Glossary of IT terms

|Glossary of IT terms
Glossary of IT terms2019-09-19T13:01:09+00:00

Les Olson Security Suite

Security SuiteA collection of software utilities that protect a user’s computer from viruses and other malware.
HacktivistsA person who gains unauthorized access to computer files or networks in order to further social or political ends.
EndpointA device or node that is connected to a network and accepts communications back and forth across the network. In a traditional sense, an endpoint can be a modem, hub, bridge, or switch.
IT SolutionA set of related software programs and/or services that are sold as a single package.
Threat IntelligenceThe analysis of internal and external threats to an organization in a systematic way, also known as cyber threat intelligence (CTI).
Security toolsTools for detecting attack vectors or holes in the security system where cybercriminals can get in; also protect outgoing data and stores data to prevent its loss.
Risk ScoreAn easily calculated number that reflects the level of risk in the presence of some risk factors.
Network DevicesComponents used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines.
Security ThreatA risk that which can potentially harm computer systems and organization.
SOCSecurity Operation Center; works to identify threats on servers and firewalls, and to support compliance guidelines.
LEDLight-emitting diode, the technology behind many lighting and display products.
End-to-end Cyber SecurityA security ecosystem where firewall, servers, and workstations all communicate with each other to identify and stop malware.
SMBSmall to Medium Business.
DNSAn abbreviation for Domain Name System, a system for naming computers and network services that is organized into a hierarchy of domains.
ServerA computer, a device or a program that is dedicated to managing network resources.
FirewallA network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
PCIStands for Payment Card Industry and is typically coupled with PCI Compliance, which refers to the standards that merchants are required to keep in order to accept credit card payments.
HIPAAStands for Health Insurance Portability and Accountability Act and refers to the laws and requirements of employers to properly maintain and secure protected personal information.
NIST-800The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines.
SIEMStands for Security Information & Event Management is the practice of collecting, monitoring and analyzing security-related data from computer logs.