Technical Term Glossary
Save confusion, discover the definition of acronyms and technical terms here.
Name |
Acronym |
Description |
Access Point |
AP |
Is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself. |
Active X |
A Microsoft technology that allows small programs to run inside your browser. |
|
Advanced Threat Protection |
ATP |
Refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as software or as managed services |
Android |
An operating system for mobile devices. |
|
Anti-spyware |
Helps protect your computer against pop-ups, slow performance and security threats caused by spyware and other unwanted software. |
|
Anti-virus |
AV |
Software that detects and prevents known viruses from attacking your computer. |
Applications |
Apps |
A type of computer program that you can download for your computer, tablet or mobile phone. |
Asymmetric digital subscriber line |
ADSL |
Is a type of DSL broadband communications technology used for connecting to the Internet. ADSL allows more data to be sent over existing copper telephone lines (POTS), when compared to traditional modem lines |
Attachment |
Files, such as photos, documents or programs, which are sent along with an email. |
|
Automatic Call Distributor |
ACD |
An automated call distribution system, commonly known as automatic call distributor, is a telephony device that answers and distributes incoming calls to a specific group of terminals or agents within an organisation |
Name |
Acronym |
Description |
Backup |
A backup is a copy of data or files. Backing up is important for everyone using computers as files and data can become corrupted , be accidentally overwritten or deleted. Backups are often made on separate storage drives or on a different server. |
|
Bandwidth |
The amount of information which can be sent through a connection. |
|
Binary |
A numbering system which has 2, rather than 10 as a base. Uses 0 and 1 |
|
Botnet |
A network of infected devices, connected to the Internet, used to commit coordinated cyber attacks without their owner’s knowledge. |
|
Breach |
An incident in which data, computer systems or networks are accessed or affected in a non-authorised way. |
|
Bring Your Own Device |
BYOD |
An organisation’s strategy or policy that allows employees to use their own personal devices for work purposes. |
Browser |
The computer software or app you use to access the internet. Examples include Internet Explorer, Google Chrome and Safari. |
|
Brute Force Attack |
Using a computational power to automatically enter a huge number of combination of values, usually in order to discover passwords and gain access. |
|
Bug |
An error or fault in a computer programme which causes an incorrect or unexpected result. |
Name |
Acronym |
Description |
Cache |
An auxiliary memory from which high speed retrieval is possible. |
|
Cascading Style Sheets |
CSS |
This is the skin which covers the HTML bones and describes the look and formatting of a website. |
Central Processing Unit |
CPU |
The hardware in a computer which takes instructions from software and makes calculations. |
Certificate |
A form of digital identity for a computer, user or organisation to allow the authentication and secure exchange of information. |
|
Cloud |
Where shared compute and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services. |
|
Cloud App Security |
CAS |
Extends Real-time automated breach prevention capabilities into a SaaS environments, empowering organisations to move to the cloud. |
Command Line Interface |
CLI |
Processes commands to a computer program in the form of lines of text. The program which handles the interface is called a command-line interpreter or command-line processor. |
Content Management System |
CMS |
A user friendly system to edit a webpage’s content, so edits can be made by non-techie users and not by coders. |
Cookie |
A cookie stores information on the user’s computer (often their preferences or login details) but they are also used to track a referrer of a product or determine their behaviour in order to target display advertising to them. |
|
Credentials |
A user’s authentication information used to verify identity – typically one, or more, of password, token, certificate. |
|
Customer Relationship Management |
CRM |
A software or system which helps a company organise its customer relations. |
Cyber Attack |
Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means. |
|
Cyber Essentials |
Is a UK government scheme designed to protect companies and organisations, whatever their size, against a range of the most common cyber-attacks. Most of these attacks are basic and carried out by relatively unskilled people. |
|
Cyber Incident |
A breach of the security rules for a system or service |
|
Cyber Security |
The protection of devices, services and networks — and the information on them — from theft or damage. |
Name |
Acronym |
Description |
Data Centre |
DC’s |
Is a building, dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems |
Data at Rest |
Describes data in persistent storage such as hard disks, removable media or backups. |
|
Data Capture |
Capturing the details of users, for example, contact details and preferences. |
|
Denial of Service |
DOS |
When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests. |
Deny List |
An access control mechanism that blocks named entities from communicating with a computer, site or network. Can also be known as ‘blacklisting’ across the industry. |
|
Desktop |
The background behind all your windows and menus and shortcuts. |
|
Dictionary Attack |
A type of brute force attack in which the attacker uses known dictionary words, phrases or common passwords as their guesses. |
|
Digital Footprint |
A ‘footprint’ of digital information that a user’s online activity leaves behind. |
|
DNS over HTTPS |
DoH |
DNS over HTTPS is a protocol for performing remote Domain Name System resolution via the HTTPS protocol |
Domain |
A group of computers/devices on a network which are administered as a unit. On the internet, domains are defined by their IP address. |
|
Domain Name System |
DNS |
A hierarchical and decentralised naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. |
Download Attack |
The unintentional installation of malicious software or virus onto a device without the users knowledge or consent. May also be known as a drive-by download. |
Name |
Acronym |
Description |
Encrypted File System |
EFS |
The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer |
Encryption |
A mathematical function that protects information by making it unreadable by everyone except those with the key to decode it. |
|
End User Device |
EUD |
Collective term to describe modern smartphones, laptops and tablets that connect to an organisation’s network. |
Endpoint Detection and Response |
EDR |
Endpoint Detection and Response, also known as Endpoint Threat Detection and Response is a cyber technology that continually monitors and responds to mitigate cyber threats. |
Ethernet |
A system of connecting computers to form a local network. |
|
Exploit |
May refer to software or data that takes advantage of a vulnerability in a system to cause unintended consequences. |
Name |
Acronym |
Description |
Fibre to the Cabinet |
FTTC |
Where a fibre optic cable is delivered to a street-side cabinet which also contains the broadband network equipment. The end user customer is connected to this cabinet via a copper (telephone) line, known as PSTN. … It is also referred to as Fibre broadband. |
Fibre to the Premises |
FTTP |
Refers to fibre broadband that is wired directly to the home/business instead of a cabinet that services the area. |
Firewall |
FW |
Hardware or software which uses a defined rule set to constrain network traffic to prevent unauthorised access to or from a network. |
Fixed Fee |
This is when we have quoted for an engineer to carry out work that will be at an agreed overall cost. |
Name |
Acronym |
Description |
Gigabit |
Gbps |
In data communications, a gigabit is one billion bits, or 1,000,000,000 e.g. Gigabit Ethernet is a high-speed form of Ethernet (a local area network technology) that can provide data transfer rates of about 1 gigabit per second. Gigabits per second is usually shortened to Gbps. |
Gigabyte |
GB |
Is a measurement of data storage for computers, tablets, smartphones, gaming consoles, and other computing devices. |
Graphic Interchange Format |
GIF |
Pronounced with a soft g, it is an image format which requires very little memory. |
Name |
Acronym |
Description |
Hack |
An attempt to gain unauthorised access to a computer or account. |
|
Hacker |
In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks. |
|
Hard disk |
HDD |
A device which stores information on your computer on a hard disk. |
Hardware as a Service |
HaaS |
Is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer’s site and a service level agreement (SLA) defines the responsibilities of both parties. |
Hardware Independent Restore |
HIR |
Prepares a restored system volume to boot in an environment different from where it was originally created |
Honeypot(honeynet) |
Decoy system or network to attract potential attackers that helps limit access to actual systems by detecting and deflecting or learning from an attack. Multiple honeypots form a honeynet. |
|
Host |
Any Computer which is connected to the internet. |
|
Hypertext |
Any text which contains a clickable link, for example to a webpage. The hyperlinked text is often blue and underlined. |
|
Hypertext Markup Language |
HTML |
This is a computer language used to write webpages. It is also the tool used to make emails and newsletters which have formatting such as images. |
Name |
Acronym |
Description |
Incident |
A breach of the security rules for a system or service |
|
Insider Risk |
The potential for damage to be done maliciously or inadvertently by a legitimate user with privileged access to systems, networks or data. |
|
Internet of things |
IoT |
Refers to the ability of everyday objects (rather than computers and devices) to connect to the Internet. Examples include kettles, fridges and televisions. |
Internet Protocol (IP address) |
IP |
A unique string of numbers separated by full stops which identifies each computer using an IP to communicate over the network. |
Internet Service Provider |
ISP |
The company that provided you with the ability to connect to the Internet e.g. Sky, BT or your MSP |
Intranet |
A local or restricted computer network normally used internally in an organisation. It is like a private version of the internet. |
|
IP Direct Connect |
IPDC |
Is a sip trunking voice termination service that provides voice telephony calls using IP protocols, and creates a voice network across multiple sites. |
Name |
Acronym |
Description |
Java |
Java is a computer programming language completely unrelated to Javascript. It is used to make programmes interactive and is much more powerful than Javascript. |
|
Javascript |
JS |
A computer programming language which is used to make web browsers interact with the user, for example, by altering the content displayed, through the use of scripts. |
JPG/JPEG |
A graphic image format which uses more memory than a GIF but is of a higher quality as well, hence its use for photography. |
Name |
Acronym |
Description |
Kilobyte |
KB |
A “thousand” bytes. In practice, a kilobyte refers to two different numbers of bytes, depending on the context. It can mean 1000 bytes, or it can mean “2 to the power ten” bytes which is 1024 bytes. |
Name |
Acronym |
Description |
Landing Page |
A webpage which is designed as an entry point for a website or particular section on a website – home pages are landing pages, but not all landing pages are home pages. |
|
Linux |
An operating system, like iOS or Windows, which is open source, meaning anyone can improve and add to it. |
|
Long Term Evolution |
LTE |
A standard for wireless broadband communication for mobile devices and data terminals(4G) |
Name |
Acronym |
Description |
Macro |
A small program that can automate tasks in applications (such as Microsoft Office) which attackers can use to gain access to (or harm) a system. |
|
Malvertising |
Using online advertising as a delivery method for malware. |
|
Malware |
Malware is short for ‘malicious software’. A general term used to refer to hostile or intrusive software. |
|
Matrix Laboratory |
Matlab |
A computing environment which enables various functions such as data plotting and matrix manipulations, as well as interfaces with programmes written in other languages such as Java or Fortran. |
Media Access Control |
MAC |
The unique identifier on the back of a handset |
Meme |
An idea which spreads from person to person. They are cultural analogues to genes in that they self-replicate, mutate and respond to selectivity. On the internet, memes are typically funny images or phrases. The word itself derives from the Ancient Greek for imitation, like mime. |
|
Mitigation |
Steps that organisations and individuals can take to minimise and address risks. |
|
Motherboard |
A computer’s circuit board which contains the CPU, support chips and RAM. |
|
MYSQL |
MYSQL |
“My S Q L” or “My Sequel” – is an open source relational database management system. It is used widely, for example by WordPress, Drupal, Wikipedia, Facebook and Twitter. It is named after the co-founder’s daughter: My. |
Name |
Acronym |
Description |
Network |
Two or more computers linked in order to share resources |
|
Network Security Virtual |
NSv |
A full featured next generation virtual Firewall specifically tailored for a virtual environment |
Network Switch |
A switch is a device in a computer network that connects other devices together. Multiple data cables are plugged into a switch to enable communication between different networked devices. |
|
Next Generation Anti-Virus |
NGAV |
|
Not For Resale |
NFR |
Discounted or free hardware or software for us to use internally |
Number Translation Service |
NTS |
Translates a dialled telephone number, typically beginning 08 in the UK to a geographical ‘connect number’ beginning 01 or 02 in the UK. The connect number may be changed without changing the published dialled number |
Name |
Acronym |
Description |
Open Source |
In computing, open source denotes software where the original code is available for anyone to see or change. Linux is one example – anyone can change or contribute to the code for free. |
|
Operating system |
OS |
The software that manages different programs on a computer. |
Name |
Acronym |
Description |
Packet Internet Gopher |
PING |
“Packet Internet Gopher” – An application which sends a message to another computer, receives a reply and times the transmission. This can measure what computers are on the network and how fast the network is working. |
Patching |
Applying updates to firmware or software to improve security and/or enhance functionality. |
|
Pentest |
Short for penetration test. An authorised test of a computer network or system designed to look for security weaknesses so that they can be fixed. |
|
Pharming |
An attack on network infrastructure that results in a user being redirected to an illegitimate website despite the user having entered the correct address. |
|
Phishing |
Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam. |
|
Photoshop |
A software used to manipulate images. |
|
PHP |
PHP is web development programming language which can also be used for general purpose programming. It differs to Javascript in that its scripts are server-side, not client-side, which allows it to keep databases and valuable code private. |
|
Pixel |
The smallest area of illumination on a screen. The word is derived from “picture element”. |
|
Plain Text |
Text which is not coded into formatting such as font size, colour or hypertext. |
|
Platform |
The basic hardware (device) and software (operating system) on which applications can be run. |
|
Platform as a Service |
PAAS |
Is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app |
Plug-in |
A small piece of software which adds features to an existing software, for example internet browsers. |
|
Pop-up |
A small window that suddenly appears (or ‘pops up’) on a webpage, usually an advertisement or an alert. |
|
Porting |
Is a semi-permanent means of moving a telephone number from one provider to another, and usually involves closing the old account. |
|
Power Distribution Unit |
PDU |
Essentially a power extension with multiple sockets (like you would have in the house) that you put into a server or comms rack |
Power over ethernet |
POE |
Is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords. |
Private Branch Exchange |
PBX |
Is a telephone exchange or switching system that serves a private organisation and permits communication between internal telephones within the organisation without the use of external lines |
Professional Services Automation |
PSA |
Software is used to manage resources such as personnel and equipment for client projects. This can include project management, billing, reporting, and other related functions. |
Profile |
A description that may include your personal details and is used to identify you on a social networking website. This can be set as public (viewed by everyone) or private (only viewed by certain people). |
|
Public Switched Telephone Network |
PTSN |
National, reginal and local infrastructure that consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all interconnected by switching centers, thus allowing most telephones to communicate with each other |
Purchase Order |
PO |
Allows a product to be tracked from quote to invoice via a purchase order number |
Python |
A general purpose, high level programming language whose aim is to have very readable code. It is named after Monty Python, to reflect the goal of its creators to make it fun to use. |
Name |
Acronym |
Description |
Quick Response code |
QR Code |
A type of barcode which can be read by phones. The information is normally a URL, but can be other data. It is normally a square pattern. |
Name |
Acronym |
Description |
Random Access Memory |
RAM |
“Random Access Memory” – memory which can be accessed without touching preceding bytes. It is the most common type of memory. There are two types, DRAM (“Dynamic RAM”) is slower than SRAM (“Static Random Access Memory”) as DRAM needs to be refreshed every millisecond, but SRAM does not. |
Rangeholder |
Is the Communications Provider (CP) who has been allocated a range of numbers by Ofcom that includes the number to be ported. |
|
Ransomware |
Ransomware is a type of malicious software (or “malware”) that infects computers, then encrypts various files and demands a ransom to get them back. Even if you pay the money within the timeframe the criminals set, there’s no guarantee you’ll get your files back. |
|
Recovery Point Objective |
RPO |
Limits how far to roll back in time, and defines the maximum allowable amount of lost data measured in time from a failure occurrence to the last valid backup. |
Recovery Time Objective |
RTO |
Is related to downtime and represents how long it takes to restore from the incident until normal operations are available to users. |
Relational database management system |
RDBMS |
A system to store information. |
Remote Desktop Protocol |
RDP |
Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. |
Remote Monitoring and Management |
RMM |
Refers to IT tools and software that help MSPs proactively locate, update, and monitor client endpoints. RMM allows for the automation of IT tasks, which makes it especially helpful if you’re transitioning from a break/fix to an MSP model. A technician using RMM doesn’t need to be physically present in order to learn more about a client’s devices and networks. They can receive the information remotely, making RMM a valuable tool for monitoring client infrastructures on a fixed monthly plan. |
Request for Change |
RFC |
Is a formal request for the implementation of a Change. The RFC is a precursor to the ‘Change Record’ and contains all information required to approve a Change. |
Responsive Design |
A website which changes according to the device it is being viewed on, e.g. a tablet or PC. |
|
Router |
A device that connects your computer to a broadband-enabled telephone line and emits your home internet signal. May also be called a gateway. |
|
Ruby on Rails |
Sometimes known as Rails, this is an open source web application framework which runs via Ruby, so it can help support web applications construction. |
Name |
Acronym |
Description |
Sanitisation |
Using electronic or physical destruction methods to securely erase or remove data from memory. |
|
Scripts |
A list of commands that can be executed without user interaction and so are used for automation. |
|
Security Awareness Training |
SAT |
Training provided by a company that is designed to alleviate the threats of cyber security |
Security information and event management |
SIEM |
Is a subsection within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware |
Security Operations Centre |
SOC |
A security operations center is a centralized unit that deals with security issues on an organisational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology |
Security Orchestration, Automation and Response |
SOAR |
A tool to automate the process for checks for security threats to a business |
Server |
A computer which stores and delivers files or information to a client. For example, the Google servers deliver you information. |
|
Service Set Identifier |
SSID |
The wireless Network Name |
Session Board Controller |
SBC |
A way of protecting and managing the data streams sent over VOIP networks |
Session Initiation Protocol |
SIP |
Is a signalling protocol used for initiating, maintaining, and terminating real-time communication that include voice, video and messaging applications |
Smartphone |
A mobile phone which, as well as making calls and sending texts, can connect to the internet, send emails, and do a number of other functions like a computer. |
|
Smishing |
Phishing via SMS: mass text messages sent to users asking for sensitive information (e.g. bank details) or encouraging them to visit a fake website. |
|
Social Engineering |
Manipulating people into carrying out specific actions, or divulging information, that’s of use to an attacker. |
|
Social Media |
Media which allows users to create and share content, and network socially. |
|
Social Networking Website |
An online community where you can connect with friends, family and other people who share your interests. Examples include Facebook, Twitter and Instagram. |
|
Software as a Service |
SAAS |
Is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as “on-demand software” |
SPAM |
A commercial email that you did not request, also known as junk mail. |
|
Spear-Phishing |
A more targeted form of phishing, where the email is designed to look like it’s from a person the recipient knows and/or trusts. |
|
Spyware |
An unwanted program that runs on your computer, which can make it slow and unreliable or even make you a target for online criminals. |
|
Subscriber Trunk Dialling |
STD |
A telephone system allowing subscribers to dial long distance calls without operator assistance |
Name |
Acronym |
Description |
Tablet |
A larger handheld device with a touchscreen which can connect to the internet and be used as a portable computer. |
|
Technical Account Management |
TAM |
Provides account management and high-level technical support to project teams and customers. They may also coordinate the installation and integration of services for customers. |
Time and Materials |
T&M |
When completing a project, rather than charging a fixed fee, we will charge for all time taken for an engineer to complete the necessary work. |
Trojan |
A type of malware or virus disguised as legitimate software, that is used to hack into the victim’s computer. |
|
Two Factor Authentication |
2FA |
The use of two different components to verify a user’s claimed identity. Also known as multi-factor authentication. |
Name |
Acronym |
Description |
Uninterruptable Power Supply |
UPS |
An electrical apparatus that provides emergency power to a load when the input power source or mains power fails. |
Uniform Resource Locator |
URL |
The address for an online piece of information such as a webpage or image e.g. www.ingeniotech.co.uk |
Usability |
The noun to describe whether a website is easy to use – one of the most important considerations in website design. |
|
User Experience |
UX |
The term covers a person’s behaviours, attitudes, and emotions about using a particular product, system or service. |
Name |
Acronym |
Description |
Viral |
A marketing activity is shared exponentially on social media. |
|
Virtual Memory |
Memory temporarily stored on a hard drive. |
|
Virtual Private Network |
VPN |
An encrypted network often created to allow secure connections for remote users, for example in an organisation with offices in multiple locations. |
Virus |
Programs that spread from one computer to another by email or through malicious websites. They can slow your computer down, display unwanted pop-up messages and even delete files. |
|
Vulnerability |
A weakness, or flaw, in software, a system or process. An attacker may seek to exploit a vulnerability to gain unauthorised access to a system. |
|
Vulnerability Assessment and Penetration Testing |
VAPT |
Is a term that describes security testing that is designed to both identify and help address vulnerabilities. |
Name |
Acronym |
Description |
Water Holing (watering hole attack) |
Setting up a fake website (or compromising a real one) in order to exploit visiting users. |
|
Web Application Firewall |
WAF |
A firewall for web services to protect the website from malicious traffic by filtering and monitoring HTTP traffic from the internet and external web applications. |
Whaling |
Highly targeted phishing attacks (masquerading as a legitimate emails) that are aimed at senior executives. |
|
Wide Area Network |
WAN |
A wide area network is a telecommunications network that extends over a large geographical area for the primary purpose of computer networking |
Wireless access point |
WAP, AP |
Is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. |
Wireless Network |
Also known as wi-fi, this is a way for your computer to connect to the internet without using wires or cables. |
Name |
Acronym |
Description |
Zero Day |
0 day |
Recently discovered vulnerabilities (or bugs), not yet known to vendors or antivirus companies, that hackers can exploit. |
Zipped File |
A file or folder of files which has been compressed into a smaller amount of data, normally to ease the transferring process. |