Some common IT terms include:
- Data Protection
Preventing important information from being corrupted, compromised, or lost. - Disaster Recovery
The process, policies, and procedures for recovering important files after a natural or manmade disaster. - Network Security
Using both software and physical preventative measures to protect a network from threats, such as unauthorized access, modification, malfunction, or destruction.
- Data and Privacy Compliance
Adhering to established guidelines, specifications, and legislation for protecting personal information.
- Security Audits
Reviewing and evaluating a company’s network security in order to determine and fix any problem areas.
- IT Company
A business that provides services for the operation of computer systems.
- IT Service Management
All of the activities used to design, plan, deliver, operate, and control any IT services offered to customers.
- Managed IT Services
Outsourced services that can help improve information-technology operations and cutdown on expenses.
- Cloud Computing
Software and services that run on the Internet rather than a computer.
- IT Consulting
Advising a business on how to best use IT to reach their business objectives.
- Data Centre
A facility where computer systems and associated components (backup power supplies, data communication connections, environmental controls, and security devices) are stored.
- Microsoft Windows
A group of operating systems for PC or compatible computers.
- Managed Service Provider
A company that provides a range of information-technology (IT) services.
- Spam
Junk email that is unsolicited and sent in bulk to numerous email addresses. - Virus
A mischievous or destructive program that works to alter a computer’s data.
- The Cloud
A common shorthand for cloud computing services. - Local Area Network (LAN)
A small local network of computers that share resources, such as programs, documents, or printers.
- Firewall
A piece of software or hardware used to block certain types of traffic.
- Network
A group of computers connected on a LAN or over the Internet that are capable of exchanging information.
- Authentication
The process of confirming the claimed identity of the user.
- Two-Factor Authentication
Granting permission for a user to access or change certain files or areas of network.
- Backup
Creating copies of files and applications to prevent losing data as a result of a system failure or natural disaster.
- Data Loss Prevention
Stopping data with protected information from being exposed or lost.
- Disaster Recovery Plan
A written document outlining the process of restoring operations, applications, or a computer facility after a major hardware or software failure.
- Local Storage
An information storage system that is physically located at a workstation or server.
- Malicious Code
Hostile, intrusive, or annoying software designed to infiltrate or damage a computer system without the owner’s knowledge. - Offsite Storage
An information storage system that is located in a different area that does not share the same disaster threat event as the business’ building.
- Spyware
Software installed on a computer to intercept or partially take over a computer without the owner’s consent.
- Trojan
A destructive program (virus or worm) that is hidden in an innocent-looking piece of software, such as a game.
- Vulnerability
A part of a system or process that can be exploited. - Worm
A program that makes copies of itself in a computing system to be sent over networks to other computers.
- Cybersecurity
Measures taken to protect a computer, device, or network from a cybercrime. - Cybercrime
An illegal activity, such as identity theft or spreading computer viruses, that is undertaken or relies heavily on a computer.
- Phishing
A type of email scam designed to trick recipients into revealing confidential information.
- Computer Hardware
Physical equipment used for inputting, processing, and outputting information on a system.
- Computer Software
Detailed instructions that have been preprogrammed onto an information system in order to control and coordinate computer hardware components. - Information-Technology (IT) Infrastructure
Computer hardware, software, data, storage technology, and networks that make up the shared IT resources for a business.
- Server
A computer that has been specifically optimized to provide resources, such as software, to other computers on the same network.