Applications - ANSWER A type of software designed for users to accomplish
a specific task.
Utilities - ANSWER Apps designed to help analyze, optimize or maintain a
computer
OS - ANSWER Operating System: manages computer hardware and software
EX Microsoft Windows
Platform - ANSWER Environment in which a piece of software is executed.
Ex: windows platform for word
feature - ANSWER characteristic of software or hardware like facial
recognition to iPhone X
Plugin - ANSWER Extension that adds a specific feature to software.
SaaS (Software as a Service) - ANSWER Pay for software as you use it. Not
installed locally, instead it is 'Hosted'software e.g. Google Docs
Application Programming Interface (API) - ANSWER Set of clearly defined
methods of communication between software. "The messenger"
console - ANSWER User interface manages and controls soft or hardware like
kb4 customers access our products
dashboard - ANSWER At a glance view of key info relevant to your business
goals
, Server - ANSWER a computer or computer program that manages access to a
centralized resource or service in a network.
Domain - ANSWER A unique name that identifies a website
Directory - ANSWER Similar to physical folders, organizes files 84 software
that stores all resources on a network
AD (Active Directory) - ANSWER a technology created by Microsoft that
provides a variety of network services, including: LDAP-like directory services,
Kerberos based authentication and DNS based naming
protocol - ANSWER Communication rules between computers
HTTP (Hypertext Transfer Protocol) - ANSWER the protocol used for
transmitting web pages over the Internet
HTTPS (Hypertext Transfer Protocol Secure) - ANSWER Encrypted and
secure http transfers
White Paper - ANSWER Report that describes how a technology or product
solves a problem
White listing - ANSWER List of "pre-approved" known good
software/programs and emails that are allowed to run or pass through filter
Phishing - ANSWER a technique to gain personal information for the purpose
of identity theft, usually by means of fraudulent e-mail bulk
spear phishing - ANSWER A phishing attack that targets only specific users.
Phishing surface attack - ANSWER Quantity of emails exposed on the internet
Phish Prone Percentage - ANSWER Percent of employees prone to click
Social Engineering - ANSWER using deception to obtain unauthorized access
to information resources
a specific task.
Utilities - ANSWER Apps designed to help analyze, optimize or maintain a
computer
OS - ANSWER Operating System: manages computer hardware and software
EX Microsoft Windows
Platform - ANSWER Environment in which a piece of software is executed.
Ex: windows platform for word
feature - ANSWER characteristic of software or hardware like facial
recognition to iPhone X
Plugin - ANSWER Extension that adds a specific feature to software.
SaaS (Software as a Service) - ANSWER Pay for software as you use it. Not
installed locally, instead it is 'Hosted'software e.g. Google Docs
Application Programming Interface (API) - ANSWER Set of clearly defined
methods of communication between software. "The messenger"
console - ANSWER User interface manages and controls soft or hardware like
kb4 customers access our products
dashboard - ANSWER At a glance view of key info relevant to your business
goals
, Server - ANSWER a computer or computer program that manages access to a
centralized resource or service in a network.
Domain - ANSWER A unique name that identifies a website
Directory - ANSWER Similar to physical folders, organizes files 84 software
that stores all resources on a network
AD (Active Directory) - ANSWER a technology created by Microsoft that
provides a variety of network services, including: LDAP-like directory services,
Kerberos based authentication and DNS based naming
protocol - ANSWER Communication rules between computers
HTTP (Hypertext Transfer Protocol) - ANSWER the protocol used for
transmitting web pages over the Internet
HTTPS (Hypertext Transfer Protocol Secure) - ANSWER Encrypted and
secure http transfers
White Paper - ANSWER Report that describes how a technology or product
solves a problem
White listing - ANSWER List of "pre-approved" known good
software/programs and emails that are allowed to run or pass through filter
Phishing - ANSWER a technique to gain personal information for the purpose
of identity theft, usually by means of fraudulent e-mail bulk
spear phishing - ANSWER A phishing attack that targets only specific users.
Phishing surface attack - ANSWER Quantity of emails exposed on the internet
Phish Prone Percentage - ANSWER Percent of employees prone to click
Social Engineering - ANSWER using deception to obtain unauthorized access
to information resources