in the secure migration of their data to the cloud and offers managed support from IT professionals during the migration process, and after the data center has been created.Managed Endpoint Detection and Response (EDR)
A service that utilizes software installed on endpoint devices, such as workstations and mobile devices, and is managed by a team of cybersecurity professionals. It is aimed at identifying and responding to suspicious activities or issues in real time to prevent potential cyberthreats.Managed IT Services
Services offered by a third-party provider to help manage a company’s IT infrastructure remotely.Managed Microsoft Teams:
Wrap around care for Microsoft Teams users. Nortec provides 100% remote-capable reliable IT support and workforce training for Microsoft Teams.Managed Modern Workplace
– Nortec’s Managed Cloud Portal with full desktop support and additional security add-ons to protect end users on the desktop applications.Managed Network
A type of IT service delivered by a third-party provider where the network services are outsourced.Malware
Software designed to infiltrate or damage a computer system without the owner’s informed consent.Microsoft Azure:
A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems.Microsoft Excel
A spreadsheet program included in the Microsoft Office suite of applications. Spreadsheets present tables of values arranged in rows and columns that can be manipulated mathematically, using both basic and complex arithmetic operations and functions.Microsoft Office 365
A line of subscription services offered by Microsoft as part of the Microsoft Office product line that allow use of the Microsoft Office software suite over the life of the subscription, as well as cloud-based software-as-a-service products for business environments.Microsoft OneDrive
OneDrive is a file-hosting service and synchronization service operated by Microsoft. It allows users to store files and personal data like Windows settings or BitLocker recovery keys in the cloud, share files, and sync files across mobile devices, pcs, and even Xbox gaming consoles.Microsoft Outlook
A personal information manager from Microsoft, available as a part of the Microsoft Office suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note taking, journal logging, and web browsing.Microsoft SharePoint
A web-based collaborative platform that integrates with Microsoft Office. It is primarily sold as a document management and storage system, but the product is highly configurable, and usage varies substantially among organizations.Microsoft Teams
A platform that combines workplace chat, meetings, notes, and attachments. It integrates with Office 365 productivity suite and features extensions that can integrate with non-Microsoft products. It is designed for teams and departments to collaborate and communicate in real time, whether in chat or video conference format.Microsoft Word
A word processor included in Microsoft’s Office suite. It is used for creating, editing, formatting, and printing documents.Mobile Device Management (MDM):
A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices (laptops, smartphones, tablets, etc.) that are deployed across multiple mobile service providers and across multiple mobile operating systems used in the organization.Network
A group of two or more computer systems linked together.Network assessment:
The review of a company’s existing IT infrastructure, management, security, processes, and performance to identify opportunities for enhancement.Network Infrastructure
the hardware and software resources of an entire network that enable network connectivity, communication, operations, and management of an enterprise network. The network infrastructure of an organization encompasses a wide range of equipment such as routers, switches, servers, firewalls, and network management software.Off-Premise
refers to systems or services that are hosted or provided outside the user’s physical location or primary infrastructure. This can include cloud services, or outsourcing services to third-party providers.On-Premise:
refers to the installation and operation of software or hardware directly on a user’s premises (e.g., within an organization’s own building), and within its own internal network, rather than hosting it remotely or in the cloud.Operating System (OS)
A software that manages computer hardware and software resources and provides various services for computer programs.Outsourced IT
The practice of hiring third-party service providers to deliver IT functions.Patch Management
An area of systems management that involves acquiring, testing, and installing multiple patches to an administered computer system.Phishing:
An attempt by attackers to trick you into giving them your personal information, often through deceptive emails and websites.Platform as a Service (PaaS)
A cloud computing model in which a third-party provider delivers hardware and software tools to users over the internet.Professional Services Automation (PSA)
Software designed to assist professionals, such as IT consultants, with project management and resource management for client projects.Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.Ransomware:
A type of malicious software designed to block access to a computer system until a sum of money is paid.Remote IT Support:
A method for troubleshooting software-related problems via remote desktop connections.Remote Monitoring and Management (RMM)
A category of software tools that allow managed IT service providers to monitor and manage endpoints, networks, and computers remotely.Remote Work:
a work arrangement in which employees do not commute or travel to a central place of work, such as an office building, warehouse, or store. Instead, they work outside of a traditional office environment – usually from home or a coworking space – using technology (like the internet, email, and video conferencing) to communicate and collaborate with colleagues and clients.Risk Assessment:
The process of identifying, assessing, and controlling threats to an organization’s capital and earnings.Sandbox
A testing environment that isolates untested code changes and outright experimentation from the production environment or repository.Secure Sockets Layer (SSL)
The standard security technology for establishing an encrypted link between a web server and a browser.Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level.Server:
A computer program or a machine that provides functionality for other programs or devices, called “clients.”Service Desk
A communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.Service Level Agreement (SLA)
A contract between a service provider and a customer that specifies, usually in measurable terms, what services the provider will furnish.Social Engineering
The use of deception to manipulate individuals into divulging confidential or personal information.Software as a Service (SaaS)
A software licensing and delivery model in which software is provided on a subscription basis and is centrally hosted. It is sometimes referred to as “on-demand software.”Software Defined Networking (SDN)
An approach to networking that allows network administrators to manage network services through abstraction of lower-level functionality.Spam
Unsolicited or undesired bulk email.Spear Phishing
A phishing method that targets specific individuals or groups within an organization.Spyware
A type of malware that is installed on a computer and collects information about users without their knowledge.SQL Injection
A code injection technique that attackers use to insert malicious SQL statements into input fields for execution.SSL Certificate
A type of digital certificate that provides authentication for a website and enables an encrypted connection.Threat
A possible danger that might exploit a vulnerability to breach security and, therefore, cause harm to an organization.Trojan Horse
A type of malicious software that misleads users of its true intent.Two-Factor Authentication (2FA)
A security process in which the user provides two different authentication factors to verify themselves.Unified Communications:
a system that integrates (or unifies) multiple communication methods within a business. This could include instant messaging, voice (including IP telephony), video conferencing, data sharing, and email. The goal of unified communications is to minimize the complexity of handling various types of communication across multiple devices and platforms by bringing them all under one manageable system.Unified Communications as a Service (UCaaS)
In a UCaaS model, a third-party provider hosts the UC services and infrastructure, and customers access these services over the internet. This model allows businesses to enjoy the benefits of UC without the complexities and costs of owning, maintaining, and managing their own communications infrastructure.Unified Threat Management (UTM)
An information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network.Vendor Management:
The process by which an organization manages and oversees its relationships with vendors, ensuring that vendor services are received as agreed.Virus
A type of malicious software that, when executed, replicates by reproducing itself or infecting other programs by modifying them.Virtual CIO (vCIO)
A part-time resource provided by a managed services provider, who The vCIO serves in the role of a traditional Chief Information Officer (CIO) for companies who do not have budget to hire one. They are responsible for formulating strategic IT goals and recommending technology aligned with the goals of the business. goals of the business.Virtual Machine (VM)
An emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer.Virtual Private Network (VPN):
A network that is constructed using public wires to connect nodes and uses security procedures to ensure that only authorized users can access the network.Voice over IP (VoIP):
The delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks.Vulnerability
is a weakness in a system or its design that could be exploited by a threat.White Hat Hacker
An individual who hacks for ethical reasons, identifying weaknesses in a system in order to repair them.Web Application Firewall (WAF)
A firewall that monitors, filters or blocks data packets as they travel to and from a website or web application.Web Hosting
A service that allows organizations and individuals to post a website or web page onto the Internet.Whaling
In the realm of cybersecurity, whaling refers to a specific type of phishing attack that is targeted at high-profile individuals within an organization, such as executives or senior management. Whaling attacks are often more sophisticated social engineering attacks and are typically designed to trick the target into revealing sensitive information, or granting unauthorized access to systems or data.Worm
A standalone malware computer program that replicates itself in order to spread to other computers.Zero-Day Exploit
An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.